-
1
-
-
0016562514
-
The wire-tap channel
-
Jan
-
A. D. Wyner, "The wire-tap channel", Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Jan. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
54749106691
-
-
Oct
-
P. K. Gopala, L. Lai, and H. El Gamal, On The Secrecy Capacity of Fading Channels, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
On the Secrecy Capacity of Fading Channels
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
3
-
-
44049101918
-
On the achievable secrecy throughput of block fading channels with no channel state information at transmitter
-
DOI 10.1109/CISS.2007.4298441, 4298441, Forty-first Annual Conference on Information Sciences and Systems, CISS 2007 - Proceedings
-
X. Tang, R. Liu, and P. Spasojevic, "On the achievable secrecy throughput of block fading channels with no channel state information at transmitter", in Proc. CISS'07, Mar. 2007, pp. 917-922. (Pubitemid 351710550)
-
(2007)
Forty-first Annual Conference on Information Sciences and Systems, CISS 2007 - Proceedings
, pp. 917-922
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
-
4
-
-
70449501021
-
On the throughput of secure hybrid ARQ protocols for gaussian block-fading channels
-
Jun
-
X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "On the throughput of secure hybrid ARQ protocols for gaussian block-fading channels", in Proc. ISIT 2007, Jun. 2007, pp. 1355-1387.
-
(2007)
Proc. ISIT 2007
, pp. 1355-1387
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.V.4
-
5
-
-
39349089285
-
Dense parity check based secrecy sharing in wireless communications
-
Nov
-
S. Xiao, H. Pishro-Nik, and W. Gong, "Dense parity check based secrecy sharing in wireless communications", in Proc. IEEE Global Telecommunications Conf., 2007 (GLOBECOM'07), Nov. 2007, pp. 54-58.
-
(2007)
Proc. IEEE Global Telecommunications Conf., 2007 (GLOBECOM'07)
, pp. 54-58
-
-
Xiao, S.1
Pishro-Nik, H.2
Gong, W.3
-
6
-
-
77953313388
-
Secure wireless communication with dynamic secrets
-
Mar. 14-19
-
S. Xiao, W. Gong, and D. Towsley, "Secure wireless communication with dynamic secrets", in Proc. IEEE INFOCOM, 2010, Mar. 14-19, 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM, 2010
, pp. 1-9
-
-
Xiao, S.1
Gong, W.2
Towsley, D.3
-
7
-
-
39049151282
-
LDPC-based secret key agreement over the Gaussian wiretap channel
-
DOI 10.1109/ISIT.2006.261991, 4036151, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
-
M. Bloch, A. Thangaraj, S. W. McLaughlin, and J.-M. Merolla, "LDPC-based secret key agreement over the Gaussian wiretap channel", in Proc. ISIT'06, Jul. 9-14, 2006, pp. 1179-1183. (Pubitemid 351244282)
-
(2006)
IEEE International Symposium on Information Theory - Proceedings
, pp. 1179-1183
-
-
Bloch, M.1
Thangaraj, A.2
McLaughlin, S.W.3
Merolla, J.-M.4
-
8
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
DOI 10.1109/TIT.2007.901143
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. McLaughlin, and J.-M. Merolla, "Applications of LDPC codes to the wiretap channel", IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007. (Pubitemid 47249863)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
9
-
-
33749452174
-
On achieving capacity on the wire tap channel using LDPC codes
-
DOI 10.1109/ISIT.2005.1523593, 1523593, Proceedings of the 2005 IEEE International Symposium on Information Theory, ISIT 05
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J. Merolla, "On achieving capacity on the wire tap channel using LDPC codes", in Proc. ISIT 2005, Sep. 2005, pp. 1498-1502. (Pubitemid 44508292)
-
(2005)
IEEE International Symposium on Information Theory - Proceedings
, vol.2005
, pp. 1498-1502
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
10
-
-
77954833793
-
Arq secrecy over correlated fading channels
-
M. Latif, A. Sultan, and H. El Gamal, "Arq secrecy over correlated fading channels", in Proc. IEEE Information Theory Workshop (ITW 2010), 2010, pp. 1-5.
-
(2010)
Proc. IEEE Information Theory Workshop (ITW 2010)
, pp. 1-5
-
-
Latif, M.1
Sultan, A.2
El Gamal, H.3
-
11
-
-
76249101125
-
ARQ secrecy: From theory to practice
-
Oct. 11-16
-
Y. Omar, M. Youssef, and H. El Gamal, "ARQ secrecy: From theory to practice", in Proc. IEEE Information Theory Workshop ITW 2009, Oct. 11-16, 2009, pp. 6-10.
-
(2009)
Proc. IEEE Information Theory Workshop ITW 2009
, pp. 6-10
-
-
Omar, Y.1
Youssef, M.2
El Gamal, H.3
-
12
-
-
38549101578
-
Breaking 104 bit WEP in less than 60 seconds
-
Springer-Verlag, Berlin, Heidelberg
-
E. Tews, R.-P. Weinmann, and A. Pyshkin, "Breaking 104 bit WEP in less than 60 seconds", in Proc. 8th Int. Conf. Information Security Applications (WISA'07), 2008, vol. 4867, pp. 188-202, Springer-Verlag, Berlin, Heidelberg.
-
(2008)
Proc. 8th Int. Conf. Information Security Applications (WISA'07)
, vol.4867
, pp. 188-202
-
-
Tews, E.1
Weinmann, R.-P.2
Pyshkin, A.3
-
14
-
-
57749184596
-
Improved nonce construction scheme for AES CCMP to evade initial counter prediction
-
Aug. 6-8
-
M. A. Khan, A. R. Cheema, and A. Hasan, "Improved nonce construction scheme for AES CCMP to evade initial counter prediction", in Proc. SNPD'08, Aug. 6-8, 2008, pp. 307-311.
