-
1
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D.Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
3
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul.
-
S. K. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.2
-
4
-
-
0016549557
-
A case where interference does not reduce capacity
-
Sep.
-
A. Carleial, "A case where interference does not reduce capacity," IEEE Trans. Inf. Theory, vol. IT-21, no. 5, pp. 569-570, Sep. 1975.
-
(1975)
IEEE Trans. Inf. Theory
, vol.IT-21
, Issue.5
, pp. 569-570
-
-
Carleial, A.1
-
5
-
-
0019635833
-
Capacity of the gaussian interference channel under strong interference
-
H. Sato, "The capacity of the Gaussian interference channel under strong interference," IEEE Trans. Inf. Theory, vol. 27, no. 6, pp. 786-788, Nov. 1981. (Pubitemid 12447680)
-
(1981)
IEEE Transactions on Information Theory
, vol.IT-27
, Issue.6
, pp. 786-788
-
-
Sato, H.1
-
6
-
-
0019437605
-
New achievable rate region for the interference channel
-
T. Han and K. Kobayashi, "A new achievable rate region for the interference channel," IEEE Trans. Inf. Theory, vol. IT-27, no. 1, pp. 49-60, Jan. 1981. (Pubitemid 11481232)
-
(1981)
IEEE Transactions on Information Theory
, vol.IT-27
, Issue.1
, pp. 49-60
-
-
Han, T.S.1
Kobayashi, K.2
-
7
-
-
0018018359
-
On degraded Gaussian two-user channels
-
Sep.
-
H. Sato, "On degraded Gaussian two-user channels," IEEE Trans. Inf. Theory, vol. IT-24, no. 5, pp. 634-640, Sep. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.5
, pp. 634-640
-
-
Sato, H.1
-
8
-
-
0022114955
-
On the Gaussian interference channel
-
Sep.
-
M. H. M. Costa, "On the Gaussian interference channel," IEEE Trans. Inf. Theory, vol. IT-31, no. 5, pp. 607-615, Sep. 1985.
-
(1985)
IEEE Trans. Inf. Theory
, vol.IT-31
, Issue.5
, pp. 607-615
-
-
Costa, M.H.M.1
-
9
-
-
1842533560
-
Outer bounds on the capacity of Gaussian interference channels
-
Mar.
-
G. Kramer, "Outer bounds on the capacity of Gaussian interference channels," IEEE Trans. Inf. Theory, vol. 50, no. 3, pp. 581-586, Mar. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.3
, pp. 581-586
-
-
Kramer, G.1
-
10
-
-
57349111149
-
Gaussian interference channel capacity to within one bit
-
Dec.
-
R. H. Etkin, D. N. C. Tse, and H.Wang, "Gaussian interference channel capacity to within one bit," IEEE Trans. Inf. Theory, vol. 54, no. 12, pp. 5534-5562, Dec. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.12
, pp. 5534-5562
-
-
Etkin, R.H.1
Tse, D.N.C.2
Wang, H.3
-
11
-
-
61349158670
-
Capacity bounds for the Gaussian interference channel
-
Feb.
-
A. S. Motahari and A. K. Khandni, "Capacity bounds for the Gaussian interference channel," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 620-643, Feb. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.2
, pp. 620-643
-
-
Motahari, A.S.1
Khandni, A.K.2
-
12
-
-
52949138283
-
Sum capacity of the Gaussian interference channel in the low interference regime
-
presented at the, La Jolla, CA, Jan.
-
V. Annapureddy and V. Veeravalli, "Sum capacity of the Gaussian interference channel in the low interference regime," presented at the ITA Workshop, La Jolla, CA, Jan. 2008.
-
(2008)
ITA Workshop
-
-
Annapureddy, V.1
Veeravalli, V.2
-
13
-
-
61349193242
-
A new outer bound and the noisy-interference sum-rate capacity for Gaussian interference channels
-
Feb.
-
X. Shang, G. Kramer, and B. Chen, "A new outer bound and the noisy-interference sum-rate capacity for Gaussian interference channels," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 689-699, Feb. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.2
, pp. 689-699
-
-
Shang, X.1
Kramer, G.2
Chen, B.3
-
14
-
-
45249090083
-
Discrete memoryless interference and broadcast channels with confidential messages: Secrecy capacity regions
-
Jun.
-
R. Liu, I. Maric, P. Spasojević, and R. Yates, "Discrete memoryless interference and broadcast channels with confidential messages: Secrecy capacity regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2493-2507
-
-
Liu, R.1
Maric, I.2
Spasojević, P.3
Yates, R.4
-
15
-
-
61349186445
-
Capacity of cognitive interference channels with and without secrecy
-
Feb.
-
Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai (Shitz), and S. Verdú, "Capacity of cognitive interference channels with and without secrecy," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 604-619, Feb. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.2
, pp. 604-619
-
-
Liang, Y.1
Somekh-Baruch, A.2
Poor, H.V.3
Shamai, S.4
Verdú, S.5
-
16
-
-
52349084570
-
Secrecy capacity region of a class of one-sided interference channel
-
Toronto, ON, Canada, Jul.
