메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Techniques for enhanced physical-layer security

Author keywords

Node degree; Physical layer security; Random graphs; Secure connectivity; Stochastic geometry; Wireless networks

Indexed keywords

GRAPH THEORY; INFORMATION THEORY; NETWORK LAYERS; NETWORK SECURITY; STOCHASTIC SYSTEMS;

EID: 79551617822     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2010.5683460     Document Type: Conference Paper
Times cited : (10)

References (37)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 29, pp. 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.29 , pp. 656-715
    • Shannon, C.E.1
  • 2
    • 0016562514 scopus 로고
    • The Wire-Tap Channel
    • October
    • A. D. Wyner, "The Wire-Tap Channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1367, October 1975.
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1367
    • Wyner, A.D.1
  • 3
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • I. Csiszár and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Korner, J.2
  • 4
    • 0017996501 scopus 로고
    • The Gaussian wire-tap channel
    • July
    • S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.4 , pp. 451-456
    • Leung-Yan-Cheong, S.1    Hellman, M.2
  • 5
    • 0347337828 scopus 로고    scopus 로고
    • Secure space-time communication
    • Dec.
    • A. Hero, "Secure space-time communication," IEEE Transactions on Information, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
    • (2003) IEEE Transactions on Information , vol.49 , Issue.12 , pp. 3235-3249
    • Hero, A.1
  • 6
    • 84931425598 scopus 로고    scopus 로고
    • Secret communication using artificial noise
    • Dallas, TX, Sept.
    • R. Negi and S. Goel, "Secret communication using artificial noise," in Proc. IEEE Vehicular Technology Conference, vol. 3, Dallas, TX, Sept. 2005, pp. 1906-1910.
    • (2005) Proc. IEEE Vehicular Technology Conference , vol.3 , pp. 1906-1910
    • Negi, R.1    Goel, S.2
  • 8
    • 66949180834 scopus 로고    scopus 로고
    • A note on the secrecy capacity of the multiple-antenna wiretap channel
    • June
    • T. Liu and S. Shamai, "A note on the secrecy capacity of the multiple-antenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, June 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.6 , pp. 2547-2553
    • Liu, T.1    Shamai, S.2
  • 9
    • 70350706020 scopus 로고    scopus 로고
    • The capacity region of the degraded multiple-input multiple-output compound broadcast channel
    • Nov.
    • H. Weingarten, T. Liu, S. Shamai, Y. Steinberg, and P. Viswanath, "The capacity region of the degraded multiple-input multiple-output compound broadcast channel," IEEE Trans. Inf. Theory, vol. 55, no. 11, pp. 5011-5023, Nov. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.11 , pp. 5011-5023
    • Weingarten, H.1    Liu, T.2    Shamai, S.3    Steinberg, Y.4    Viswanath, P.5
  • 11
    • 33847353721 scopus 로고    scopus 로고
    • Secret communication in presence of colluding eavesdroppers
    • S. Goel and R. Negi, "Secret communication in presence of colluding eavesdroppers," in Proc. Military Commun. Conf., Oct. 2005, pp. 1501-1506.
    • Proc. Military Commun. Conf., Oct. 2005 , pp. 1501-1506
    • Goel, S.1    Negi, R.2
  • 18
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • June
    • Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, pp. 2470-2492, June 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 19
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Eurocrypt 2000
    • U. Maurer and S.Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," Eurocrypt 2000, Lecture Notes in Computer Science, vol. 1807, pp. 351+, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1807
    • Maurer, U.1    Wolf, S.2
  • 21
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 22
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography - Part I: Secret sharing
    • July
    • R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography - Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, July 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 24
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and intrinsic conditional information
    • March
    • U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and intrinsic conditional information," IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499-514, March 1999.
    • (1999) IEEE Trans. Inf. Theory , vol.45 , Issue.2 , pp. 499-514
    • Maurer, U.M.1    Wolf, S.2
  • 28
    • 33747886952 scopus 로고    scopus 로고
    • Secret key agreement from correlated source outputs using low density parity check matrices
    • July
    • J. Muramatsu, "Secret key agreement from correlated source outputs using low density parity check matrices," IEICE Trans. on Fund. of Elec. Comm. Comp., vol. E89-A, no. 7, pp. 2036-2046, July 2006.
    • (2006) IEICE Trans. on Fund. of Elec. Comm. Comp. , vol.E89-A , Issue.7 , pp. 2036-2046
    • Muramatsu, J.1
  • 31
    • 79951679076 scopus 로고    scopus 로고
    • Secure communication in stochastic wireless networks
    • submitted for publication, preprint available on arXiv:1001.3697
    • -, "Secure communication in stochastic wireless networks," IEEE Trans. Inf. Theory, pp. 1-59, 2009, submitted for publication, preprint available on arXiv:1001.3697.
    • (2009) IEEE Trans. Inf. Theory , pp. 1-59
    • Pinto, P.C.1    Barros, J.O.2    Win, M.Z.3
  • 36
    • 79957978453 scopus 로고    scopus 로고
    • Stochastic geometry and random graphs for the analysis and design of wireless networks
    • M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, "Stochastic geometry and random graphs for the analysis and design of wireless networks," IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029-1046, 2009.
    • (2009) IEEE J. Sel. Areas Commun. , vol.27 , Issue.7 , pp. 1029-1046
    • Haenggi, M.1    Andrews, J.G.2    Baccelli, F.3    Dousse, O.4    Franceschetti, M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.