-
1
-
-
52349086199
-
The secrecy graph and some of its properties
-
M. Haenggi, "The secrecy graph and some of its properties," in ISIT 2008, 2008, pp. 539-543.
-
(2008)
ISIT 2008
, pp. 539-543
-
-
Haenggi, M.1
-
2
-
-
62949215603
-
Physical-layer security in stochastic wireless networks
-
P. Pinto, J. Barros, and M. Win, "Physical-layer security in stochastic wireless networks," in ICCS 2008, 2008, pp. 974-979.
-
(2008)
ICCS 2008
, pp. 974-979
-
-
Pinto, P.1
Barros, J.2
Win, M.3
-
3
-
-
70449514539
-
Wireless physical-layer security: The case of colluding eavesdroppers
-
-, "Wireless physical-layer security: The case of colluding eavesdroppers," in ISIT 2009, 2009, pp. 2442-2446.
-
(2009)
ISIT 2009
, pp. 2442-2446
-
-
Pinto, P.1
Barros, J.2
Win, M.3
-
4
-
-
77955697302
-
Modeling location uncertainty for eavesdroppers: A secrecy graph approach
-
S. Goel, V. Aggarwal, A. Yener, and A. Calderbank, "Modeling location uncertainty for eavesdroppers: A secrecy graph approach," in ISIT 2010, 2010, pp. 2627-2631.
-
(2010)
ISIT 2010
, pp. 2627-2631
-
-
Goel, S.1
Aggarwal, V.2
Yener, A.3
Calderbank, A.4
-
5
-
-
79955760207
-
On secrecy capacity scaling in wireless networks
-
O. Ozan Koyluoglu, C. Emre Koksal, and H. El Gamal, "On secrecy capacity scaling in wireless networks," in Information Theory and Applications Workshop (ITA), 2010, 2010, pp. 1-4.
-
(2010)
Information Theory and Applications Workshop (ITA), 2010
, pp. 1-4
-
-
Ozan Koyluoglu, O.1
Emre Koksal, C.2
El Gamal, H.3
-
6
-
-
78649282396
-
Security-capacity trade-off in large wireless networks using keyless secrecy
-
New York, NY, USA: ACM, [Online]. Available: http://doi.acm.org/10.1145/ 1860093.1860097
-
S. Vasudevan, D. Goeckel, and D. F. Towsley, "Security-capacity trade-off in large wireless networks using keyless secrecy," in Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing, ser. MobiHoc '10. New York, NY, USA: ACM, 2010, pp. 21-30. [Online]. Available: http://doi.acm.org/10.1145/1860093.1860097
-
(2010)
Proceedings of the Eleventh ACM International Symposium on Mobile Ad Hoc Networking and Computing, Ser. MobiHoc '10
, pp. 21-30
-
-
Vasudevan, S.1
Goeckel, D.2
Towsley, D.F.3
-
7
-
-
78751535549
-
Cooperative jamming: The tale of friendly interference for secrecy
-
R. Liu and W. Trappe, Eds. Springer
-
X. He and A. Yener, "Cooperative jamming: The tale of friendly interference for secrecy," in Securing Wireless Communications at the Physical Layer, R. Liu and W. Trappe, Eds. Springer, 2010, pp. 65-88.
-
(2010)
Securing Wireless Communications at the Physical Layer
, pp. 65-88
-
-
He, X.1
Yener, A.2
-
8
-
-
84931425598
-
Secret communication using artificial noise
-
R. Negi and S. Goel, "Secret communication using artificial noise," in Vehicular Technology Conference, 2005, vol. 3, 2005, pp. 1906-1910.
-
(2005)
Vehicular Technology Conference, 2005
, vol.3
, pp. 1906-1910
-
-
Negi, R.1
Goel, S.2
-
9
-
-
0037114396
-
d
-
d," Statistics & Probability Letters, vol. 60, no. 4, pp. 351-357, 2002.
-
(2002)
Statistics & Probability Letters
, vol.60
, Issue.4
, pp. 351-357
-
-
Appel, M.J.B.1
Russo, R.P.2
|