-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 29, pp. 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.29
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
October
-
A. D. Wyner, "The Wire-Tap Channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1367, October 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1367
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
I. Csiszár and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Korner, J.2
-
4
-
-
0017996501
-
The gaussian wire-tap channel
-
July
-
S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
-
5
-
-
0347337828
-
Secure space-time communication
-
Dec.
-
A. Hero, "Secure space-time communication," IEEE Transactions on Information, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
-
(2003)
IEEE Transactions on Information
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero, A.1
-
6
-
-
84931425598
-
Secret communication using artificial noise
-
Dallas TX Sept.
-
R. Negi and S. Goel, "Secret communication using artificial noise," in Proc. IEEE Vehicular Technology Conference, vol. 3, Dallas, TX, Sept. 2005, pp. 1906-1910.
-
(2005)
Proc. IEEE Vehicular Technology Conference
, vol.3
, pp. 1906-1910
-
-
Negi, R.1
Goel, S.2
-
7
-
-
70449503892
-
Secrecy capacity region of the gaussian multireceiver wiretap channel
-
Seoul Korea June
-
E. Ekrem and S. Ulukus, "Secrecy capacity region of the gaussian multireceiver wiretap channel," in Proc. IEEE Int. Symp. on Inf. Theory, Seoul, Korea, June 2009, pp. 2612-2616.
-
(2009)
Proc.IEEE Int. Symp. on Inf. Theory
, pp. 2612-2616
-
-
Ekrem, E.1
Ulukus, S.2
-
8
-
-
66949180834
-
A note on the secrecy capacity of the multipleantenna wiretap channel
-
June
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, June 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
9
-
-
70350706020
-
The capacity region of the degraded multiple-input multiple-output compound broadcast channel
-
Nov.
-
H. Weingarten, T. Liu, S. Shamai, Y. Steinberg, and P. Viswanath, "The capacity region of the degraded multiple-input multiple-output compound broadcast channel," IEEE Trans. Inf. Theory, vol. 55, no. 11, pp. 5011-5023, Nov. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.11
, pp. 5011-5023
-
-
Weingarten, H.1
Liu, T.2
Shamai, S.3
Steinberg, Y.4
Viswanath, P.5
-
10
-
-
77949614838
-
On the relationship between the multi-antenna secrecy communications and cognitive radio communications
-
Monticello IL Sept
-
L. Zhang, R. Zhang, Y. Liang, Y. Xin, and S. Cui, "On the relationship between the multi-antenna secrecy communications and cognitive radio communications," in Proc. Allerton Conf. on Communications, Control, and Computing, Monticello, IL, Sept. 2009.
-
(2009)
Proc. Allerton Conf. on Communications Control and Computing
-
-
Zhang, L.1
Zhang, R.2
Liang, Y.3
Xin, Y.4
Cui, S.5
-
11
-
-
33847353721
-
Secret communication in presence of colluding eavesdroppers
-
Oct
-
S. Goel and R. Negi, "Secret communication in presence of colluding eavesdroppers," in Proc. Military Commun. Conf., Oct. 2005, pp. 1501- 1506.
-
(2005)
Proc. Military Commun. Conf.
, pp. 1501-1506
-
-
Goel, S.1
Negi, R.2
-
12
-
-
70449514539
-
Wireless physical-layer security: The case of colluding eavesdroppers
-
Seoul South Korea July
-
P. C. Pinto, J. O. Barros, and M. Z. Win, "Wireless physical-layer security: The case of colluding eavesdroppers," in Proc. IEEE Int. Symp. on Inf. Theory, Seoul, South Korea, July 2009, pp. 2442-2446.
-
(2009)
Proc. IEEE Int. Symp. on Inf. Theory
, pp. 2442-2446
-
-
Pinto, P.C.1
Barros, J.O.2
Win, M.Z.3
-
13
-
-
52349113391
-
Secrecy in cooperative relay broadcast channels
-
Toronto ON July
-
E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," in Proc. IEEE Int. Symp. on Inf. Theory, Toronto, ON, July 2008, pp. 2217-2221.
-
(2008)
Proc. IEEE Int. Symp. on Inf. Theory
, pp. 2217-2221
-
-
Ekrem, E.1
Ulukus, S.2
-
14
-
-
33749450172
-
Secrecy capacity of SIMO and slow fading channels
-
DOI 10.1109/ISIT.2005.1523727, 1523727, Proceedings of the 2005 IEEE International Symposium on Information Theory, ISIT 05
-
P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. on Inf. Theory, Adelaide, Australia, Sept. 2005, pp. 2152-2155. (Pubitemid 44508426)
-
(2005)
IEEE International Symposium on Information Theory - Proceedings
, vol.2005
, pp. 2152-2155
-
-
Parada, P.1
Blahut, R.2
-
16
-
-
84940654702
-
Secrecy capacity of independent parallel channels
-
Sept
-
Z. Li, R. Yates, and W. Trappe, "Secrecy capacity of independent parallel channels," Proc. Annu. Allerton Conf. Communication, Control and Computing, pp. 841-848, Sept. 2006.
