-
1
-
-
84890522850
-
Communication Theory of Secrecy Systems
-
Sep.
-
C. Shannon, "Communication Theory of Secrecy Systems," Bell Syst. Tech. Journal, vol. 28, no. 4, pp. 656-715, Sep. 1949.
-
(1949)
Bell Syst. Tech. Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.1
-
2
-
-
0016562514
-
The Wire-Tap Channel
-
Oct.
-
A. D. Wyner, "The Wire-Tap Channel," Bell Syst. Tech. Journal, vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast Channels with Confidential Messages
-
May
-
I. Csiszar and J. Komer, "Broadcast Channels with Confidential Messages,"IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Komer, J.2
-
4
-
-
0017996501
-
The Gaussian Wire-tap Channel
-
July
-
S. Leung-Yan-Cheong and M. Hellman, "The Gaussian Wire-tap Channel,"IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
-
5
-
-
48049102969
-
The Gaussian Multiple Access Wire-Tap Channel: Wireless Secrecy and Cooperative Jamming
-
E. Tekin and A. Yener, "The Gaussian Multiple Access Wire-Tap Channel: Wireless Secrecy and Cooperative Jamming," in Proc. Inf. Theory Applications Workshop, San Diego, CA, Jan. 2007.
-
Proc. Inf. Theory Applications Workshop, San Diego, CA, Jan. 2007
-
-
Tekin, E.1
Yener, A.2
-
6
-
-
45249101530
-
The General Gaussian Multiple Access and Two-Way Wire-Tap Channels: Achievable Rates and Cooperative Jamming
-
June
-
E. Tekin and A. Yener, "The General Gaussian Multiple Access and Two-Way Wire-Tap Channels: Achievable Rates and Cooperative Jamming,"IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
7
-
-
84940659555
-
Achievable Rates for the General Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy
-
E. Tekin and A. Yener, "Achievable Rates for the General Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy," in Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 2006.
-
Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 2006
-
-
Tekin, E.1
Yener, A.2
-
8
-
-
40949147785
-
Multiple-Access Channels with Confidential Messages
-
Mar.
-
Y. Liang and H. V. Poor, "Multiple-Access Channels with Confidential Messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.3
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
9
-
-
39049089566
-
The Discrete Memoryless Multiple Access Channel with Condifential Messages
-
R. Liu, I. Marić, R. D. Yates and P. Spasojević, "The Discrete Memoryless Multiple Access Channel with Condifential Messages," in Proc. IEEE Int. Symp. Inf. Theory, ISIT, Seattle, WA, July 2006.
-
Proc. IEEE Int. Symp. Inf. Theory, ISIT, Seattle, WA, July 2006
-
-
Liu, R.1
Marić, I.2
Yates, R.D.3
Spasojević, P.4
-
10
-
-
84940648008
-
Discrete Memoryless Interference and Broadcast Channels with Condifential Messages
-
R. Liu, I. Marić, P. Spasojević and R. D. Yates, "Discrete Memoryless Interference and Broadcast Channels with Condifential Messages," in Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 2006.
-
Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 2006
-
-
Liu, R.1
Marić, I.2
Spasojević, P.3
Yates, R.D.4
-
11
-
-
84940652489
-
Cognitive Interference Channels with Condifential Messages
-
Shitz
-
Y. Liang, A. Somekh Baruch, H. V. Poor, S. Shamai (Shitz) and S. Verdú, "Cognitive Interference Channels with Condifential Messages,"in Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 2007.
-
Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 2007
-
-
Liang, Y.1
Somekh Baruch, A.2
Poor, H.V.3
Shamai, S.4
Verdú, S.5
-
12
-
-
51349109773
-
The Relay-Eavesdropper Channel: Cooperation for Secrecy
-
Sep.
-
L. Lai and H. El Gamal, "The Relay-Eavesdropper Channel: Cooperation for Secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
13
-
-
76649123145
-
Two-hop Secure Communication Using an Untrusted Relay
-
Article ID 305146, doi:10.1155/2009/305146
-
X. He and A, Yener, "Two-hop Secure Communication Using an Untrusted Relay," EURASIP Jour. Wireless Commun. Netw., Special Issue on Wireless Physical Layer Security, vol. 2009, Article ID 305146, 13 pages, 2009. doi:10.1155/2009/305146.
