-
1
-
-
0016562514
-
The wire-tap channel
-
Jan.
-
A. Wyner, "The wire-tap channel," Bell. Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Jan. 1975.
-
(1975)
Bell. Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
2
-
-
0017973511
-
Broadcast channels with confidental messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidental messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
3
-
-
0017996501
-
The Gaussian wire-tap channel
-
July
-
S. K. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.2
-
4
-
-
33646073724
-
An achievable region for the Gaussian wiretap channel with side information
-
May
-
C. Mitrpant, A. J. H. Vinck, and Y. Luo, "An achievable region for the Gaussian wiretap channel with side information," IEEE Trans. Inf. Theory, vol. 52, no. 5, pp. 2181-2190, May 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.5
, pp. 2181-2190
-
-
Mitrpant, C.1
Vinck, A.J.H.2
Luo, Y.3
-
7
-
-
84940654702
-
Secrecy capacity of independent parallel channels
-
Sep.
-
Z. Li, R. D. Yates, and W. Trappe, "Secrecy capacity of independent parallel channels," in 44th Annual Allerton Conference on Communications, Control and Computing, Sep. 2006.
-
(2006)
44th Annual Allerton Conference on Communications, Control and Computing
-
-
Li, Z.1
Yates, R.D.2
Trappe, W.3
-
9
-
-
45249119255
-
Secure communication over fading channels
-
Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
10
-
-
54749106691
-
On the secrecy capacity of fading channels
-
P. K. Gopala, L. Lai, and H. El-Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El-Gamal, H.3
-
11
-
-
84885890147
-
An eavesdropping game with SINR as an objective function
-
Sep.
-
A. Garnaev and W. Trappe, "An eavesdropping game with SINR as an objective function," in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Security and Privacy in Communication Networks, Proc. 5th International ICST Conference SecureComm, Sep. 2009.
-
(2009)
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Security and Privacy in Communication Networks, Proc. 5th International ICST Conference SecureComm
-
-
Garnaev, A.1
Trappe, W.2
-
13
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. Shamai, "Information theoretic security," in Foundation Trends in Communication Information Theory, Vol. 5, 2008.
-
(2008)
Foundation Trends in Communication Information Theory
, vol.5
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
15
-
-
0003823906
-
The exponential integral Ei() and related functions
-
ch. 37 Washington, DC: Hemisphere
-
J. Spanier and K. Oldham, "The Exponential Integral Ei() and Related Functions," ch. 37 in An Atlas of Functions. Washington, DC: Hemisphere, 1987.
-
(1987)
An Atlas of Functions
-
-
Spanier, J.1
Oldham, K.2
|