-
1
-
-
0016562514
-
The wire-tap channel
-
Jan.
-
A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Jan. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
3
-
-
52349090496
-
The secrecy capacity of the MIMO wiretap channel
-
Toronto, ON, Canada Jul.
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," in Proc. IEEE Int. Symp. Inf. Theory, Toronto, ON, Canada, Jul. 2008, pp. 524-528.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 524-528
-
-
Oggier, F.1
Hassibi, B.2
-
4
-
-
77958560746
-
Secure transmission with multiple antennas II: The MIMOME wiretap channel
-
A. Khisti and G.Wornell, "Secure transmission with multiple antennas II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.2
-
5
-
-
79951762516
-
Transmitter optimization for achieving secrecy capacity in Gaussian MIMO wiretap channels
-
[Online]. Available: submitted for publication
-
J. Li and A. Petropulu, "Transmitter optimization for achieving secrecy capacity in Gaussian MIMO wiretap channels," IEEE Trans. Inf. Theory [Online]. Available: http://arxiv.org/abs/0909.2622, submitted for publication
-
IEEE Trans. Inf. Theory
-
-
Li, J.1
Petropulu, A.2
-
6
-
-
66949180834
-
A note on secrecy capacity of the multiantenna wiretap channel
-
T. Liu and S. Shamai (Shitz), "A note on secrecy capacity of the multiantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
7
-
-
69249208566
-
A MMSE approach to the secrecy capacity of theMIMOGaussian wiretap channel
-
Article ID 370970
-
R. Bustin, R. Liu, H. V. Poor, and S. Shamai (Shitz), "A MMSE approach to the secrecy capacity of theMIMOGaussian wiretap channel," EURASIP J.Wireless Commun. Netw., vol. 2009, p. 8, 2009, Article ID 370970.
-
(2009)
EURASIP J.Wireless Commun. Netw.
, vol.2009
, pp. 8
-
-
Bustin, R.1
Liu, R.2
Poor, H.V.3
Shamai, S.4
-
8
-
-
84873885571
-
New results on multiple-input multiple-output broadcast channels with confidential messages
-
[Online]. Available: submitted for publication
-
R. Liu, T. Liu, H. V. Poor, and S. Shamai (Shitz), "New results on multiple-input multiple-output broadcast channels with confidential messages," IEEE Trans. Inf. Theory [Online]. Available: http://arxiv.org/PS-cache/arxiv/pdf/1101/1101.2007v1.pdf, submitted for publication
-
IEEE Trans. Inf. Theory
-
-
Liu, R.1
Liu, T.2
Poor, H.V.3
Shamai, S.4
-
9
-
-
70449469479
-
The secrecy capacity region of the Gaussian MIMO broadcast channel
-
Mar. [Online]. Available: submitted for publication
-
G. Bagherikaram, A. S. Motahari, and A. K. Khandani, "The secrecy capacity region of the Gaussian MIMO broadcast channel," IEEE Trans. Inf. Theory Mar. 2009 [Online]. Available: http://arxiv.org/PScache/arxiv/pdf/0903/ 0903.3261v2.pdf, submitted for publication
-
(2009)
IEEE Trans. Inf. Theory
-
-
Bagherikaram, G.1
Motahari, A.S.2
Khandani, A.K.3
-
10
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
11
-
-
45249101530
-
The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
12
-
-
72349099904
-
Cooperative jamming for wireless physical layer security
-
Cardiff, Wales, U.K.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Cooperative jamming for wireless physical layer security," in Proc. IEEE Workshop on Statistical Signal Process., Cardiff, Wales, U.K., 2009.
-
(2009)
Proc. IEEE Workshop on Statistical Signal Process.
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
13
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
14
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
15
-
-
52349118726
-
The Gaussian wiretap channel with a helping interferer
-
Toronto, ON, Canada Jul.
-
X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "The Gaussian wiretap channel with a helping interferer," in Proc. IEEE Int. Symp. Inf. Theory, Toronto, ON, Canada, Jul. 2008.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.V.4
-
17
-
-
77949624888
-
Arbitrary jamming can preclude secure communication
-
Monticello, IL Sep.
-
E. MolavianJazi, M. Bloch, and J. N. Laneman, "Arbitrary jamming can preclude secure communication," in Proc. Allerton Conf. Commun., Contr., Comput., Monticello, IL, Sep. 2009.
-
(2009)
Proc. Allerton Conf. Commun., Contr., Comput.
-
-
MolavianJazi, E.1
Bloch, M.2
Laneman, J.N.3
-
18
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
19
-
-
77955721830
-
Multiple-input multiple- output Gaussian broadcast channels with confidential messages
-
Sept.
-
R. Liu, T. Liu, H. V. Poor, and S. Shamai (Shitz), "Multiple-input multiple- output Gaussian broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4215-4227, Sept. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.9
, pp. 4215-4227
-
-
Liu, R.1
Liu, T.2
Poor, H.V.3
Shamai, S.4
-
22
-
-
33748578624
-
The capacity region of the Gaussian multiple-input multiple-output broadcast channel
-
DOI 10.1109/TIT.2006.880064
-
H. Weingarten, Y. Steinberg, and S. Shamai (Shitz), "The capacity region of the Gaussian multiple-input multiple-output broadcast channel," IEEE Trans. Inf. Theory, vol. 52, no. 9, pp. 3936-3964, 2006. (Pubitemid 44363826)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.9
, pp. 3936-3964
-
-
Weingarten, H.1
Steinberg, Y.2
Shamai, S.3
|