-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 29, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.29
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1367, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1367
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Korner, J.2
-
4
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul.
-
S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
-
5
-
-
0347337828
-
Secure space-time communication
-
Dec.
-
A. Hero, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero, A.1
-
6
-
-
84931425598
-
Secret communication using artificial noise
-
Dallas, TX, Sep.
-
R. Negi and S. Goel, "Secret communication using artificial noise," in Proc. IEEE Vehicular Technology Conf., Dallas, TX, Sep. 2005, vol. 3, pp. 1906-1910.
-
(2005)
Proc. IEEE Vehicular Technology Conf.
, vol.3
, pp. 1906-1910
-
-
Negi, R.1
Goel, S.2
-
7
-
-
70449503892
-
Secrecy capacity region of the gaussian multi-receiver wiretap channel
-
Seoul, Korea, Jun.
-
E. Ekrem and S. Ulukus, "Secrecy capacity region of the gaussian multi-receiver wiretap channel," in Proc. IEEE Int. Symp. Inf. Theory, Seoul, Korea, Jun. 2009, pp. 2612-2616.
-
(2009)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2612-2616
-
-
Ekrem, E.1
Ulukus, S.2
-
8
-
-
66949180834
-
A note on the secrecy capacity of the multipleantenna wiretap channel
-
Jun.
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
9
-
-
70350706020
-
The capacity region of the degraded multiple-input multiple-output compound broadcast channel
-
Nov.
-
H.Weingarten, T. Liu, S. Shamai,Y. Steinberg, and P.Viswanath, "The capacity region of the degraded multiple-input multiple-output compound broadcast channel," IEEE Trans. Inf. Theory, vol. 55, no. 11, pp. 5011-5023, Nov. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.11
, pp. 5011-5023
-
-
Weingarten, H.1
Liu, T.2
Shamai, S.3
Steinberg, Y.4
Viswanath, P.5
-
10
-
-
77949614838
-
On the relationship between the multi-antenna secrecy communications and cognitive radio communications
-
Monticello, IL, Sep.
-
L. Zhang, R. Zhang, Y. Liang, Y. Xin, and S. Cui, "On the relationship between the multi-antenna secrecy communications and cognitive radio communications," in Proc. Allerton Conf. Communications, Control, and Computing, Monticello, IL, Sep. 2009.
-
(2009)
Proc. Allerton Conf. Communications, Control, and Computing
-
-
Zhang, L.1
Zhang, R.2
Liang, Y.3
Xin, Y.4
Cui, S.5
-
11
-
-
33847353721
-
Secret communication in presence of colluding eavesdroppers
-
Oct.
-
S. Goel and R. Negi, "Secret communication in presence of colluding eavesdroppers," in Proc. Military Commun. Conf., Oct. 2005, pp. 1501-1506.
-
(2005)
Proc. Military Commun. Conf.
, pp. 1501-1506
-
-
Goel, S.1
Negi, R.2
-
12
-
-
52349113391
-
Secrecy in cooperative relay broadcast channels
-
Toronto, ON, Jul.
-
E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," in Proc. IEEE Int. Symp. Inf. Theory, Toronto, ON, Jul. 2008, pp. 2217-2221.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2217-2221
-
-
Ekrem, E.1
Ulukus, S.2
-
13
-
-
33749450172
-
Secrecy capacity of SIMO and slow fading channels
-
DOI 10.1109/ISIT.2005.1523727, 1523727, Proceedings of the 2005 IEEE International Symposium on Information Theory, ISIT 05
-
P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. Inf. Theory, Adelaide, Australia, Sep. 2005, pp. 2152-2155. (Pubitemid 44508426)
-
(2005)
IEEE International Symposium on Information Theory - Proceedings
, vol.2005
, pp. 2152-2155
-
-
Parada, P.1
Blahut, R.2
-
15
-
-
84940654702
-
Secrecy capacity of independent parallel channels
-
Sep.
-
Z. Li, R. Yates, and W. Trappe, "Secrecy capacity of independent parallel channels," in Proc. Annu. Allerton Conf. Communication, Control and Computing, Sep. 2006, pp. 841-848.
-
(2006)
Proc. Annu. Allerton Conf. Communication, Control and Computing
, pp. 841-848
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
16
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
17
-
-
45249119255
-
Secure communication over fading channels
-
Jun.
-
Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
18
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
U. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," Eurocrypt 2000, Lecture Notes in Computer Science, vol. 1807, p. 351, 2000.
-
(2000)
Eurocrypt 2000, Lecture Notes in Computer Science
, vol.1807
, pp. 351
-
-
Maurer, U.1
Wolf, S.2
-
20
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
21
-
-
0027629488
-
Common randomness in information theory and cryptography-Part I: Secret sharing
-
Jul.
-
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
22
-
-
0033097504
-
Unconditionally secure key agreement and intrinsic conditional information
-
Mar.
-
U. M. Maurer and S.Wolf, "Unconditionally secure key agreement and intrinsic conditional information," IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.2
, pp. 499-514
-
-
Maurer, U.M.1
Wolf, S.2
-
23
-
-
39049151282
-
LDPC-based secret key agreement over the gaussian wiretap channel
-
Seattle, WA
-
M. Bloch, A. Thangaraj, S. W. McLaughlin, and J.-M. Merolla, "LDPC-based secret key agreement over the gaussian wiretap channel," in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, 2006.
