-
1
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inform. Theory, vol. 54, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
2
-
-
45249119255
-
Secure communication over fading channels
-
June
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Trans. Inform. Theory, vol. 54, pp. 2470-2492, June 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
3
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
Sept.
-
R. Wilson, D. Tse, and R. A. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Trans. Inform. Forensics and Security, vol. 2, pp. 364-375, Sept. 2007.
-
(2007)
IEEE Trans. Inform. Forensics and Security
, vol.2
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.A.3
-
4
-
-
0027629488
-
Common randomness in information theory and cryptography, Part I: Secret sharing
-
July
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part I: Secret sharing," IEEE Trans. Inform. Theory, vol. 39, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
5
-
-
76249088301
-
A unified framework for key agreement over wireless fading channels
-
L. Lai and H. V. Poor, "A unified framework for key agreement over wireless fading channels," in Proc. IEEE Inform. Theory Workshop, (Taormina, Sicily, Italy), Oct. 2009.
-
Proc. IEEE Inform. Theory Workshop, (Taormina, Sicily, Italy), Oct. 2009
-
-
Lai, L.1
Poor, H.V.2
-
6
-
-
0037396695
-
Secret key agreement over a non-authenticated channel - Part I: Definitions and bounds
-
Apr.
-
U. M. Maurer and S. Wolf, "Secret key agreement over a non-authenticated channel - Part I: Definitions and bounds," IEEE Trans. Inform. Theory, vol. 49, pp. 822-831, Apr. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, pp. 822-831
-
-
Maurer, U.M.1
Wolf, S.2
-
7
-
-
0037399113
-
Secret key agreement over a non-authenticated channel - Part II: The simulatability condition
-
Apr.
-
U. M. Maurer and S. Wolf, "Secret key agreement over a non-authenticated channel - Part II: The simulatability condition," IEEE Trans. Inform. Theory, vol. 49, pp. 832-838, Apr. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, pp. 832-838
-
-
Maurer, U.M.1
Wolf, S.2
-
8
-
-
0037396951
-
Secret key agreement over a non-authenticated channel - Part III: Privacy amplification
-
Apr.
-
U. M. Maurer and S. Wolf, "Secret key agreement over a non-authenticated channel - Part III: Privacy amplification," IEEE Trans. Inform. Theory, vol. 49, pp. 839-851, Apr. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, pp. 839-851
-
-
Maurer, U.M.1
Wolf, S.2
-
9
-
-
0023310427
-
Gaussian arbitrarily varying channels
-
Mar.
-
B. Hughes and P. Narayan, "Gaussian arbitrarily varying channels," IEEE Trans. Inform. Theory, vol. 33, pp. 267-284, Mar. 1987.
-
(1987)
IEEE Trans. Inform. Theory
, vol.33
, pp. 267-284
-
-
Hughes, B.1
Narayan, P.2
-
10
-
-
0026055468
-
Capacity of the Gaussian arbitrarily varying channel
-
Jan.
-
I. Csiszar and P. Narayan, "Capacity of the Gaussian arbitrarily varying channel," IEEE Trans. Inform. Theory, vol. 37, pp. 18-26, Jan. 1991.
-
(1991)
IEEE Trans. Inform. Theory
, vol.37
, pp. 18-26
-
-
Csiszar, I.1
Narayan, P.2
-
11
-
-
0020497622
-
The Gaussian test channel with an intelligent jammer
-
Jan.
-
T. Basar, "The Gaussian test channel with an intelligent jammer," IEEE Trans. Inform. Theory, vol. 29, pp. 152-157, Jan. 1983.
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, pp. 152-157
-
-
Basar, T.1
-
12
-
-
4143137728
-
Capacity of correlated jamming channels
-
M. Medard, "Capacity of correlated jamming channels," in Proc. Allerton Conf. on Communication, Control, and Computing, (Monticello, IL.), Sept. 1997.
-
Proc. Allerton Conf. on Communication, Control, and Computing, (Monticello, IL.), Sept. 1997
-
-
Medard, M.1
-
13
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
Mar.
-
I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inform. Theory, vol. 46, pp. 344-366, Mar. 2000.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, pp. 344-366
-
-
Csiszár, I.1
Narayan, P.2
-
14
-
-
4544354908
-
Correlated jamming on MIMO Gaussian fading channels
-
Sept.
-
A. Kashyap, T. Basar, and R. Srikant, "Correlated jamming on MIMO Gaussian fading channels," IEEE Trans. Inform. Theory, vol. 50, pp. 2119-2123, Sept. 2004.
-
(2004)
IEEE Trans. Inform. Theory
, vol.50
, pp. 2119-2123
-
-
Kashyap, A.1
Basar, T.2
Srikant, R.3
-
15
-
-
0034188649
-
The effect upon channel capacity in wireless communications of perfect and imperfect knowledge of the channel
-
May
-
M. Médard, "The effect upon channel capacity in wireless communications of perfect and imperfect knowledge of the channel," IEEE Trans. Inform. Theory, vol. 46, pp. 933-946, May 2000.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, pp. 933-946
-
-
Médard, M.1
-
16
-
-
0037399093
-
How much training is needed in multiple-antenna wireless links?
-
Apr.
-
B. Hassibi and B. M. Hochwald, "How much training is needed in multiple-antenna wireless links?," IEEE Trans. Inform. Theory, vol. 49, pp. 951-963, Apr. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, pp. 951-963
-
-
Hassibi, B.1
Hochwald, B.M.2
|