-
1
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
2
-
-
0032164539
-
Cryptographic design vulnerabilities
-
B. Schneier, "Cryptographic design vulnerabilities," Comput., vol. 31, no. 9, pp. 29-33, Sep. 1998. (Pubitemid 128551914)
-
(1998)
Computer
, vol.31
, Issue.9
, pp. 29-33
-
-
Schneier, B.1
-
4
-
-
0016562514
-
The wire-tap channel
-
Jan.
-
A. D.Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Jan. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
5
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
6
-
-
33749450172
-
Secrecy capacity of SIMO and slow fading channels
-
DOI 10.1109/ISIT.2005.1523727, 1523727, Proceedings of the 2005 IEEE International Symposium on Information Theory, ISIT 05
-
P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. Int. Symp. Inf. Theory (ISIT), Sep. 2005, pp. 2152-2155. (Pubitemid 44508426)
-
(2005)
IEEE International Symposium on Information Theory - Proceedings
, vol.2005
, pp. 2152-2155
-
-
Parada, P.1
Blahut, R.2
-
7
-
-
77958560746
-
Secure transmission with multiple antennas- Part II: The MIMOME wiretap channel
-
Nov.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas- Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
8
-
-
51649110931
-
Achievable rates in Gaussian MISO channels with secrecy constraints
-
Jun.
-
S. Shafiee and S. Ulukus, "Achievable rates in Gaussian MISO channels with secrecy constraints," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2007, pp. 2466-2470.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 2466-2470
-
-
Shafiee, S.1
Ulukus, S.2
-
9
-
-
70449511650
-
An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel
-
Jun.
-
R. Liu, R. Bustin, S. Shamai, and H. V. Poor, "An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2009, pp. 2602-2606.
-
(2009)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 2602-2606
-
-
Liu, R.1
Bustin, R.2
Shamai, S.3
Poor, H.V.4
-
11
-
-
66949180834
-
A note on the secrecy capacity of the multipleantenna wiretap channel
-
Jun.
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
12
-
-
44049095075
-
Secret communication via multi-antenna transmission
-
DOI 10.1109/CISS.2007.4298439, 4298439, Forty-first Annual Conference on Information Sciences and Systems, CISS 2007 - Proceedings
-
Z. Li, W. Trappe, and R. Yates, "Secret communication via multi-antenna transmission," in Proc. 41st Ann. Conf. Inf. Sci. Syst. (CISS),Mar. 2007, pp. 905-910. (Pubitemid 351710548)
-
(2007)
Forty-first Annual Conference on Information Sciences and Systems, CISS 2007 - Proceedings
, pp. 905-910
-
-
Li, Z.1
Trappe, W.2
Yates, R.3
-
13
-
-
51649117832
-
On the Gaussian MIMO wiretap channel
-
Jun.
-
A. Khisti, G. Wornell, A. Wiesel, and Y. Eldar, "On the Gaussian MIMO wiretap channel," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2007, pp. 2471-2475.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 2471-2475
-
-
Khisti, A.1
Wornell, G.2
Wiesel, A.3
Eldar, Y.4
-
14
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
17
-
-
51649095674
-
Capacity theorems for relay channels with confidential messages
-
Jun.
-
Y. Oohama, "Capacity theorems for relay channels with confidential messages," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2007, pp. 926-930.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 926-930
-
-
Oohama, Y.1
-
18
-
-
45249101530
-
The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
19
-
-
76649123145
-
Two-hop secure communication using an untrusted relay
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay," EURASIP J. Wireless Commun. Netw., vol. 2009, pp. 1-13, 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw.
, vol.2009
, pp. 1-13
-
-
He, X.1
Yener, A.2
-
20
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
21
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
25
-
-
79960399745
-
Robust beamforming for security in MIMO wiretap channels with imperfect CSI
-
Jan.
-
A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
26
-
-
45249083184
-
Secure communication with a relay helping the wire-tapper
-
Sep.
-
M. Yuksel and E. Erkip, "Secure communication with a relay helping the wire-tapper," in Proc. IEEE Inf. TheoryWorkshop (ITW), Sep. 2007, pp. 595-600.
-
(2007)
Proc. IEEE Inf. TheoryWorkshop (ITW)
, pp. 595-600
-
-
Yuksel, M.1
Erkip, E.2
-
27
-
-
0242302539
-
Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks
-
Oct.
-
J. N. Laneman and G. W.Wornell, "Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks," IEEE Trans. Inf. Theory, vol. 49, no. 10, pp. 2415-2425, Oct. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.10
, pp. 2415-2425
-
-
Laneman, J.N.1
Wornell, G.W.2
-
28
-
-
29144473358
-
On the achievable diversity-multiplexing tradeoff in half-duplex cooperative channels
-
DOI 10.1109/TIT.2005.858920
-
K. Azarian, H. El Gamal, and P. Schniter, "On the achievable diversity- multiplexing tradeoff in half-duplex cooperative channels," IEEE Trans. Inf. Theory, vol. 51, no. 12, pp. 4152-4172, Dec. 2005. (Pubitemid 41800350)
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.12
, pp. 4152-4172
-
-
Azarian, K.1
El Gamal, H.2
Schniter, P.3
-
29
-
-
79955465834
-
On ergodic secrecy rate for Gaussian MISO wiretap channels
-
Apr.
-
J. Li and A. P. Petropulu, "On ergodic secrecy rate for Gaussian MISO wiretap channels," IEEE Trans. Wireless Commun., vol. 10, no. 4, pp. 1176-1187, Apr. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.4
, pp. 1176-1187
-
-
Li, J.1
Petropulu, A.P.2
-
30
-
-
80052885871
-
-
MIMO wiretap channels with arbitrarily varying eavesdropper channel states Jul. [Online]. Available
-
X. He and A. Yener, "MIMO wiretap channels with arbitrarily varying eavesdropper channel states," Jul. 2010 [Online]. Available: http://arxiv.org/abs/1007.4801
-
(2010)
-
-
He, X.1
Yener, A.2
-
31
-
-
5044252003
-
Cooperative diversity in wireless networks: Efficient protocols and outage behavior
-
Dec.
-
J. N. Laneman, D. N. C. Tse, and G. W.Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3062-3080
-
-
Laneman, J.N.1
Tse, D.N.C.2
Wornell, G.W.3
-
33
-
-
77953802876
-
Secure transmission with multiple antennas I: The MISOME wiretap channel
-
Jul.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
35
-
-
34547429907
-
Power control by geometric programming
-
Jul.
-
M. Chiang, C. W. Tan, D. P. Palomar,D. O'Neill, and D. Julian, "Power control by geometric programming," IEEE Trans. Wireless Commun., vol. 6, no. 7, pp. 2640-2651, Jul. 2007.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, Issue.7
, pp. 2640-2651
-
-
Chiang, M.1
Tan, C.W.2
Palomar, D.P.3
O'Neill, D.4
Julian, D.5
-
36
-
-
34249812361
-
A tutorial on geometric programming
-
DOI 10.1007/s11081-007-9001-7
-
S. Boyd, S. J. Kim, L. Vandenberghe, and A. Hassibi, "A tutorial on geometric programming," Optimiz. Eng., vol. 8, no. 1, pp. 67-127, Apr. 2007. (Pubitemid 46844969)
-
(2007)
Optimization and Engineering
, vol.8
, Issue.1
, pp. 67-127
-
-
Boyd, S.1
Kim, S.-J.2
Vandenberghe, L.3
Hassibi, A.4
|