메뉴 건너뛰기




Volumn , Issue , 2011, Pages 713-717

Bidirectional broadcast channels with common and confidential messages

Author keywords

[No Author keywords available]

Indexed keywords

BI-DIRECTIONAL COMMUNICATION; BROADCAST CHANNELS; CONFIDENTIAL MESSAGE; DECODE-AND-FORWARD PROTOCOLS; RELAY NODE; SECRECY CAPACITY;

EID: 83655202648     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITW.2011.6089528     Document Type: Conference Paper
Times cited : (7)

References (20)
  • 1
    • 33847736358 scopus 로고    scopus 로고
    • Spectral efficient protocols for half-duplex fading relay channels
    • Feb.
    • B. Rankov and A. Wittneben, "Spectral Efficient Protocols for Half-Duplex Fading Relay Channels," IEEE J. Sel. Areas Commun., vol. 25, no. 2, pp. 379-389, Feb. 2007.
    • (2007) IEEE J. Sel. Areas Commun. , vol.25 , Issue.2 , pp. 379-389
    • Rankov, B.1    Wittneben, A.2
  • 3
    • 38349180108 scopus 로고    scopus 로고
    • Broadcast capacity region of two-phase bidirectional relaying
    • Jan.
    • T. J. Oechtering, C. Schnurr, I. Bjelaković, and H. Boche, "Broadcast Capacity Region of Two-Phase Bidirectional Relaying," IEEE Trans. Inf. Theory, vol. 54, no. 1, pp. 454-458, Jan. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.1 , pp. 454-458
    • Oechtering, T.J.1    Schnurr, C.2    Bjelaković, I.3    Boche, H.4
  • 4
    • 55349107839 scopus 로고    scopus 로고
    • Performance bounds for bidirectional coded cooperation protocols
    • Nov.
    • S. J. Kim, P. Mitran, and V. Tarokh, "Performance Bounds for Bidirectional Coded Cooperation Protocols," IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 5235-5241, Nov. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.11 , pp. 5235-5241
    • Kim, S.J.1    Mitran, P.2    Tarokh, V.3
  • 5
    • 46749104134 scopus 로고    scopus 로고
    • Capacity for classes of broadcast channels with receiver side information
    • Shitz, Tahoe City, CA, USA, Sep.
    • G. Kramer and S. Shamai (Shitz), "Capacity for Classes of Broadcast Channels with Receiver Side Information," in Proc. IEEE Inf. Theory Workshop, Tahoe City, CA, USA, Sep. 2007, pp. 313-318.
    • (2007) Proc. IEEE Inf. Theory Workshop , pp. 313-318
    • Kramer, G.1    Shamai, S.2
  • 6
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The Wire-Tap Channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , pp. 1355-1387
    • Wyner, A.D.1
  • 7
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast Channels with Confidential Messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 10
    • 54249103656 scopus 로고    scopus 로고
    • Strong secrecy for wireless channels
    • Calgary, Canada, Aug, invited
    • J. Barros and M. Bloch, "Strong Secrecy for Wireless Channels," in Int. Conf. on Information-Theoretic Security, Calgary, Canada, Aug. 2008, pp. 40-53, invited.
    • (2008) Int. Conf. on Information-theoretic Security , pp. 40-53
    • Barros, J.1    Bloch, M.2
  • 11
    • 40949147785 scopus 로고    scopus 로고
    • Multiple-access channels with confidential messages
    • Mar.
    • Y. Liang and H. V. Poor, "Multiple-Access Channels With Confidential Messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.3 , pp. 976-1002
    • Liang, Y.1    Poor, H.V.2
  • 12
    • 45249090083 scopus 로고    scopus 로고
    • Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
    • Jun.
    • R. Liu, I. Marić, P. Spasojević, and R. D. Yates, "Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2493-2507
    • Liu, R.1    Marić, I.2    Spasojević, P.3    Yates, R.D.4
  • 13
    • 77955676680 scopus 로고    scopus 로고
    • Gaussian MIMO broadcast channels with common and confidential messages
    • Austin, TX, USA, Jun.
    • E. Ekrem and S. Ulukus, "Gaussian MIMO Broadcast Channels with Common and Confidential Messages," in Proc. IEEE Int. Symp. Inf. Theory, Austin, TX, USA, Jun. 2010, pp. 2583-2587.
    • (2010) Proc. IEEE Int. Symp. Inf. Theory , pp. 2583-2587
    • Ekrem, E.1    Ulukus, S.2
  • 14
    • 77955354714 scopus 로고    scopus 로고
    • A new outer bound for the secrecy capacity region of the gaussian two-way wiretap channel
    • Cape Town, South Africa, May
    • X. He and A. Yener, "A New Outer Bound for the Secrecy Capacity Region of the Gaussian Two-Way Wiretap Channel," in Proc. IEEE Int. Conf. Commun., Cape Town, South Africa, May 2010, pp. 1-5.
    • (2010) Proc. IEEE Int. Conf. Commun. , pp. 1-5
    • He, X.1    Yener, A.2
  • 16
    • 79957975387 scopus 로고    scopus 로고
    • Secrecy in Gaussian MIMO bidirectional broadcast wiretap channels: Transmit strategies
    • Pacific Grove, CA, USA, Nov.
    • S. Al-Sayed and A. Sezgin, "Secrecy in Gaussian MIMO Bidirectional Broadcast Wiretap Channels: Transmit Strategies," in Proc. Asilomar Conf. Signals, Systems, Computers, Pacific Grove, CA, USA, Nov. 2010, pp. 285-289.
    • (2010) Proc. Asilomar Conf. Signals, Systems, Computers , pp. 285-289
    • Al-Sayed, S.1    Sezgin, A.2
  • 17
    • 78751521977 scopus 로고    scopus 로고
    • Securing multi-antenna two-way relay channels with analog network coding against eavesdroppers
    • Marrakech, Morocco, Jun.
    • A. Mukherjee and A. L. Swindlehurst, "Securing Multi-Antenna Two-Way Relay Channels With Analog Network Coding Against Eavesdroppers," in Proc. IEEE Signal Process. Adv. Wireless Commun., Marrakech, Morocco, Jun. 2010, pp. 1-5.
    • (2010) Proc. IEEE Signal Process. Adv. Wireless Commun. , pp. 1-5
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 18
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • U. M. Maurer and S. Wolf, "Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free," Proc. EUROCRYPT 2000 on Advances in Cryptography, vol. 1807, pp. 351-368, 2000.
    • (2000) Proc. EUROCRYPT 2000 on Advances in Cryptography , vol.1807 , pp. 351-368
    • Maurer, U.M.1    Wolf, S.2
  • 19
    • 80054812190 scopus 로고    scopus 로고
    • How to achieve privacy in bidirectional relay networks
    • Saint Petersburg, Russia, Jul, accepted
    • R. F. Wyrembelski and H. Boche, "How to Achieve Privacy in Bidirectional Relay Networks," in Proc. IEEE Int. Symp. Inf. Theory, Saint Petersburg, Russia, Jul. 2011, accepted.
    • (2011) Proc. IEEE Int. Symp. Inf. Theory
    • Wyrembelski, R.F.1    Boche, H.2
  • 20


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.