-
1
-
-
77957820646
-
A comparative review of commercial vs. tactical wireless networks
-
October
-
G. Elmasry, "A comparative review of commercial vs. tactical wireless networks," IEEE Commun. Mag., Vol. 48: pp. 54-59, October 2010.
-
(2010)
IEEE Commun. Mag.
, vol.48
, pp. 54-59
-
-
Elmasry, G.1
-
3
-
-
82055167001
-
-
National Security Agency Central Security Service, Historical Publications (available via WWW)
-
R. Benson, "The Verona Story," National Security Agency Central Security Service, Historical Publications (available via WWW).
-
The Verona Story
-
-
Benson, R.1
-
4
-
-
67249087217
-
Two-hop secure communication using an untrusted relay: A case for cooperative jamming
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay: a case for cooperative jamming", IEEE GLOBECOM, 2008.
-
(2008)
IEEE GLOBECOM
-
-
He, X.1
Yener, A.2
-
7
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise", IEEE Trans. Wireless Commun., Vol. 7: pp. 2180-2189, 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
8
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
March
-
L. Dong, Z. Han, A. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., Vol. 58: pp. 1875-1888, March 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.3
Poor, H.V.4
-
9
-
-
33747142749
-
The capacity of wireless networks
-
2000
-
P. Gupta and P. Kumar, 2000, "The capacity of wireless networks", IEEE Trans. Inf. Theory, Vol. 46: pp. 388-404, 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, pp. 388-404
-
-
Gupta, P.1
Kumar, P.2
-
10
-
-
85053985067
-
Security versus capacity tradeoffs in large wireless networks using keyless secrecy
-
S. Vasudevan, D. Goeckel, and D. Towsley, "Security versus capacity tradeoffs in large wireless networks using keyless secrecy," ACM MobiHoc, 2010.
-
(2010)
ACM MobiHoc
-
-
Vasudevan, S.1
Goeckel, D.2
Towsley, D.3
-
11
-
-
62949140803
-
A 4gbps 0.57pj/bit process-voltage-temperature variation tolerant alldigital true random number generator in 45nm cmos
-
January
-
S. Srinivasan, S. Mathew, V. Erraguntla, and R. Krishnamurthy, "A 4gbps 0.57pj/bit process-voltage-temperature variation tolerant alldigital true random number generator in 45nm cmos," Proc. 22nd International Conference on VLSI Design, January 2009.
-
(2009)
Proc. 22nd International Conference on VLSI Design
-
-
Srinivasan, S.1
Mathew, S.2
Erraguntla, V.3
Krishnamurthy, R.4
-
14
-
-
77952679452
-
Multi-user diversity for secrecy in wireless networks
-
S. Vasudevan, S. Adams, D. Goeckel, Z. Ding, D. Towsley, and K. Leung, "Multi-user diversity for secrecy in wireless networks," Workshop on Information Theory and Applications, 2010.
-
(2010)
Workshop on Information Theory and Applications
-
-
Vasudevan, S.1
Adams, S.2
Goeckel, D.3
Ding, Z.4
Towsley, D.5
Leung, K.6
-
16
-
-
79957864607
-
Cooperative jamming to improve the connectivity of the 1-D secrecy graph
-
March
-
C. Capar, D. Goeckel, B. Liu, and D. Towsley, "Cooperative jamming to improve the connectivity of the 1-D secrecy graph," Proc. Conference on Information Sciences and Systems, March 2011.
-
(2011)
Proc. Conference on Information Sciences and Systems
-
-
Capar, C.1
Goeckel, D.2
Liu, B.3
Towsley, D.4
|