-
1
-
-
33847736358
-
Spectral efficient protocols for half-duplex fading relay channels
-
Feb.
-
B. Rankov and A. Wittneben, "Spectral Efficient Protocols for Half-Duplex Fading Relay Channels," IEEE J. Sel. Areas Commun., vol. 25, no. 2, pp. 379-389, Feb. 2007.
-
(2007)
IEEE J. Sel. Areas Commun.
, vol.25
, Issue.2
, pp. 379-389
-
-
Rankov, B.1
Wittneben, A.2
-
2
-
-
34047127447
-
Coded Bi-directional Relaying
-
Stockholm, Sweden, May
-
P. Larsson, N. Johansson, and K.-E. Sunell, "Coded Bi-directional Relaying," in Proc. 5th Scandinavian Workshop on Ad Hoc Networks, Stockholm, Sweden, May 2005, pp. 851-855.
-
(2005)
Proc. 5th Scandinavian Workshop on Ad Hoc Networks
, pp. 851-855
-
-
Larsson, P.1
Johansson, N.2
Sunell, K.-E.3
-
3
-
-
38349180108
-
Broadcast capacity region of two-phase bidirectional relaying
-
Jan.
-
T. J. Oechtering, C. Schnurr, I. Bjelaković, and H. Boche, "Broadcast Capacity Region of Two-Phase Bidirectional Relaying," IEEE Trans. Inf. Theory, vol. 54, no. 1, pp. 454-458, Jan. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.1
, pp. 454-458
-
-
Oechtering, T.J.1
Schnurr, C.2
Bjelaković, I.3
Boche, H.4
-
4
-
-
55349107839
-
Performance bounds for bidirectional coded cooperation protocols
-
Nov.
-
S. J. Kim, P. Mitran, and V. Tarokh, "Performance Bounds for Bidirectional Coded Cooperation Protocols," IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 5235-5241, Nov. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.11
, pp. 5235-5241
-
-
Kim, S.J.1
Mitran, P.2
Tarokh, V.3
-
5
-
-
46749104134
-
Capacity for classes of broadcast channels with receiver side information
-
Shitz, Tahoe City, CA, USA, Sep.
-
G. Kramer and S. Shamai (Shitz), "Capacity for Classes of Broadcast Channels with Receiver Side Information," in Proc. IEEE Inf. Theory Workshop, Tahoe City, CA, USA, Sep. 2007, pp. 313-318.
-
(2007)
Proc. IEEE Inf. Theory Workshop
, pp. 313-318
-
-
Kramer, G.1
Shamai, S.2
-
6
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The Wire-Tap Channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
7
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast Channels with Confidential Messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
8
-
-
68349116049
-
Information theoretic security
-
Shitz
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Information Theoretic Security," Foundations and Trends in Communications and Information Theory, vol. 5, no. 4-5, p. 355580, 2009.
-
(2009)
Foundations and Trends in Communications and Information Theory
, vol.5
, Issue.4-5
, pp. 355580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
9
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless Information-Theoretic Security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
10
-
-
54249103656
-
Strong secrecy for wireless channels
-
Calgary, Canada, Aug, invited
-
J. Barros and M. Bloch, "Strong Secrecy for Wireless Channels," in Int. Conf. on Information-Theoretic Security, Calgary, Canada, Aug. 2008, pp. 40-53, invited.
-
(2008)
Int. Conf. on Information-theoretic Security
, pp. 40-53
-
-
Barros, J.1
Bloch, M.2
-
11
-
-
40949147785
-
Multiple-access channels with confidential messages
-
Mar.
-
Y. Liang and H. V. Poor, "Multiple-Access Channels With Confidential Messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.3
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
12
-
-
45249090083
-
Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
-
Jun.
-
R. Liu, I. Marić, P. Spasojević, and R. D. Yates, "Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2493-2507
-
-
Liu, R.1
Marić, I.2
Spasojević, P.3
Yates, R.D.4
-
13
-
-
77955676680
-
Gaussian MIMO broadcast channels with common and confidential messages
-
Austin, TX, USA, Jun.