-
(2006)
Proc. Annu. Allerton Conf. Communication Control and Computing
, pp. 841-848
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
17
-
-
45249104850
-
Wireless information-theoretic security
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, 2008.
-
(2008)
EEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
18
-
-
45249119255
-
Secure communication over fading channels
-
June
-
Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, pp. 2470-2492, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
19
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
U. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," Eurocrypt 2000, Lecture Notes in Computer Science, vol. 1807, pp. 351+, 2000.
-
(2000)
Eurocrypt 2000 Lecture Notes in Computer Science
, vol.1807
, pp. 351
-
-
Maurer, U.1
Wolf, S.2
-
21
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
22
-
-
0027629488
-
Common randomness in information theory and cryptography - Part I: Secret sharing
-
July
-
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography - Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
23
-
-
0029405656
-
Generalized privacy amplification
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915- 1923, 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
24
-
-
0033097504
-
Unconditionally secure key agreement and intrinsic conditional information
-
March
-
U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and intrinsic conditional information," IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499-514, March 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.2
, pp. 499-514
-
-
Maurer, U.M.1
Wolf, S.2
-
25
-
-
39049151282
-
LDPCbased secret key agreement over the gaussian wiretap channel
-
Seattle USA
-
M. Bloch, A. Thangaraj, S. W. McLaughlin, and J.-M. Merolla, "LDPCbased secret key agreement over the gaussian wiretap channel," in Proc. IEEE Int. Symp. on Inf. Theory, Seattle, USA, 2006.
-
(2006)
Proc. IEEE Int. Symp. on Inf. Theory
-
-
Bloch, M.1
Thangaraj, A.2
McLaughlin, S.W.3
Merolla, J.-M.4
-
26
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
DOI 10.1109/TIT.2007.901143
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J.-M. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007. (Pubitemid 47249863)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
27
-
-
45249114841
-
Secure nested codes for type II wiretap channels
-
Tahoe City CA Sept.
-
R. Liu, Y. Liang, H. V. Poor, and P. Spasojevic, "Secure nested codes for type II wiretap channels," in Proc. IEEE Inf. Theory Workshop, Tahoe City, CA, Sept. 2007, pp. 337-342.
-
(2007)
Proc. IEEE Inf. Theory Workshop
, pp. 337-342
-
-
Liu, R.1
Liang, Y.2
Poor, H.V.3
Spasojevic, P.4
-
28
-
-
33747886952
-
Secret key agreement from correlated source outputs using low density parity check matrices
-
DOI 10.1093/ietfec/e89-a.7.2036
-
J. Muramatsu, "Secret key agreement from correlated source outputs using low density parity check matrices," IEICE Trans. on Fund. Of Elec. Comm. Comp., vol. E89-A, no. 7, pp. 2036-2046, July 2006. (Pubitemid 44290411)
-
(2006)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E89-A
, Issue.7
, pp. 2036-2046
-
-
Muramatsu, J.1
-
30
-
-
52349086199
-
The secrecy graph and some of its properties
-
Toronto Canada July
-
M. Haenggi, "The secrecy graph and some of its properties," in Proc. IEEE Int. Symp. on Inf. Theory, Toronto, Canada, July 2008.
-
(2008)
Proc. IEEE Int. Symp. on Inf. Theory
-
-
Haenggi, M.1
-
31
-
-
62949215603
-
Physical-layer security in stochastic wireless networks
-
Guangzhou China Nov.
-
P. C. Pinto, J. O. Barros, and M. Z. Win, "Physical-layer security in stochastic wireless networks," in Proc. IEEE Int. Conf. on Commun. Systems, Guangzhou, China, Nov. 2008, pp. 974-979.
-
(2008)
Proc. IEEE Int. Conf. on Commun. Systems
, pp. 974-979
-
-
Pinto, P.C.1
Barros, J.O.2
Win, M.Z.3
-
33
-
-
70449514137
-
Secrecy throughput of MANETs with malicious nodes
-
June
-
Y. Liang, H. V. Poor, and L. Ying, "Secrecy throughput of MANETs with malicious nodes," in Proc. IEEE Int. Symp. on Inf. Theory, June 2009, pp. 1189-1193.
