-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 29, pp. 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.29
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The Wire-Tap Channel
-
October
-
A. D. Wyner, "The Wire-Tap Channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1367, October 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1367
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
I. Csiszár and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Korner, J.2
-
4
-
-
0017996501
-
The Gaussian wire-tap channel
-
July
-
S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
-
5
-
-
0347337828
-
Secure space-time communication
-
Dec.
-
A. Hero, "Secure space-time communication," IEEE Transactions on Information, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
-
(2003)
IEEE Transactions on Information
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero, A.1
-
6
-
-
84931425598
-
Secret communication using artificial noise
-
Dallas, TX, Sept.
-
R. Negi and S. Goel, "Secret communication using artificial noise," in Proc. IEEE Vehicular Technology Conference, vol. 3, Dallas, TX, Sept. 2005, pp. 1906-1910.
-
(2005)
Proc. IEEE Vehicular Technology Conference
, vol.3
, pp. 1906-1910
-
-
Negi, R.1
Goel, S.2
-
7
-
-
70449503892
-
Secrecy capacity region of the gaussian multireceiver wiretap channel
-
E. Ekrem and S. Ulukus, "Secrecy capacity region of the gaussian multireceiver wiretap channel," in Proc. IEEE Int. Symp. on Inf. Theory, Seoul, Korea, June 2009, pp. 2612-2616.
-
Proc. IEEE Int. Symp. on Inf. Theory, Seoul, Korea, June 2009
, pp. 2612-2616
-
-
Ekrem, E.1
Ulukus, S.2
-
8
-
-
66949180834
-
A note on the secrecy capacity of the multiple-antenna wiretap channel
-
June
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multiple-antenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, June 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
9
-
-
70350706020
-
The capacity region of the degraded multiple-input multiple-output compound broadcast channel
-
Nov.
-
H. Weingarten, T. Liu, S. Shamai, Y. Steinberg, and P. Viswanath, "The capacity region of the degraded multiple-input multiple-output compound broadcast channel," IEEE Trans. Inf. Theory, vol. 55, no. 11, pp. 5011-5023, Nov. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.11
, pp. 5011-5023
-
-
Weingarten, H.1
Liu, T.2
Shamai, S.3
Steinberg, Y.4
Viswanath, P.5
-
10
-
-
77949614838
-
On the relationship between the multi-antenna secrecy communications and cognitive radio communications
-
L. Zhang, R. Zhang, Y. Liang, Y. Xin, and S. Cui, "On the relationship between the multi-antenna secrecy communications and cognitive radio communications," in Proc. Allerton Conf. on Communications, Control, and Computing, Monticello, IL, Sept. 2009.
-
Proc. Allerton Conf. on Communications, Control, and Computing, Monticello, IL, Sept. 2009
-
-
Zhang, L.1
Zhang, R.2
Liang, Y.3
Xin, Y.4
Cui, S.5
-
11
-
-
33847353721
-
Secret communication in presence of colluding eavesdroppers
-
S. Goel and R. Negi, "Secret communication in presence of colluding eavesdroppers," in Proc. Military Commun. Conf., Oct. 2005, pp. 1501-1506.
-
Proc. Military Commun. Conf., Oct. 2005
, pp. 1501-1506
-
-
Goel, S.1
Negi, R.2
-
12
-
-
70449514539
-
Wireless physical-layer security: The case of colluding eavesdroppers
-
P. C. Pinto, J. O. Barros, and M. Z.Win, "Wireless physical-layer security: The case of colluding eavesdroppers," in Proc. IEEE Int. Symp. on Inf. Theory, Seoul, South Korea, July 2009, pp. 2442-2446.
-
Proc. IEEE Int. Symp. on Inf. Theory, Seoul, South Korea, July 2009
, pp. 2442-2446
-
-
Pinto, P.C.1
Barros, J.O.2
Win, M.Z.3
-
13
-
-
52349113391
-
Secrecy in cooperative relay broadcast channels
-
E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," in Proc. IEEE Int. Symp. on Inf. Theory, Toronto, ON, July 2008, pp. 2217-2221.
-
Proc. IEEE Int. Symp. on Inf. Theory, Toronto, ON, July 2008
, pp. 2217-2221
-
-
Ekrem, E.1
Ulukus, S.2
-
14
-
-
33749450172
-
Secrecy capacity of SIMO and slow fading channels
-
P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. on Inf. Theory, Adelaide, Australia, Sept. 2005, pp. 2152-2155.
-
Proc. IEEE Int. Symp. on Inf. Theory, Adelaide, Australia, Sept. 2005
, pp. 2152-2155
-
-
Parada, P.1
Blahut, R.2
-
16
-
-
84940654702
-
Secrecy capacity of independent parallel channels
-
Sept.
-
Z. Li, R. Yates, and W. Trappe, "Secrecy capacity of independent parallel channels," Proc. Annu. Allerton Conf. Communication, Control and Computing, pp. 841-848, Sept. 2006.
-
(2006)
Proc. Annu. Allerton Conf. Communication, Control and Computing
, pp. 841-848
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
17
-
-
45249104850
-
Wireless information-theoretic security
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
18
-
-
45249119255
-
Secure communication over fading channels
-
June
-
Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, pp. 2470-2492, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
19
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Eurocrypt 2000
-
U. Maurer and S.Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," Eurocrypt 2000, Lecture Notes in Computer Science, vol. 1807, pp. 351+, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
-
-
Maurer, U.1
Wolf, S.2
-
20
-
-
85164902010
-
Strong secrecy for wireless channels
-
J. Barros and M. Bloch, "Strong secrecy for wireless channels," in Proc. International Conf. on Inf. Theor. Security, Calgary, Canada, Aug. 2008.
