-
1
-
-
0016562514
-
The wire-tap channel
-
Jan.
-
A. Wyner, "The wire-tap channel," Bell. Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Jan. 1975.
-
(1975)
Bell. Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
2
-
-
40949147785
-
Multiple access channels with confidential messages
-
Mar.
-
Y. Liang and V. H. Poor, "Multiple access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 339-348, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.3
, pp. 339-348
-
-
Liang, Y.1
Poor, V.H.2
-
3
-
-
39049089566
-
The discrete memoryless multiple access channel with confidential messages
-
R. Liu, I. Maric, R. D. Yates, P. Spasojevic, "The discrete memoryless multiple access channel with confidential messages," in Proc. IEEE Int. Symp. Information Theory (ISIT), Seattle, WA, July 2006, pp. 957-961.
-
Proc. IEEE Int. Symp. Information Theory (ISIT), Seattle, WA, July 2006
, pp. 957-961
-
-
Liu, R.1
Maric, I.2
Yates, R.D.3
Spasojevic, P.4
-
4
-
-
70349616112
-
Capacity bounds for broadcast channels with confidential messages
-
Jin Xu, Yi Cao, and Biao Chen, "Capacity bounds for broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 55, no. 10, pp. 4529-4542, 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.10
, pp. 4529-4542
-
-
Xu, J.1
Cao, Y.2
Chen, B.3
-
5
-
-
45249090083
-
Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
-
June
-
R. Liu, I. Maric, P. Spasojevic and R.Yates, "Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2493-2507
-
-
Liu, R.1
Maric, I.2
Spasojevic, P.3
Yates, R.4
-
6
-
-
61349186445
-
Capacity of cognitive interference channels with and without confidential messages
-
Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai, and S. Verdu, "Capacity of cognitive interference channels with and without confidential messages," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 604-619, 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.2
, pp. 604-619
-
-
Liang, Y.1
Somekh-Baruch, A.2
Poor, H.V.3
Shamai, S.4
Verdu, S.5
-
7
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
June
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Inf. Theory, vol. 7, no. 6, pp. 2180-2189, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
8
-
-
70449597938
-
Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels
-
June
-
A. Mukherjee and A. L. Swindlehurst, "Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels," in Proc. 10th IEEE SPAWC, Perugia, Italy, pp. 344-348, June, 2009.
-
(2009)
Proc. 10th IEEE SPAWC, Perugia, Italy
, pp. 344-348
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
9
-
-
79957984175
-
Optimal power allocation for the GSVD based MIMO Gaussian wiretap channel
-
submitted to Available
-
S. Ali. A. Fakoorian and A. L. Swindlehurst, "Optimal power allocation for the GSVD based MIMO Gaussian wiretap channel," submitted to IEEE Trans. Inf. Theory Available: http://arxiv.org/abs/1006.1890
-
IEEE Trans. Inf. Theory
-
-
Ali, S.1
Fakoorian, A.2
Swindlehurst, A.L.3
-
10
-
-
77953802876
-
Secure transmission with multiple antennas II: The MIMOME wiretap channel
-
to appear, Available
-
A. Khisti and G. Wornell, "Secure transmission with multiple antennas II: The MIMOME wiretap channel," to appear, IEEE Trans. Inf. Theory, 2010. Available: http://allegro.mit.edu/pubs/posted/journal/2008-khisti- wornell-it.pdf
-
(2010)
IEEE Trans. Inf. Theory
-
-
Khisti, A.1
Wornell, G.2
-
11
-
-
79957987262
-
MIMO interference channel with confidential messages: Achievable secrecy rates and beamforming design
-
submitted to Aug.
-
S. A. A. Fakoorian and A. L. Swindlehurst, "MIMO interference channel with confidential messages: achievable secrecy rates and beamforming design," submitted to IEEE Trans. on Inf. Forensics and Security, Aug. 2010.
-
(2010)
IEEE Trans. on Inf. Forensics and Security
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
|