-
Z. Li, R. D.Yates, and W. Trappe, "Secrecy capacity region of a class of one-sided interference channel," in Proc. IEEE Int. Symp. Inf. Theory, Toronto, ON, Canada, Jul. 2008, pp. 379-383.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 379-383
-
-
Li, Z.1
Yates, R.D.2
Trappe, W.3
-
17
-
-
52349106158
-
Secret communication on interference channels
-
Toronto, ON, Canada, Jul.
-
R. Yates, D. Tse, and Z. Li, "Secret communication on interference channels," in Proc. IEEE Int. Symp. Inf. Theory, Toronto, ON, Canada, Jul. 2008, pp. 374-378.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 374-378
-
-
Yates, R.1
Tse, D.2
Li, Z.3
-
18
-
-
77950642359
-
Interference alignment for secrecy
-
To be published
-
O. Koyluoglu, H. El Gamal, L. Lai, and H. V. Poor, "Interference alignment for secrecy," IEEE Trans. Inf. Theory, to be published.
-
IEEE Trans. Inf. Theory
-
-
Koyluoglu, Z.O.1
El Gamal, H.2
Lai, L.3
Poor, H.V.4
-
19
-
-
45849133457
-
Guaranteeing secrecy using artifical noise
-
S. Goel and R. Negi, "Guaranteeing secrecy using artifical noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
20
-
-
40949147785
-
Multiple-access channels with confidential messages
-
DOI 10.1109/TIT.2007.915978
-
Y. Liang and H. V. Poor, "Multiple access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008. (Pubitemid 351410914)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.3
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
21
-
-
39049089566
-
The discrete memoryless multiple access channel with confidential messages
-
presented at the, Seattle, WA, Jul.
-
R. Liu, I. Maric, R. Yates, and P. Spasojević, "The discrete memoryless multiple access channel with confidential messages," presented at the IEEE Int. Symp. Inf. Theory, Seattle, WA, Jul. 2006.
-
(2006)
IEEEi Int. Symp. Inf. Theory
-
-
Liu, R.1
Maric, I.2
Yates, R.3
Spasojević, P.4
-
22
-
-
45249101530
-
The general Gaussian multiple-access and two-way wire-tap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wire-tap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
23
-
-
46749102916
-
Multiple access channels with generalized feedback and confidential messages
-
presented at the, Lake Tahoe, CA, Sep.
-
X. Tang, R. Liu, P. Spasojević, and H. V. Poor, "Multiple access channels with generalized feedback and confidential messages," presented at the IEEE Inf. Theory Workshop, Lake Tahoe, CA, Sep. 2007.
-
(2007)
IEEEi Inf. Theory Workshop
-
-
Tang, X.1
Liu, R.2
Spasojević, P.3
Poor, H.V.4
-
24
-
-
84938932265
-
Coding for relay channels with confidential messages
-
Cairns, Australia, Sep.
-
Y. Oohama, "Coding for relay channels with confidential messages," in Proc. IEEE Inf. Theory Workshop, Cairns, Australia, Sep. 2001, pp. 87-89.
-
(2001)
Proc. IEEE Inf. Theory Workshop
, pp. 87-89
-
-
Oohama, Y.1
-
25
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
26
-
-
44049106294
-
The relay channel with a wire-tapper
-
presented at the, Baltimore, MD, Mar.
-
M. Yuksel and E. Erkip, "The relay channel with a wire-tapper," presented at the 41st Annu. Conf. Inf. Sci. Syst., Baltimore, MD, Mar. 2007.
-
(2007)
41st Annu. Conf. Inf. Sci. Syst.
-
-
Yuksel, M.1
Erkip, E.2
-
27
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Information theoretic security," Found. Trends Commun. Inf. Theory, vol. 5, no. 4-5, pp. 355-580, 2008.
-
(2008)
Found. Trends Commun. Inf. Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
29
-
-
79951955741
-
Providing secrecy with structured codes: Tools and applications to two-user Gaussian channels
-
submitted for publication
-
X. He and A. Yener, "Providing secrecy with structured codes: Tools and applications to two-user Gaussian channels," IEEE Trans. Inf. Theory, 2009, submitted for publication.
-
(2009)
IEEE Trans. Inf. Theory
-
-
He, X.1
Yener, A.2
-
30
-
-
34447344072
-
Generalized entropy power inequalities and monotonicity properties of information
-
DOI 10.1109/TIT.2007.899484
-
M. Madiman and A. Barron, "Generalized entropy power inequalities and monotonicity properties of information," IEEE Trans. Inf. Theory, vol. 53, no. 7, pp. 2317-2329, Jul. 2007. (Pubitemid 47061898)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.7
, pp. 2317-2329
-
-
Madiman, M.1
Barron, A.2
|