메뉴 건너뛰기




Volumn , Issue , 2010, Pages 1228-1235

Providing secrecy when the eavesdropper channel is arbitrarily varying: A case for multiple antennas

Author keywords

[No Author keywords available]

Indexed keywords

CHANNEL STATE; COMPOUND CHANNEL; CONFIDENTIAL MESSAGE; DEGREES OF FREEDOM; MULTIPLE ANTENNA; SECURE COMMUNICATIONS; UNIVERSAL CODING; WIRETAP CHANNEL; WORST CASE SCENARIO;

EID: 79952383608     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ALLERTON.2010.5707054     Document Type: Conference Paper
Times cited : (17)

References (23)
  • 1
    • 84890522850 scopus 로고
    • Communication Theory of Secrecy Systems
    • September
    • C. E. Shannon. Communication Theory of Secrecy Systems. Bell System Technical Journal, 28(4):656-715, September 1949.
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 5
    • 45249101530 scopus 로고    scopus 로고
    • The General Gaussian Multiple Access and Two-Way Wire-Tap Channels: Achievable Rates and Cooperative Jamming
    • June
    • E. Tekin and A. Yener. The General Gaussian Multiple Access and Two-Way Wire-Tap Channels: Achievable Rates and Cooperative Jamming. IEEE Transactions on Information Theory, 54(6):2735-2751, June 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 6
    • 45249090083 scopus 로고    scopus 로고
    • Discrete Memoryless Interference and Broadcast Channels with Confidential Messages: Secrecy Rate Regions
    • June
    • R. Liu, I. Maric, P. Spasojevic, and R. D. Yates. Discrete Memoryless Interference and Broadcast Channels with Confidential Messages: Secrecy Rate Regions. IEEE Transactions on Information Theory, 54(6):2493-2507, June 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.6 , pp. 2493-2507
    • Liu, R.1    Maric, I.2    Spasojevic, P.3    Yates, R.D.4
  • 7
    • 70449503892 scopus 로고    scopus 로고
    • The Secrecy Capacity Region of the Gaussian MIMO Multi-receiver Wiretap Channel
    • Submitted to March available online at
    • E. Ekrem and S. Ulukus. The Secrecy Capacity Region of the Gaussian MIMO Multi-receiver Wiretap Channel. Submitted to IEEE Transactions on Information Theory, March 2009, available online at http://arxiv.org/abs/0903.3096.
    • (2009) IEEE Transactions on Information Theory
    • Ekrem, E.1    Ulukus, S.2
  • 8
    • 77952769363 scopus 로고    scopus 로고
    • Multiple-Input Multiple-Output Gaussian Broadcast Channels with Confidential Messages
    • Submitted to March available online at
    • R. Liu, T. Liu, H. V. Poor, and S. Shamai. Multiple-Input Multiple-Output Gaussian Broadcast Channels with Confidential Messages. Submitted to IEEE Transactions on Information Theory, March 2009. available online at http://arxiv.org/abs/0903.3786.
    • (2009) IEEE Transactions on Information Theory
    • Liu, R.1    Liu, T.2    Poor, H.V.3    Shamai, S.4
  • 9
    • 52349111390 scopus 로고    scopus 로고
    • Secure Transmission with Multiple Antennas-I: The MISOME Wiretap Channel
    • to appear in submitted in August, available online at
    • A. Khisti and G. Wornell. Secure Transmission with Multiple Antennas-I: The MISOME Wiretap Channel. to appear in IEEE Transactions on Information Theory, submitted in August, 2007. available online at http://arxiv.org/abs/ 0708.4219.
    • (2007) IEEE Transactions on Information Theory
    • Khisti, A.1    Wornell, G.2
  • 10
    • 69449086815 scopus 로고    scopus 로고
    • Towards the Secrecy Capacity of the Gaussian MIMO Wire-tap Channel: The 2-2-1 Channel
    • September
    • S. Shafiee, N. Liu, and S. Ulukus. Towards the Secrecy Capacity of the Gaussian MIMO Wire-tap Channel: The 2-2-1 Channel. IEEE Transactions on Information Theory, 55(9):4033-4039, September 2009.
    • (2009) IEEE Transactions on Information Theory , vol.55 , Issue.9 , pp. 4033-4039
    • Shafiee, S.1    Liu, N.2    Ulukus, S.3
  • 16
  • 18
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic Key Agreement: From Weak to Strong Secrecy for Free
    • U. Maurer and S. Wolf. Information-theoretic Key Agreement: From Weak to Strong Secrecy for Free. Lecture Notes in Computer Science, pages 351-368, 2000.
    • (2000) Lecture Notes in Computer Science , pp. 351-368
    • Maurer, U.1    Wolf, S.2
  • 20
    • 0028384933 scopus 로고
    • On coding without restrictions for the AWGN channel
    • G. Poltyrev. On coding without restrictions for the AWGN channel. IEEE Transactions on Information Theory, 40(2):409-417, 1994.
    • (1994) IEEE Transactions on Information Theory , vol.40 , Issue.2 , pp. 409-417
    • Poltyrev, G.1
  • 21
    • 0000095922 scopus 로고
    • Elimination of correlation in random codes for arbitrarily varying channels
    • R. Ahlswede. Elimination of correlation in random codes for arbitrarily varying channels. Probability Theory and Related Fields, 44(2):159-175, 1978.
    • (1978) Probability Theory and Related Fields , vol.44 , Issue.2 , pp. 159-175
    • Ahlswede, R.1
  • 22
    • 84880528176 scopus 로고    scopus 로고
    • MIMO Wiretap Channels with Arbitrarily Varying Eavesdropper Channel States
    • Submitted to the July, available online at
    • X. He and A. Yener. MIMO Wiretap Channels with Arbitrarily Varying Eavesdropper Channel States. Submitted to the IEEE Transactions on Information Theory, July, 2010, available online at http://arxiv.org/abs/1007.4801.
    • (2010) IEEE Transactions on Information Theory
    • He, X.1    Yener, A.2
  • 23
    • 0029706655 scopus 로고    scopus 로고
    • Almost Independence and Secrecy Capacity
    • I. Csiszár. Almost Independence and Secrecy Capacity. Problems of Information Transmission, 32(1):48-57, 1996.
    • (1996) Problems of Information Transmission , vol.32 , Issue.1 , pp. 48-57
    • Csiszár, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.