-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 29, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.29
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1367, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1367
-
-
Wyner, A.D.1
-
3
-
-
0027629488
-
Common randomness in information theory and cryptography - Part I: Secret sharing
-
Jul.
-
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography - Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
4
-
-
0347337828
-
Secure space-time communication
-
Dec.
-
A. Hero, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero, A.1
-
5
-
-
33749450172
-
Secrecy capacity of SIMO and slow fading channels
-
DOI 10.1109/ISIT.2005.1523727, 1523727, Proceedings of the 2005 IEEE International Symposium on Information Theory, ISIT 05
-
P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. Inf. Theory, Adelaide, Australia, Sep. 2005, pp. 2152-2155. (Pubitemid 44508426)
-
(2005)
IEEE International Symposium on Information Theory - Proceedings
, vol.2005
, pp. 2152-2155
-
-
Parada, P.1
Blahut, R.2
-
6
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
7
-
-
84940654702
-
Secrecy capacity of independent parallel channels
-
Sep.
-
Z. Li, R. Yates, and W. Trappe, "Secrecy capacity of independent parallel channels," in Proc. Annu. Allerton Conf. Communication, Control and Computing, Sep. 2006, pp. 841-848.
-
(2006)
Proc. Annu. Allerton Conf. Communication, Control and Computing
, pp. 841-848
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
9
-
-
33847353721
-
Secret communication in presence of colluding eavesdroppers
-
Oct.
-
S. Goel and R. Negi, "Secret communication in presence of colluding eavesdroppers," in Proc. Military Commun. Conf., Oct. 2005, pp. 1501-1506.
-
(2005)
Proc. Military Commun. Conf.
, pp. 1501-1506
-
-
Goel, S.1
Negi, R.2
-
10
-
-
84855923041
-
Secure communication in stochastic wireless networks-Part I: Connectivity
-
Feb.
-
P. C. Pinto, J. O. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks-Part I: connectivity," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, Feb. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
-
-
Pinto, P.C.1
Barros, J.O.2
Win, M.Z.3
-
13
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul.
-
S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
-
15
-
-
62949241345
-
A mathematical theory of network interference and its applications
-
Feb.
-
M. Z. Win, P. C. Pinto, and L. A. Shepp, "A mathematical theory of network interference and its applications," Special Issue on Ultra- Wide Bandwidth (UWB) Technology and Emerging Applications, Proc. IEEE, vol. 97, no. 2, pp. 205-230, Feb. 2009.
-
(2009)
Special Issue on Ultra- Wide Bandwidth (UWB) Technology and Emerging Applications, Proc. IEEE
, vol.97
, Issue.2
, pp. 205-230
-
-
Win, M.Z.1
Pinto, P.C.2
Shepp, L.A.3
-
16
-
-
33749452174
-
On achieving capacity on the wire tap channel using LDPC codes
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. McLaughlin, and J.-M. Merolla, "On achieving capacity on the wire tap channel using LDPC codes," in Proc. IEEE Int. Symp. Inf. Theory, 2005.
-
(2005)
Proc. IEEE Int. Symp. Inf. Theory
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.4
Merolla, J.-M.5
-
17
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
DOI 10.1109/TIT.2007.901143
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J.-M. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007. (Pubitemid 47249863)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
18
-
-
33747886952
-
Secret key agreement from correlated source outputs using low density parity check matrices
-
DOI 10.1093/ietfec/e89-a.7.2036
-
J. Muramatsu, "Secret key agreement from correlated source outputs using low density parity check matrices," IEICE Trans. Fund. Elec. Commun. Comp., vol. E89-A, no. 7, pp. 2036-2046, Jul. 2006. (Pubitemid 44290411)
-
(2006)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E89-A
, Issue.7
, pp. 2036-2046
-
-
Muramatsu, J.1
-
20
-
-
0003523893
-
-
London, U.K.: Oxford Univ. Press
-
J. Kingman, Poisson Processes. London, U.K.: Oxford Univ. Press, 1993.
-
(1993)
Poisson Processes
-
-
Kingman, J.1
|