-
(2008)
Proc. SNPD'08
, pp. 307-311
-
-
Khan, M.A.1
Cheema, A.R.2
Hasan, A.3
-
15
-
-
0036611602
-
Opportunistic beamforming using dumb antennas
-
DOI 10.1109/TIT.2002.1003822, PII S0018944802040099
-
P. Viswanath, D. Tse, and R. Laroia, "Opportunistic beamforming using dumb antennas", IEEE Trans. Inf. Theory, vol. 48, no. 6, pp. 1277-1294, Jun. 2002. (Pubitemid 34759845)
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.6
, pp. 1277-1294
-
-
Viswanath, P.1
Tse, D.N.C.2
Laroia, R.3
-
17
-
-
73149122953
-
Rate adaptation via link-layer feedback for goodput maximization over a time-varying channel
-
R. Aggarwal, P. Schniter, and C. E. Koksal, "Rate adaptation via link-layer feedback for goodput maximization over a time-varying channel", Trans. Wireless Commun., vol. 8, no. 8, pp. 4276-4285, 2009.
-
(2009)
Trans. Wireless Commun.
, vol.8
, Issue.8
, pp. 4276-4285
-
-
Aggarwal, R.1
Schniter, P.2
Koksal, C.E.3
-
18
-
-
0021595510
-
The wire-tap channel II
-
L. H. Ozarow and A. D. Wyner, "The wire-tap channel II", Bell Syst. Tech. J., vol. 63, no. 10, pp. 2135-2157, 1984.
-
(1984)
Bell Syst. Tech. J.
, vol.63
, Issue.10
, pp. 2135-2157
-
-
Ozarow, L.H.1
Wyner, A.D.2
-
20
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802.11
-
ACM, New York
-
N. Borisov, I. Goldberg, and D. Wagner, "Intercepting mobile communications: The insecurity of 802.11", in Proc. 7th Ann. Int. Conf. Mobile Computing and Networking (MobiCom'01), 2001, pp. 180-189, ACM, New York.
-
(2001)
Proc. 7th Ann. Int. Conf. Mobile Computing and Networking (MobiCom'01)
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
21
-
-
84949223752
-
Weaknesses in the key scheduling algorithm of RC4
-
Springer-Verlag, London, U. K.
-
S. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the key scheduling algorithm of RC4", in Revised Papers 8th Ann. Int. Workshop on Selected Areas in Cryptography (SAC'01), 2001, pp. 1-24, Springer-Verlag, London, U. K..
-
(2001)
Revised Papers 8th Ann. Int. Workshop on Selected Areas in Cryptography (SAC'01)
, pp. 1-24
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
23
-
-
38549119395
-
-
KoreK, Online. Available
-
Kore K, Next Generation of WEP Attacks 2004 [Online]. Available: http://www.netstumbler.org/showpost.php?p=93942&postcount=35
-
Next Generation of WEP Attacks 2004
-
-
-
24
-
-
47749085463
-
Attacks on the RC4 stream cipher
-
Sep, Online. Available
-
A. Klein, "Attacks on the RC4 stream cipher", Designs, Codes, Cryptography vol. 48, no. 3, pp. 269-286, Sep. 2008 [Online]. Available: http://www.springerlink.com/content/6086867367826646
-
(2008)
Designs, Codes, Cryptography
, vol.48
, Issue.3
, pp. 269-286
-
-
Klein, A.1
-
25
-
-
34548283237
-
The final nail in WEP's coffin
-
May 21-24, 400
-
A. Bittau, M. Handley, and J. Lackey, "The final nail in WEP's coffin", in Proc. ISSP'06, May 21-24, 2006, pp. 15, 400.
-
(2006)
Proc. ISSP'06
, pp. 15
-
-
Bittau, A.1
Handley, M.2
Lackey, J.3
-
26
-
-
33444473347
-
Weaknesses in the temporal key hash of WPA
-
V. Moen, H. Raddum, and K. J. Hole, "Weaknesses in the temporal key hash of WPA", SIGMOBILE Mob. Comput. Commun. Rev., vol. 8, no. 2, pp. 76-83, 2004.
-
(2004)
SIGMOBILE Mob. Comput. Commun. Rev.
, vol.8
, Issue.2
, pp. 76-83
-
-
Moen, V.1
Raddum, H.2
Hole, K.J.3
-
27
-
-
70349147400
-
Practical attacks against WEP and WPA
-
New York, ACM
-
E. Tews and M. Beck, "Practical attacks against WEP and WPA", in Proc. Second ACM Conf. Wireless Network Security (WiSec'09), New York, 2009, pp. 79-86, ACM.
-
(2009)
Proc. Second ACM Conf. Wireless Network Security (WiSec'09)
, pp. 79-86
-
-
Tews, E.1
Beck, M.2
-
30
-
-
84907522342
-
Improving wireless security through network diversity
-
Dec, Online. Available
-
T. Ye, D. Veitch, and J. Bolot, "Improving wireless security through network diversity", SIGCOMM Comput. Commun. Rev. vol. 39, pp. 34-44, Dec. 2008 [Online]. Available: http://doi.acm.org/10.1145/1496091.1496096
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.39
, pp. 34-44
-
-
Ye, T.1
Veitch, D.2
Bolot, J.3
|