-
(2009)
EURASIP Jour. Wireless Commun. Netw., Special Issue on Wireless Physical Layer Security
, vol.2009
, pp. 13
-
-
He, X.1
Yener, A.2
-
14
-
-
78650894311
-
Secrecy in Cooperative Relay Broadcast Channels
-
Jan.
-
E. Ekrem and S. Ulukus, "Secrecy in Cooperative Relay Broadcast Channels," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 137-155, Jan. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.1
, pp. 137-155
-
-
Ekrem, E.1
Ulukus, S.2
-
15
-
-
52349118726
-
The Gaussian Wiretap ChannelWith a Helping Interferer
-
X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "The Gaussian Wiretap ChannelWith a Helping Interferer," in Proc. IEEE Int. Symp. Inf. Theory, Toronto, Canada, July 2008.
-
Proc. IEEE Int. Symp. Inf. Theory, Toronto, Canada, July 2008
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.V.4
-
16
-
-
79951955741
-
Providing Secrecy with Structured Codes: Tools and Applications to Two-User Gaussian Channels
-
July submitted for publication
-
X. He and A. Yener, "Providing Secrecy With Structured Codes: Tools and Applications to Two-User Gaussian Channels," IEEE Trans. Inf. Theory, July 2009, submitted for publication.
-
(2009)
IEEE Trans. Inf. Theory
-
-
He, X.1
Yener, A.2
-
17
-
-
79960578903
-
Cooperative Jamming via Spectrum Leasing
-
I. Stanojev and A. Yener, "Cooperative Jamming via Spectrum Leasing,"in Proc. IEEE 9th Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt, Princeton, NJ, May 2011.
-
Proc. IEEE 9th Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt, Princeton, NJ, May 2011
-
-
Stanojev, I.1
Yener, A.2
-
18
-
-
77953220836
-
Cooperative ARQ via Auction-Based Spectrum Leasing
-
June
-
I. Stanojev, O. Simeone, U. Spagnolini, Y. Bar-Ness and R. Pickholtz, "Cooperative ARQ via Auction-Based Spectrum Leasing," IEEE Trans. Commun., vol. 58, no. 6, pp. 1843-1856, June 2010.
-
(2010)
IEEE Trans. Commun.
, vol.58
, Issue.6
, pp. 1843-1856
-
-
Stanojev, I.1
Simeone, O.2
Spagnolini, U.3
Bar-Ness, Y.4
Pickholtz, R.5
-
19
-
-
84980096808
-
Counterspeculations, Auctions, and Competitive Sealed Tenders
-
W. Vickrey, "Counterspeculations, Auctions, and Competitive Sealed Tenders," Journal of Finance, vol. 16, pp. 8-37, 1961.
-
(1961)
Journal of Finance
, vol.16
, pp. 8-37
-
-
Vickrey, W.1
-
21
-
-
0032804976
-
Auction Theory: A Guide to the Literature
-
Jul.
-
P. Klemperer, "Auction Theory: A Guide to the Literature," J. Economics Surveys, vol. 13, no. 3, pp. 227-286, Jul. 1999.
-
(1999)
J. Economics Surveys
, vol.13
, Issue.3
, pp. 227-286
-
-
Klemperer, P.1
-
22
-
-
0040952956
-
Vickrey Auctions in Practice: From Nineteenth-Century Philately to Twenty-First-Century E-Commerce
-
Summer
-
D. Lucking-Reiley, "Vickrey Auctions in Practice: From Nineteenth-Century Philately to Twenty-First-Century E-Commerce," Journal of Economic Perspectives, vol. 14, no. 3, pp. 183-192, Summer 2000.
-
(2000)
Journal of Economic Perspectives
, vol.14
, Issue.3
, pp. 183-192
-
-
Lucking-Reiley, D.1
-
23
-
-
84935607379
-
Why Are Vickrey Auctions Rare?
-
Feb.
