-
1
-
-
0016562514
-
The wiretap channel
-
A. D. Wyner, "The wiretap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
0017973511
-
Broadcast channels with confidential messages
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
3
-
-
0017996501
-
Gaussian wiretap channel
-
July
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "Gaussian wiretap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July, 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
4
-
-
45249092485
-
Secure broadcasting over fading channels
-
Jun.
-
A. Khisti, A. Tchamkerten, and G. W. Wornell, "Secure broadcasting over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
-
-
Khisti, A.1
Tchamkerten, A.2
Wornell, G.W.3
-
5
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
6
-
-
45249119255
-
Secure communication over fading channels
-
Jun.
-
Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
7
-
-
69449086815
-
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel
-
Sep.
-
S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4033-4039, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.9
, pp. 4033-4039
-
-
Shafiee, S.1
Liu, N.2
Ulukus, S.3
-
8
-
-
77953802876
-
Secure transmission with multiple antennas I: The MISOME wiretap channe
-
July
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channe," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, July 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
9
-
-
51849141978
-
The secrecy capacity of the MIMO wiretap channel
-
submitted to Oct. Also available at [arXiv:0710.1920]
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," submitted to IEEE Trans. Inf. Theory, Oct. 2007. Also available at [arXiv:0710.1920].
-
(2007)
IEEE Trans. Inf. Theory
-
-
Oggier, F.1
Hassibi, B.2
-
10
-
-
66949180834
-
A note on the secrecy capacity of the multiantenna wiretap channel
-
Jun.
-
T. Liu and S. S. (Shitz), "A note on the secrecy capacity of the multiantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shitz, S.S.2
-
11
-
-
62749109096
-
Secrecy capacity region of a multiple-antenna Gaussian broadcast channel with confidential messages
-
Mar.
-
R. Liu and H. V. Poor, "Secrecy capacity region of a multiple-antenna Gaussian broadcast channel with confidential messages," IEEE Trans. Inf. Theory, vol. 55, no. 3, pp. 1235-1249, Mar. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.3
, pp. 1235-1249
-
-
Liu, R.1
Poor, H.V.2
-
12
-
-
77950269477
-
A vector generalization of Costa's entropy-power inequality with applications
-
April
-
R. Liu, T. Liu, H. V. Poor, and S. S. (Shitz), "A vector generalization of Costa's entropy-power inequality with applications," IEEE Trans. Inf. Theory, vol. 56, no. 4, pp. 1865-1879, April 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.4
, pp. 1865-1879
-
-
Liu, R.1
Liu, T.2
Poor, H.V.3
Shitz, S.S.4
-
13
-
-
84888076958
-
The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel
-
to appear. Also available at [arXiv:0903.3096]
-
E. Ekrem and S. Ulukus, "The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel," IEEE Trans. Inf. Theory, to appear. Also available at [arXiv:0903.3096].
-
IEEE Trans. Inf. Theory
-
-
Ekrem, E.1
Ulukus, S.2
-
14
-
-
77952712169
-
Compound wiretap channels
-
Dec.
-
Y. Liang, G. Kramer, H. V. Poor, and S. S. (Shitz), "Compound wiretap channels," EURASIP Journal on Wireless Communications and Networking, Special Issue on Wireless Physical Layer Security, Dec. 2008.
-
(2008)
EURASIP Journal on Wireless Communications and Networking, Special Issue on Wireless Physical Layer Security
-
-
Liang, Y.1
Kramer, G.2
Poor, H.V.3
Shitz, S.S.4
-
15
-
-
77952739833
-
Degraded compound multi-receiver wiretap channels
-
submitted to Oct. Also available at [arXiv:0910.3033]
-
E. Ekrem and S. Ulukus, "Degraded compound multi-receiver wiretap channels," submitted to IEEE Trans. Inf. Theory, Oct. 2009. Also available at [arXiv:0910.3033].
-
(2009)
IEEE Trans. Inf. Theory
-
-
Ekrem, E.1
Ulukus, S.2
-
16
-
-
77955666122
-
Interference alignment for the multi-antenna compound wiretap channel
-
submitted to Mar. Also available at [arXiv:1002.4548]
-
A. Khisti, "Interference alignment for the multi-antenna compound wiretap channel," submitted to IEEE Trans. Inf. Theory, Mar. 2010. Also available at [arXiv:1002.4548].
-
(2010)
IEEE Trans. Inf. Theory
-
-
Khisti, A.1
-
17
-
-
77953864343
-
Real interference alignment with real numbers
-
submitted to Aug. Also available at [arXiv:0908.1208]
-
A. S. Motahari, S. Oveis-Gharan, and A. K. Khandani, "Real interference alignment with real numbers," submitted to IEEE Trans. Inf. Theory, Aug. 2009. Also available at [arXiv:0908.1208].
