-
1
-
-
0032164539
-
Cryptographic design vulnerabilities
-
Sep.
-
B. Schneier, "Cryptographic design vulnerabilities," IEEE Comput., vol. 31, no. 9, pp. 29-33, Sep. 1998.
-
(1998)
IEEE Comput.
, vol.31
, Issue.9
, pp. 29-33
-
-
Schneier, B.1
-
2
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul.
-
S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
-
4
-
-
0017973511
-
Broadcast channels with condential mes- sages
-
May
-
I. Csiszar and J. Korner, "Broadcast channels with condential mes- sages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
5
-
-
0347337828
-
Secure space-time communication
-
Dec.
-
A. Hero, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero, A.1
-
6
-
-
51649117832
-
On the Gaussian MIMO wiretap channel
-
Jun.
-
A. Khisti, G. Wornell, A. Wiesel, and Y. Eldar, "On the Gaussian MIMO wiretap channel," in Proc. IEEE ISIT, Jun. 2007, pp. 2471-2475.
-
(2007)
Proc. IEEE ISIT
, pp. 2471-2475
-
-
Khisti, A.1
Wornell, G.2
Wiesel, A.3
Eldar, Y.4
-
7
-
-
52349090496
-
The secrecy capacity of the MIMO wiretap channel
-
Jul.
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," in Proc. IEEE ISIT, Jul. 2008, pp. 524-528.
-
(2008)
Proc. IEEE ISIT
, pp. 524-528
-
-
Oggier, F.1
Hassibi, B.2
-
8
-
-
77953802876
-
Secure transmission with multiple an- tennas I: The MISOME wiretap channel
-
Jul.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple an- tennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 6, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.6
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
9
-
-
77953868439
-
Secure transmission with multiple an- tennas II: The MIMOME wiretap channel
-
to be published
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple an- tennas II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, to be published.
-
IEEE Trans. Inf. Theory
-
-
Khisti, A.1
Wornell, G.W.2
-
10
-
-
66949180834
-
A note on the secrecy capacity of the multi- antenna wiretap channel
-
Jun.
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multi- antenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
11
-
-
70349223815
-
Fixed SINR solutions for the MIMO wiretap channel
-
Apr.
-
A. L. Swindlehurst, "Fixed SINR solutions for the MIMO wiretap channel," in Proc. IEEE Int. Conf. Acoustics, Speech, Signal Pro- cessing (ICASSP), Apr. 2009, pp. 2437-2440.
-
(2009)
Proc. IEEE Int. Conf. Acoustics, Speech, Signal Pro- Cessing (ICASSP)
, pp. 2437-2440
-
-
Swindlehurst, A.L.1
-
12
-
-
70449597938
-
Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels
-
Jun.
-
A. Mukherjee and A. L. Swindlehurst, "Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels," in Proc. 10th IEEE SPAWC, Perugia, Italy, Jun. 2009, pp. 344-348.
-
(2009)
Proc. 10th IEEE SPAWC, Perugia, Italy
, pp. 344-348
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
13
-
-
45849133457
-
Guaranteeing secrecy using articial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using articial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
15
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.3
McLaughlin, S.W.4
-
16
-
-
70349297353
-
Information-spectrum methods for infor- mation-theoretic security
-
Feb.
-
M. Bloch and J. Laneman, "Information-spectrum methods for infor- mation-theoretic security," in Proc. Inf. Theory Appl. Workshop, Feb. 2009, pp. 23-28.
-
(2009)
Proc. Inf. Theory Appl. Workshop
, pp. 23-28
-
-
Bloch, M.1
Laneman, J.2
-
17
-
-
3142741904
-
Transmitter optimization and optimality of beamforming for multiple antenna systems
-
Jul.
-
S. Jafar and A. Goldsmith, "Transmitter optimization and optimality of beamforming for multiple antenna systems," IEEE Trans. Wireless Commun., vol. 3, no. 4, pp. 1165-1175, Jul. 2004.
-
(2004)
IEEE Trans. Wireless Commun.