-
Proc. International Conf. on Inf. Theor. Security, Calgary, Canada, Aug. 2008
-
-
Barros, J.1
Bloch, M.2
-
21
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
22
-
-
0027629488
-
Common randomness in information theory and cryptography - Part I: Secret sharing
-
July
-
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography - Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
23
-
-
0029405656
-
Generalized privacy amplification
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
24
-
-
0033097504
-
Unconditionally secure key agreement and intrinsic conditional information
-
March
-
U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and intrinsic conditional information," IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499-514, March 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.2
, pp. 499-514
-
-
Maurer, U.M.1
Wolf, S.2
-
25
-
-
39049151282
-
LDPC-based secret key agreement over the gaussian wiretap channel
-
M. Bloch, A. Thangaraj, S. W. McLaughlin, and J.-M. Merolla, "LDPC-based secret key agreement over the gaussian wiretap channel," in Proc. IEEE Int. Symp. on Inf. Theory, Seattle, USA, 2006.
-
Proc. IEEE Int. Symp. on Inf. Theory, Seattle, USA, 2006
-
-
Bloch, M.1
Thangaraj, A.2
McLaughlin, S.W.3
Merolla, J.-M.4
-
26
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
Aug.
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J.-M. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
27
-
-
45249114841
-
Secure nested codes for type II wiretap channels
-
R. Liu, Y. Liang, H. V. Poor, and P. Spasojevic, "Secure nested codes for type II wiretap channels," in Proc. IEEE Inf. Theory Workshop, Tahoe City, CA, Sept. 2007, pp. 337-342.
-
Proc. IEEE Inf. Theory Workshop, Tahoe City, CA, Sept. 2007
, pp. 337-342
-
-
Liu, R.1
Liang, Y.2
Poor, H.V.3
Spasojevic, P.4
-
28
-
-
33747886952
-
Secret key agreement from correlated source outputs using low density parity check matrices
-
July
-
J. Muramatsu, "Secret key agreement from correlated source outputs using low density parity check matrices," IEICE Trans. on Fund. of Elec. Comm. Comp., vol. E89-A, no. 7, pp. 2036-2046, July 2006.
-
(2006)
IEICE Trans. on Fund. of Elec. Comm. Comp.
, vol.E89-A
, Issue.7
, pp. 2036-2046
-
-
Muramatsu, J.1
-
30
-
-
62949215603
-
Physical-layer security in stochastic wireless networks
-
P. C. Pinto, J. O. Barros, and M. Z. Win, "Physical-layer security in stochastic wireless networks," in Proc. IEEE Int. Conf. on Commun. Systems, Guangzhou, China, Nov. 2008, pp. 974-979.
-
Proc. IEEE Int. Conf. on Commun. Systems, Guangzhou, China, Nov. 2008
, pp. 974-979
-
-
Pinto, P.C.1
Barros, J.O.2
Win, M.Z.3
-
31
-
-
79951679076
-
Secure communication in stochastic wireless networks
-
submitted for publication, preprint available on arXiv:1001.3697
-
-, "Secure communication in stochastic wireless networks," IEEE Trans. Inf. Theory, pp. 1-59, 2009, submitted for publication, preprint available on arXiv:1001.3697.
-
(2009)
IEEE Trans. Inf. Theory
, pp. 1-59
-
-
Pinto, P.C.1
Barros, J.O.2
Win, M.Z.3
-
32
-
-
70449514137
-
Secrecy throughput of MANETs with malicious nodes
-
Y. Liang, H. V. Poor, and L. Ying, "Secrecy throughput of MANETs with malicious nodes," in Proc. IEEE Int. Symp. on Inf. Theory, June 2009, pp. 1189-1193.
-
Proc. IEEE Int. Symp. on Inf. Theory, June 2009
, pp. 1189-1193
-
-
Liang, Y.1
Poor, H.V.2
Ying, L.3
-
33
-
-
77952682796
-
On secrecy capacity scaling in wireless networks
-
O. O. Koyluoglu, C. E. Koksal, and H. E. Gamal, "On secrecy capacity scaling in wireless networks," in Inf. Theory and Applications Workshop, San Diego, CA, Feb. 2010, pp. 1-4.
-
Inf. Theory and Applications Workshop, San Diego, CA, Feb. 2010
, pp. 1-4
-
-
Koyluoglu, O.O.1
Koksal, C.E.2
Gamal, H.E.3
-
34
-
-
78651282802
-
Continuum percolation in the intrinsically secure communications graph
-
P. C. Pinto and M. Z. Win, "Continuum percolation in the intrinsically secure communications graph," in Proc. IEEE Int. Symp. on Inf. Theory and Its Applications, Taichung, Taiwan, Oct. 2010, pp. 1-6.
-
Proc. IEEE Int. Symp. on Inf. Theory and Its Applications, Taichung, Taiwan, Oct. 2010
, pp. 1-6
-
-
Pinto, P.C.1
Win, M.Z.2
-
36
-
-
79957978453
-
Stochastic geometry and random graphs for the analysis and design of wireless networks
-
M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, "Stochastic geometry and random graphs for the analysis and design of wireless networks," IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029-1046, 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.7
, pp. 1029-1046
-
-
Haenggi, M.1
Andrews, J.G.2
Baccelli, F.3
Dousse, O.4
Franceschetti, M.5
|