-
(2009)
IEEE Trans. Inf. Theory
-
-
Motahari, A.S.1
Oveis-Gharan, S.2
Khandani, A.K.3
-
18
-
-
78649258308
-
Real interference alignment: Exploiting the potential of single antenna systems
-
submitted to Nov. Also available at [arXiv:0908.2282]
-
A. S. Motahari, S. Oveis-Gharan, M. A. Maddah-Ali, and A. K. Khandani, "Real interference alignment: Exploiting the potential of single antenna systems," submitted to IEEE Trans. Inf. Theory, Nov. 2009. Also available at [arXiv:0908.2282].
-
(2009)
IEEE Trans. Inf. Theory
-
-
Motahari, A.S.1
Oveis-Gharan, S.2
Maddah-Ali, M.A.3
Khandani, A.K.4
-
19
-
-
48849113556
-
Interference alignment and degrees of freedom of the k-user interference channel
-
V. R. Cadambe and S. A. Jafar, "Interference alignment and degrees of freedom of the k-user interference channel," IEEE Trans. Inf. Theory, vol. 54, no. 8, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.8
-
-
Cadambe, V.R.1
Jafar, S.A.2
-
20
-
-
70449491193
-
Ergodic interference alignment
-
B. Nazer, S. A. Jafar, M. Gastpar, and S. Vishwanath, "Ergodic interference alignment," IEEE International Symposium on Information Theory, 2009.
-
IEEE International Symposium on Information Theory, 2009
-
-
Nazer, B.1
Jafar, S.A.2
Gastpar, M.3
Vishwanath, S.4
-
21
-
-
48849083691
-
Communication over MIMO X channels: Interference alignment, decomposition, and performance analysis
-
Aug.
-
M. A. Maddah-Ali, A. S. Motahari, and A. K. Khandani, "Communication over MIMO X channels: Interference alignment, decomposition, and performance analysis," IEEE Trans. Inf. Theory, vol. 54, no. 8, Aug. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.8
-
-
Maddah-Ali, M.A.1
Motahari, A.S.2
Khandani, A.K.3
-
22
-
-
77950675119
-
On the Degrees-of-Freedom of the K-user Gaussian interference channel
-
submitted to Jun. Also available at [arXiv:0901.1695]
-
R. Etkin and E. Ordentlich, "On the Degrees-of-Freedom of the K-user Gaussian interference channel," submitted to IEEE Trans. Inf. Theory, Jun. 2008. Also available at [arXiv:0901.1695].
-
(2008)
IEEE Trans. Inf. Theory
-
-
Etkin, R.1
Ordentlich, E.2
-
23
-
-
64549088012
-
On the secure Degrees of Freedom of wireless X networks
-
Sept.
-
T. Gao and S. A. Jafar, "On the secure Degrees of Freedom of wireless X networks," In 46th Annual Allerton Conference on Communication, Control and Computing, UIUC, IL, pp. 826-833, Sept. 2008.
-
(2008)
46th Annual Allerton Conference on Communication, Control and Computing, UIUC, IL
, pp. 826-833
-
-
Gao, T.1
Jafar, S.A.2
-
24
-
-
77950642359
-
Interference alignment for secrecy
-
submitted to Oct. Also available at [arXiv:0810.1187]
-
O. O. Koyluoglu, H. El Gamal, L. Lai, and H. V. Poor, "Interference alignment for secrecy," submitted to IEEE Trans. Inf. Theory, Oct. 2008. Also available at [arXiv:0810.1187].
-
(2008)
IEEE Trans. Inf. Theory
-
-
Koyluoglu, O.O.1
El Gamal, H.2
Lai, L.3
Poor, H.V.4
-
26
-
-
77951565555
-
Secure degrees of freedom for Gaussian channels with interference: Structured codes outperform Gaussian signaling
-
X. He and A. Yener, "Secure degrees of freedom for Gaussian channels with interference: Structured codes outperform Gaussian signaling," IEEE Global Telecommunications Conference, 2009.
-
IEEE Global Telecommunications Conference, 2009
-
-
He, X.1
Yener, A.2
-
27
-
-
79951955741
-
Providing secrecy with structured codes: Tools and applications to two-user gaussian channels
-
submitted to Jul. Also available at [arXiv:0907.5388]
-
-, "Providing secrecy with structured codes: Tools and applications to two-user gaussian channels," submitted to IEEE Trans. Inf. Theory, Jul. 2009. Also available at [arXiv:0907.5388].
-
(2009)
IEEE Trans. Inf. Theory
-
-
He, X.1
Yener, A.2
|