-
(2009)
Proc. IEEE Int. Symp. on Inf. Theory
, pp. 1189-1193
-
-
Liang, Y.1
Poor, H.V.2
Ying, L.3
-
34
-
-
77952682796
-
On secrecy capacity scaling in wireless networks
-
San Diego CA Feb.
-
O. O. Koyluoglu, C. E. Koksal, and H. E. Gamal, "On secrecy capacity scaling in wireless networks," in Inf. Theory and Applications Workshop, San Diego, CA, Feb. 2010, pp. 1-4.
-
(2010)
Inf. Theory and Applications Workshop
, pp. 1-4
-
-
Koyluoglu, O.O.1
Koksal, C.E.2
Gamal, H.E.3
-
35
-
-
78651282802
-
Continuum percolation in the intrinsically secure communications graph
-
Taichung Taiwan Oct.
-
P. C. Pinto and M. Z. Win, "Continuum percolation in the intrinsically secure communications graph," in Proc. IEEE Int. Symp. on Inf. Theory and Its Applications, Taichung, Taiwan, Oct. 2010, pp. 1-6.
-
(2010)
Proc. IEEE Int. Symp. on Inf. Theory and Its Applications
, pp. 1-6
-
-
Pinto, P.C.1
Win, M.Z.2
-
36
-
-
84055212368
-
The behavior of unbounded path-loss models and the effect of singularity on computed network characteristics
-
Sept.
-
H. Inaltekin, M. Chiang, H. V. Poor, and S. B. Wicker, "The behavior of unbounded path-loss models and the effect of singularity on computed network characteristics," IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1078-1092, Sept. 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.7
, pp. 1078-1092
-
-
Inaltekin, H.1
Chiang, M.2
Poor, H.V.3
Wicker, S.B.4
-
37
-
-
62949241345
-
A mathematical theory of network interference and its applications
-
Feb. special issue on Ultra-Wide Bandwidth UWB Technology & Emerging Applications
-
M. Z. Win, P. C. Pinto, and L. A. Shepp, "A mathematical theory of network interference and its applications," Proc. IEEE, vol. 97, no. 2, pp. 205-230, Feb. 2009, special issue on Ultra-Wide Bandwidth (UWB) Technology & Emerging Applications.
-
(2009)
Proc. IEEE
, vol.97
, Issue.2
, pp. 205-230
-
-
Win, M.Z.1
Pinto, P.C.2
Shepp, L.A.3
-
40
-
-
79957978453
-
Stochastic geometry and random graphs for the analysis and design of wireless networks
-
M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, "Stochastic geometry and random graphs for the analysis and design of wireless networks," IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029-1046, 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.7
, pp. 1029-1046
-
-
Haenggi, M.1
Andrews, J.G.2
Baccelli, F.3
Dousse, O.4
Franceschetti, M.5
-
42
-
-
0000579421
-
Random subdivisions of space into crystals
-
E. N. Gilbert, "Random subdivisions of space into crystals," Ann. Math. Statist., vol. 33, pp. 958-972, 1962.
-
(1962)
Ann. Math. Statist.
, vol.33
, pp. 958-972
-
-
Gilbert, E.N.1
-
43
-
-
79955750847
-
200 000 000 random voronoi polygons
-
K. A. Brakke, "200,000,000 random Voronoi polygons," unpublished.
-
Unpublished
-
-
Brakke, K.A.1
-
44
-
-
79551617822
-
Techniques for enhanced physical-layer security
-
Miami FL Dec
-
P. C. Pinto, J. O. Barros, and M. Z. Win, "Techniques for enhanced physical-layer security," in Proc. IEEE Global Telecomm. Conf., Miami, FL, Dec. 2010, pp. 1-5.
-
(2010)
Proc. IEEE Global Telecomm. Conf.
, pp. 1-5
-
-
Pinto, P.C.1
Barros, J.O.2
Win, M.Z.3
-
46
-
-
0001012904
-
On a continuum percolation model
-
M. D. Penrose, "On a continuum percolation model," Advances in Applied Probability, vol. 23, no. 3, pp. 536-556, 1991.
-
(1991)
Advances in Applied Probability
, vol.23
, Issue.3
, pp. 536-556
-
-
Penrose, M.D.1
-
49
-
-
79955774674
-
Full connectivity in the intrinsically secure communications graph
-
Kyoto Japan June to appear.
-
P. C. Pinto and M. Z. Win, "Full connectivity in the intrinsically secure communications graph," in Proc. IEEE Int. Conf. on Commun., Kyoto, Japan, June 2011, pp. 1-6, to appear.
-
(2011)
Proc. IEEE Int. Conf. on Commun.
, pp. 1-6
-
-
Pinto, P.C.1
Win, M.Z.2
|