-
E. Ekrem and S. Ulukus, "Gaussian MIMO Broadcast Channels with Common and Confidential Messages," in Proc. IEEE Int. Symp. Inf. Theory, Austin, TX, USA, Jun. 2010, pp. 2583-2587.
-
(2010)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2583-2587
-
-
Ekrem, E.1
Ulukus, S.2
-
14
-
-
77955354714
-
A new outer bound for the secrecy capacity region of the gaussian two-way wiretap channel
-
Cape Town, South Africa, May
-
X. He and A. Yener, "A New Outer Bound for the Secrecy Capacity Region of the Gaussian Two-Way Wiretap Channel," in Proc. IEEE Int. Conf. Commun., Cape Town, South Africa, May 2010, pp. 1-5.
-
(2010)
Proc. IEEE Int. Conf. Commun.
, pp. 1-5
-
-
He, X.1
Yener, A.2
-
15
-
-
77954826162
-
New achievable secrecy rate regions for the two way wiretap channel
-
Cairo, Egypt, Jan.
-
A. El Gamal, O. O. Koyluoglu, M. Youssef, and H. El Gamal, "New Achievable Secrecy Rate Regions for the Two Way Wiretap Channel," in Proc. IEEE Inf. Theory Workshop, Cairo, Egypt, Jan. 2010, pp. 1-5.
-
(2010)
Proc. IEEE Inf. Theory Workshop
, pp. 1-5
-
-
El Gamal, A.1
Koyluoglu, O.O.2
Youssef, M.3
El Gamal, H.4
-
16
-
-
79957975387
-
Secrecy in Gaussian MIMO bidirectional broadcast wiretap channels: Transmit strategies
-
Pacific Grove, CA, USA, Nov.
-
S. Al-Sayed and A. Sezgin, "Secrecy in Gaussian MIMO Bidirectional Broadcast Wiretap Channels: Transmit Strategies," in Proc. Asilomar Conf. Signals, Systems, Computers, Pacific Grove, CA, USA, Nov. 2010, pp. 285-289.
-
(2010)
Proc. Asilomar Conf. Signals, Systems, Computers
, pp. 285-289
-
-
Al-Sayed, S.1
Sezgin, A.2
-
17
-
-
78751521977
-
Securing multi-antenna two-way relay channels with analog network coding against eavesdroppers
-
Marrakech, Morocco, Jun.
-
A. Mukherjee and A. L. Swindlehurst, "Securing Multi-Antenna Two-Way Relay Channels With Analog Network Coding Against Eavesdroppers," in Proc. IEEE Signal Process. Adv. Wireless Commun., Marrakech, Morocco, Jun. 2010, pp. 1-5.
-
(2010)
Proc. IEEE Signal Process. Adv. Wireless Commun.
, pp. 1-5
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
18
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
U. M. Maurer and S. Wolf, "Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free," Proc. EUROCRYPT 2000 on Advances in Cryptography, vol. 1807, pp. 351-368, 2000.
-
(2000)
Proc. EUROCRYPT 2000 on Advances in Cryptography
, vol.1807
, pp. 351-368
-
-
Maurer, U.M.1
Wolf, S.2
-
19
-
-
80054812190
-
How to achieve privacy in bidirectional relay networks
-
Saint Petersburg, Russia, Jul, accepted
-
R. F. Wyrembelski and H. Boche, "How to Achieve Privacy in Bidirectional Relay Networks," in Proc. IEEE Int. Symp. Inf. Theory, Saint Petersburg, Russia, Jul. 2011, accepted.
-
(2011)
Proc. IEEE Int. Symp. Inf. Theory
-
-
Wyrembelski, R.F.1
Boche, H.2
-
20
-
-
79551643387
-
MIMO bidirectional broadcast channels with common message
-
Miami, FL, USA, Dec.
-
R. F. Wyrembelski, T. J. Oechtering, and H. Boche, "MIMO Bidirectional Broadcast Channels with Common Message," in Proc. IEEE Global Commun. Conf., Miami, FL, USA, Dec. 2010, pp. 1-5.
-
(2010)
Proc. IEEE Global Commun. Conf.
, pp. 1-5
-
-
Wyrembelski, R.F.1
Oechtering, T.J.2
Boche, H.3
|