-
(2006)
Proc. IEEE Int. Symp. Inf. Theory
-
-
Bloch, M.1
Thangaraj, A.2
McLaughlin, S.W.3
Merolla, J.-M.4
-
24
-
-
33749452174
-
On achieving capacity on the wire tap channel using LDPC codes
-
DOI 10.1109/ISIT.2005.1523593, 1523593, Proceedings of the 2005 IEEE International Symposium on Information Theory, ISIT 05
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. McLaughlin, and J.-M. Merolla, "On achieving capacity on the wire tap channel using LDPC codes," in Proc. IEEE Int. Symp. Inf. Theory, Adelaide, Australia, Sep. 2005, pp. 1498-1502. (Pubitemid 44508292)
-
(2005)
IEEE International Symposium on Information Theory - Proceedings
, vol.2005
, pp. 1498-1502
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
25
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
DOI 10.1109/TIT.2007.901143
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J.-M. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007. (Pubitemid 47249863)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
26
-
-
33747886952
-
Secret key agreement from correlated source outputs using low density parity check matrices
-
DOI 10.1093/ietfec/e89-a.7.2036
-
J. Muramatsu, "Secret key agreement from correlated source outputs using low density parity check matrices," IEICE Trans. Fund. Elec. Commun. Comp., vol. E89-A, no. 7, pp. 2036-2046, Jul. 2006. (Pubitemid 44290411)
-
(2006)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E89-A
, Issue.7
, pp. 2036-2046
-
-
Muramatsu, J.1
-
28
-
-
52349086199
-
The secrecy graph and some of its properties
-
Toronto, Canada, Jul.
-
M. Haenggi, "The secrecy graph and some of its properties," in Proc. IEEE Int. Symp. Inf. Theory, Toronto, Canada, Jul. 2008.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory
-
-
Haenggi, M.1
-
29
-
-
62949215603
-
Physical-layer security in stochastic wireless networks
-
Guangzhou, China, Nov.
-
P. C. Pinto, J. O. Barros, and M. Z. Win, "Physical-layer security in stochastic wireless networks," in Proc. IEEE Int. Conf. Commun. Systems, Guangzhou, China, Nov. 2008, pp. 974-979.
-
(2008)
Proc. IEEE Int. Conf. Commun. Systems
, pp. 974-979
-
-
Pinto, P.C.1
Barros, J.O.2
Win, M.Z.3
-
30
-
-
70449514137
-
Secrecy throughput of MANETs with malicious nodes
-
Jun.
-
Y. Liang, H. V. Poor, and L. Ying, "Secrecy throughput of MANETs with malicious nodes," inProc. IEEEInt. Symp. Inf. Theory, Jun. 2009, pp. 1189-1193.
-
(2009)
Proc. IEEEInt. Symp. Inf. Theory
, pp. 1189-1193
-
-
Liang, Y.1
Poor, H.V.2
Ying, L.3
-
31
-
-
77952682796
-
On secrecy capacity scaling in wireless networks
-
San Diego, CA, Feb.
-
O. O. Koyluoglu, C. E. Koksal, and H. E. Gamal, "On secrecy capacity scaling in wireless networks," in Proc. Inf. Theory and Applications Workshop, San Diego, CA, Feb. 2010, pp. 1-4.
-
(2010)
Proc. Inf. Theory and Applications Workshop
, pp. 1-4
-
-
Koyluoglu, O.O.1
Koksal, C.E.2
Gamal, H.E.3
-
32
-
-
84855911932
-
Secure communication in stochastic wireless networks-Part II: Maximum rate and collusion
-
Feb.
-
P. C. Pinto, J. O. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks-Part II: Maximum rate and collusion," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, Feb. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
-
-
Pinto, P.C.1
Barros, J.O.2
Win, M.Z.3
-
33
-
-
62949241345
-
A mathematical theory of network interference and its applications
-
Feb.
-
M. Z. Win, P. C. Pinto, and L. A. Shepp, "A mathematical theory of network interference and its applications," Special Issue on Ultra- Wide Bandwidth (UWB) Technology and Emerging Applications, Proc. IEEE, vol. 97, no. 2, pp. 205-230, Feb. 2009.
-
(2009)
Special Issue on Ultra- Wide Bandwidth (UWB) Technology and Emerging Applications, Proc. IEEE
, vol.97
, Issue.2
, pp. 205-230
-
-
Win, M.Z.1
Pinto, P.C.2
Shepp, L.A.3
-
34
-
-
84055212368
-
The behavior of unbounded path-loss models and the effect of singularity on computed network characteristics
-
Sep.
-
H. Inaltekin, M. Chiang, H. V. Poor, and S. B.Wicker, "The behavior of unbounded path-loss models and the effect of singularity on computed network characteristics," IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1078-1092, Sep. 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.7
, pp. 1078-1092
-
-
Inaltekin, H.1
Chiang, M.2
Poor, H.V.3
Wicker, S.B.4
-
35
-
-
0003523893
-
-
London, U.K.: Oxford Univ. Press
-
J. Kingman, Poisson Processes. London, U.K.: Oxford Univ. Press, 1993.
-
(1993)
Poisson Processes
-
-
Kingman, J.1
-
38
-
-
0000579421
-
Randomsubdivisions of space into crystals
-
E. N. Gilbert, "Randomsubdivisions of space into crystals," Ann. Math. Statist., vol. 33, pp. 958-972, 1962.
-
(1962)
Ann. Math. Statist.
, vol.33
, pp. 958-972
-
-
Gilbert, E.N.1
|