-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Techn. J., vol. 28, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Techn. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Techn. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Techn. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017996501
-
The gaussian wire-tap channel
-
July
-
S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
-
4
-
-
45249104850
-
Wireless information-theoretic security
-
M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.3
McLaughlin, S.4
-
5
-
-
45249119255
-
Secure communication over fading channels
-
Y. Liang, H. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.2
Shamai, S.3
-
6
-
-
54749106691
-
On the secrecy capacity of fading channels
-
P. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.1
Lai, L.2
El Gamal, H.3
-
9
-
-
66949180834
-
A note on the secrecy capacity of the multipleantenna wiretap channel
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
10
-
-
64549128283
-
Secure wireless communications via cooperation
-
Sep.
-
L. Dong, Z. Han, A. Petropulu, and H. Poor, "Secure wireless communications via cooperation," in Proc. 46th Annual Allerton Conference on Communication, Control, and Computing, Sep. 2008, pp. 1132-1138.
-
(2008)
Proc. 46th Annual Allerton Conference on Communication, Control, and Computing
, pp. 1132-1138
-
-
Dong, L.1
Han, Z.2
Petropulu, A.3
Poor, H.4
-
11
-
-
84938932265
-
Coding for relay channels with confidential messages
-
Y. Oohama, "Coding for relay channels with confidential messages," in Proc. IEEE Information Theory Workshop, 2001, pp. 87-89.
-
(2001)
Proc. IEEE Information Theory Workshop
, pp. 87-89
-
-
Oohama, Y.1
-
12
-
-
45249083184
-
Secure communication with a relay helping the wire-tapper
-
M. Yuksel and E. Erkip, "Secure communication with a relay helping the wire-tapper," in Proc. IEEE Information Theory Workshop, 2007, pp. 595-600.
-
(2007)
Proc. IEEE Information Theory Workshop
, pp. 595-600
-
-
Yuksel, M.1
Erkip, E.2
-
14
-
-
84923996598
-
-
Cambridge University Press Aug.
-
A. Goldsmith, Wireless Communication. Cambridge University Press, pp. 199-200, Aug. 2005.
-
(2005)
Wireless Communication
, pp. 199-200
-
-
Goldsmith, A.1
|