-
1
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
DOI 10.1109/TIT.2007.901143
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J.-M. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007. (Pubitemid 47249863)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
4
-
-
0033099611
-
Good error-correcting codes based on very sparse matrices
-
Mar.
-
D. J. C. MacKay, "Good error-correcting codes based on very sparse matrices," IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 399-431, Mar. 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.2
, pp. 399-431
-
-
MacKay, D.J.C.1
-
5
-
-
49549124036
-
Network security for client-server architecture using wiretap codes
-
Sept.
-
M. Bloch, R. Narasimha, and S. W. McLaughlin, "Network security for client-server architecture using wiretap codes," IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 404-413, Sept. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.3
, pp. 404-413
-
-
Bloch, M.1
Narasimha, R.2
McLaughlin, S.W.3
-
6
-
-
70449514137
-
Secrecy throughput of MANETs with malicious nodes
-
Seoul, Korea, June-July
-
Y. Liang, H. V. Poor, and L. Ying, "Secrecy throughput of MANETs with malicious nodes," in Proc. IEEE Int. Symp. Information Theory (ISIT), Seoul, Korea, June-July 2009, pp. 1189-1193.
-
(2009)
Proc. IEEE Int. Symp. Information Theory (ISIT)
, pp. 1189-1193
-
-
Liang, Y.1
Poor, H.V.2
Ying, L.3
-
7
-
-
76249131348
-
LDPC codes for the Gaussian wiretap channel
-
Taormina, Sicily, Oct.
-
D. Klinc, J. Ha, S. McLaughlin, J. Barros, and B.-J. Kwak, "LDPC codes for the Gaussian wiretap channel," in Proc. IEEE Information Theory Workshop (ITW), Taormina, Sicily, Oct. 2009, pp. 95-99.
-
(2009)
Proc. IEEE Information Theory Workshop (ITW)
, pp. 95-99
-
-
Klinc, D.1
Ha, J.2
McLaughlin, S.3
Barros, J.4
Kwak, B.-J.5
-
8
-
-
70449468047
-
ARQ-based secret key sharing
-
June
-
M. A. Latif, A. Sultan, and H. El Gamal, "ARQ-based secret key sharing," in Proc. IEEE Int. Conf. Communications (ICC), June 2009, pp. 1-6.
-
(2009)
Proc. IEEE Int. Conf. Communications (ICC)
, pp. 1-6
-
-
Latif, M.A.1
Sultan, A.2
El Gamal, H.3
-
9
-
-
0036612281
-
Finite-length analysis of low-density parity-check codes on the binary erasure channel
-
DOI 10.1109/TIT.2002.1003839, PII S0018944802040269
-
C. Di, D. Proietti, I. E. Telatar, T. J. Richardson, and R. L. Urbanke, "Finite-length analysis of low-density parity-check codes on the binary erasure channel," IEEE Trans. Inf. Theory, vol. 48, no. 6, pp. 1570-1579, June 2002. (Pubitemid 34759861)
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.6
, pp. 1570-1579
-
-
Di, C.1
Proietti, D.2
Telatar, I.E.3
Richardson, T.J.4
Urbanke, R.L.5
-
14
-
-
70449509760
-
Physical-layer security: Combining error control coding and cryptography
-
Dresden, Germany, June
-
W. K. Harrison and S. W. McLaughlin, "Physical-layer security: Combining error control coding and cryptography," in Proc. IEEE Int. Conf. Communications (ICC), Dresden, Germany, June 2009, pp. 1-5.
-
(2009)
Proc. IEEE Int. Conf. Communications (ICC)
, pp. 1-5
-
-
Harrison, W.K.1
McLaughlin, S.W.2
-
15
-
-
70449485032
-
Tandem coding and cryptography on wiretap channels: EXIT chart analysis
-
Seoul, Korea, June-July
-
-, "Tandem coding and cryptography on wiretap channels: EXIT chart analysis," in Proc. IEEE Int. Symp. Information Theory (ISIT), Seoul, Korea, June-July 2009, pp. 1939-1943.
-
(2009)
Proc. IEEE Int. Symp. Information Theory (ISIT)
, pp. 1939-1943
-
-
Harrison, W.K.1
McLaughlin, S.W.2
|