-
M. Rothkopf, T. Teisberg, and E. Kahn, "Why Are Vickrey Auctions Rare?" Journal of Political Economy, vol. 98, no. 1, pp. 94-109, Feb. 1990.
-
(1990)
Journal of Political Economy
, vol.98
, Issue.1
, pp. 94-109
-
-
Rothkopf, M.1
Teisberg, T.2
Kahn, E.3
-
24
-
-
50249145204
-
Robust Auction-Teoretic Partner Selection in Cooperative Diversity Wireless Networks
-
A. Mukherjee and H. M. Kwon, "Robust Auction-Teoretic Partner Selection in Cooperative Diversity Wireless Networks," in Proc. Allerton Conf. Signals, Syst., Computers, Nov. 2007, pp. 443-447.
-
Proc. Allerton Conf. Signals, Syst., Computers, Nov. 2007
, pp. 443-447
-
-
Mukherjee, A.1
Kwon, H.M.2
-
25
-
-
38549164847
-
An Auction Based AODV Protocol for Mobile Ad Hoc Networks with Selfish Nodes
-
C. Demir and C. Comaniciu, "An Auction Based AODV Protocol for Mobile Ad Hoc Networks with Selfish Nodes," in Proc. IEEE Int. Conf. Commun., June 2007, pp. 3351-3356.
-
Proc. IEEE Int. Conf. Commun., June 2007
, pp. 3351-3356
-
-
Demir, C.1
Comaniciu, C.2
-
26
-
-
33646393504
-
Wireless Channel Allocation Using an Auction Algorithm
-
May
-
J. Sun, E. Modiano, and L. Zheng, "Wireless Channel Allocation Using an Auction Algorithm," IEEE Jour. Select. Areas Commun., vol. 24, no. 5, pp. 1085-1096, May 2006.
-
(2006)
IEEE Jour. Select. Areas Commun.
, vol.24
, Issue.5
, pp. 1085-1096
-
-
Sun, J.1
Modiano, E.2
Zheng, L.3
-
27
-
-
0000962286
-
Issues in Computational Vickrey Auctions
-
Mar.
-
T. Sandholm, "Issues in Computational Vickrey Auctions," Int. J. Electronic Commerce, vol. 4, no. 3, pp. 107-129, Mar. 2000.
-
(2000)
Int. J. Electronic Commerce
, vol.4
, Issue.3
, pp. 107-129
-
-
Sandholm, T.1
-
28
-
-
79951647261
-
Optimal Beamforming in Interference Networks with Perfect Local Channel Information
-
Mar.
-
R. Mochaourab and E. A. Jorswieck, "Optimal Beamforming in Interference Networks with Perfect Local Channel Information," IEEE Trans. Signal Proc., vol. 59, no. 3, pp. 1128-1141, Mar. 2011.
-
(2011)
IEEE Trans. Signal Proc.
, vol.59
, Issue.3
, pp. 1128-1141
-
-
Mochaourab, R.1
Jorswieck, E.A.2
-
29
-
-
77949693121
-
Ergodic and Outage Performance of Fading Broadcast Channels with 1-Bit Feedback
-
Mar.
-
B. Niu, O. Simeone, O. Somekh and A. M. Haimovich, "Ergodic and Outage Performance of Fading Broadcast Channels with 1-Bit Feedback," IEEE Trans. Veh. Technol., vol. 59, no. 3, pp. 1282 - 1293, Mar. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.3
, pp. 1282-1293
-
-
Niu, B.1
Simeone, O.2
Somekh, O.3
Haimovich, A.M.4
-
30
-
-
77953276331
-
Bandwidth Exchange: An Energy Conserving Incentive Mechanism for Cooperation
-
June
-
D. Zhang, R. Shinkuma and N. B. Mandayam, "Bandwidth Exchange: An Energy Conserving Incentive Mechanism for Cooperation," IEEE Trans. Wireless Commun., vol. 9, No. 6, pp. 2055-2065, June 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.6
, pp. 2055-2065
-
-
Zhang, D.1
Shinkuma, R.2
Mandayam, N.B.3
|