, vol.3
, Issue.4
, pp. 1165-1175
-
-
Jafar, S.1
Goldsmith, A.2
-
18
-
-
78049355343
-
MIMO SVD-based multiplexing with imperfect channel knowledge
-
Dallas, TX, Mar.
-
M. Larsen and A. Swindlehurst, "MIMO SVD-based multiplexing with imperfect channel knowledge," in Proc. IEEE Int. Conf. Acous- tics, Speech, Signal Processing (ICASSP), Dallas, TX, Mar. 2010.
-
(2010)
Proc. IEEE Int. Conf. Acous- Tics, Speech, Signal Processing (ICASSP)
-
-
Larsen, M.1
Swindlehurst, A.2
-
19
-
-
39349091874
-
Shout to secure: Physical-layer wireless security with known interference
-
Nov.
-
M.Jorgensen,B.Yanakiev,G.Kirkelund,P.Popovski,H.Yomo,andT. Larsen, "Shout to secure: Physical-layer wireless security with known interference," in Proc. IEEE GLOBECOM, Nov. 2007, pp. 33-38.
-
(2007)
Proc. IEEE GLOBECOM
, pp. 33-38
-
-
Jorgensen, M.1
Yanakiev, B.2
Kirkelund, G.3
Popovski, P.4
Yomo, H.5
Larsen, T.6
-
20
-
-
51849097719
-
Wireless secrecy with infrastruc- ture-aided cooperation
-
May
-
P. Popovski and O. Simeone, "Wireless secrecy with infrastruc- ture-aided cooperation," in IEEE Inf. Theory Workshop, May 2008, pp. 159-163.
-
(2008)
IEEE Inf. Theory Workshop
, pp. 159-163
-
-
Popovski, P.1
Simeone, O.2
-
21
-
-
51849144195
-
Interference-assisted secret communication
-
May
-
X. Tang, R. Liu, P. Spasojevìc, and H. V. Poor, "Interference-assisted secret communication," in Proc. IEEE Inf. Theory Workshop, May 2008, pp. 164-168.
-
(2008)
Proc. IEEE Inf. Theory Workshop
, pp. 164-168
-
-
Tang, X.1
Liu, R.2
Spasojevìc, P.3
Poor, H.V.4
-
22
-
-
51349109773
-
The relay-eavesdropperchannel:Cooperation for secrecy
-
Sep.
-
L.LaiandH.ElGamal,"The relay-eavesdropperchannel:Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Laiand, L.1
Elgamal, H.2
-
23
-
-
45249101530
-
The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jam- ming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jam- ming," IEEE Trans. Inf. Theory, vol. 54, no. 6, p. 27352751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
24
-
-
52349105722
-
On the secure degrees of freedom in the K-user Gaussian interference channel
-
Jul.
-
O. Koyluoglu, H. El Gamal, L. Lai, and H. V. Poor, "On the secure degrees of freedom in the K-user Gaussian interference channel," in Proc. IEEE ISIT, Jul. 2008, pp. 384-388.
-
(2008)
Proc. IEEE ISIT
, pp. 384-388
-
-
Koyluoglu, O.1
El Gamal, H.2
Lai, L.3
Poor, H.V.4
-
25
-
-
0036842874
-
Perturbation analysis for subspace decomposition with appli- cations in subspace-based algorithms
-
Nov.
-
Z. Xu, "Perturbation analysis for subspace decomposition with appli- cations in subspace-based algorithms," IEEE Trans. Signal Process., vol. 50, no. 11, pp. 2820-2830, Nov. 2002.
-
(2002)
IEEE Trans. Signal Process.
, vol.50
, Issue.11
, pp. 2820-2830
-
-
Xu, Z.1
-
26
-
-
0042283724
-
Joint TX-RX beamforming design for multicarrier MIMO channels: A unied framework for convex optimization
-
Sep.
-
D. P. Palomar, J. Ciof, and M. Lagunas, "Joint TX-RX beamforming design for multicarrier MIMO channels: A unied framework for convex optimization," IEEE Trans. Signal Process., vol. 51, no. 9, pp. 2381-2401, Sep. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.9
, pp. 2381-2401
-
-
Palomar, D.P.1
Ciof, J.2
Lagunas, M.3
|