-
1
-
-
33747142749
-
The capacity of wireless networks
-
Mar.
-
P. Gupta and P. R. Kumar, "The capacity of wireless networks," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 388-404, Mar. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.2
, pp. 388-404
-
-
Gupta, P.1
Kumar, P.R.2
-
2
-
-
33947689700
-
Closing the gap in the capacity of wireless networks via percolation theory
-
Mar.
-
M. Franceschetti, O. Dousse, D. N. C. Tse, and P. Thiran, "Closing the gap in the capacity of wireless networks via percolation theory," IEEE Trans. Inf. Theory, vol. 53, no. 3, pp. 1009-1018, Mar. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.3
, pp. 1009-1018
-
-
Franceschetti, M.1
Dousse, O.2
Tse, D.N.C.3
Thiran, P.4
-
3
-
-
70449491193
-
Ergodic interference alignment
-
Jun.
-
B. Nazer, S. A. Jafar, M. Gastpar, and S. Vishwanath, "Ergodic interference alignment," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2009, pp. 1769-1773.
-
(2009)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1769-1773
-
-
Nazer, B.1
Jafar, S.A.2
Gastpar, M.3
Vishwanath, S.4
-
4
-
-
48849113556
-
Interference alignment and degrees of freedom for the k-user interference channel
-
Aug.
-
V. R. Cadambe and S. A. Jafar, "Interference alignment and degrees of freedom for the K-user interference channel," IEEE Trans. Inf. Theory, vol. 54, no. 8, pp. 3425-3441, Aug. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.8
, pp. 3425-3441
-
-
Cadambe, V.R.1
Jafar, S.A.2
-
5
-
-
48849083691
-
Communication over mimo x channels: Interference alignment, decomposition, and performance analysis
-
Aug.
-
M. A. Maddah-Ali, A. S. Motahari, and A. K. Khandani, "Communication over MIMO X channels: Interference alignment, decomposition, and performance analysis," IEEE Trans. Inf. Theory, vol. 54, no. 8, pp. 3457-3470, Aug. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.8
, pp. 3457-3470
-
-
Maddah-Ali, M.A.1
Motahari, A.S.2
Khandani, A.K.3
-
6
-
-
79955508345
-
Interference alignment in dense wireless networks
-
May
-
U. Niesen, "Interference alignment in dense wireless networks," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 2889-2901, May 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.5
, pp. 2889-2901
-
-
Niesen, U.1
-
7
-
-
35148893949
-
Hierarchical cooperation achieves optimal capacity scaling in ad hoc networks
-
Oct.
-
A. Özgür, O. Lévěque, and D. N. C. Tse, "Hierarchical cooperation achieves optimal capacity scaling in ad hoc networks," IEEE Trans. Inf. Theory, vol. 53, no. 10, pp. 3549-3572, Oct. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.10
, pp. 3549-3572
-
-
Özgür, A.1
Lévěque, O.2
Tse, D.N.C.3
-
8
-
-
69449084131
-
On capacity scaling in arbitrary wireless networks
-
Sep.
-
U. Niesen, P. Gupta, and D. Shah, "On capacity scaling in arbitrary wireless networks," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 3959-3982, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.9
, pp. 3959-3982
-
-
Niesen, U.1
Gupta, P.2
Shah, D.3
-
9
-
-
68249150733
-
Hierarchical cooperation in ad hoc networks: Optimal clustering and achievable throughput
-
Aug.
-
J. Ghaderi, L.-L. Xie, and X. Shen, "Hierarchical cooperation in ad hoc networks: Optimal clustering and achievable throughput," IEEE Trans. Inf. Theory, vol. 55, no. 8, pp. 3425-3436, Aug. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.8
, pp. 3425-3436
-
-
Ghaderi, J.1
Xie, L.-L.2
Shen, X.3
-
11
-
-
0000478763
-
Cipher printing telegraph systems for secret wire and radio telegraphic communications
-
G. S. Vernam, "Cipher printing telegraph systems for secret wire and radio telegraphic communications," J. Amer. Inst. Elect. Eng., vol. 55, pp. 109-115, 1926.
-
(1926)
J. Amer. Inst. Elect. Eng.
, vol.55
, pp. 109-115
-
-
Vernam, G.S.1
-
12
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
13
-
-
51049085143
-
Secure capacity of multi-hop wireless networks with random key pre-distribution
-
Apr.
-
V. Bhandari and N. H. Vaidya, "Secure capacity of multi-hop wireless networks with random key pre-distribution," in Proc. IEEE INFOCOM Workshops, Apr. 2008, pp. 1-6.
-
(2008)
Proc. IEEE INFOCOM Workshops
, pp. 1-6
-
-
Bhandari, V.1
Vaidya, N.H.2
-
14
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
15
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
16
-
-
0017996501
-
The gaussian wire-tap channel
-
Jul.
-
S. Leung-Yan-Cheong and M. Hellman, "The gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
-
17
-
-
52349086199
-
The secrecy graph and some of its properties
-
Jul.
-
M. Haenggi, "The secrecy graph and some of its properties," in Proc. IEEE Int. Symp. Inf. Theory, Jul. 2008, pp. 539-543.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 539-543
-
-
Haenggi, M.1
-
18
-
-
62949215603
-
Physical-layer security in stochastic wireless networks
-
Nov.
-
P. C. Pinto, J. Barros, and M. Z. Win, "Physical-layer security in stochastic wireless networks," in Proc. 11th IEEE Singapore Int. Conf. Commun. Syst., Nov. 2008, pp. 974-979.
-
(2008)
Proc. 11th IEEE Singapore Int. Conf. Commun. Syst.
, pp. 974-979
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
19
-
-
70449514539
-
Wireless physical-layer security: The case of colluding eavesdroppers
-
Jun.
-
P. C. Pinto, J. Barros, and M. Z.Win, "Wireless physical-layer security: The case of colluding eavesdroppers," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2009, pp. 2442-2446.
-
(2009)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2442-2446
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
20
-
-
77955697302
-
Modeling location uncertainty for eavesdroppers: A secrecy graph approach
-
Jun.
-
S. Goel, V. Aggarwal, A. Yener, and A. R. Calderbank, "Modeling location uncertainty for eavesdroppers: A secrecy graph approach," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2010, pp. 2627-2631.
-
(2010)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2627-2631
-
-
Goel, S.1
Aggarwal, V.2
Yener, A.3
Calderbank, A.R.4
-
21
-
-
70449514137
-
Secrecy throughput of manets with malicious nodes
-
Jun.
-
Y. Liang, H. V. Poor, and L. Ying, "Secrecy throughput of MANETs with malicious nodes," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2009, pp. 1189-1193.
-
(2009)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1189-1193
-
-
Liang, Y.1
Poor, H.V.2
Ying, L.3
-
22
-
-
78649282396
-
Security versus capacity tradeoffs in large wireless networks using keyless secrecy
-
Sep.
-
S. Vasudevan, D. Goeckel, and D. Towsley, "Security versus capacity tradeoffs in large wireless networks using keyless secrecy," in Proc. 16th Annu. Int. Conf. Mobile Comput. Netw., Sep. 2010, pp. 21-30.
-
(2010)
Proc. 16th Annu. Int. Conf. Mobile Comput. Netw.
, pp. 21-30
-
-
Vasudevan, S.1
Goeckel, D.2
Towsley, D.3
-
24
-
-
0004246476
-
-
2nd ed. New York: Springer-Verlag
-
G. Grimmett, Percolation, 2nd ed. New York: Springer-Verlag, 1999.
-
(1999)
Percolation
-
-
Grimmett, G.1
-
25
-
-
0031514909
-
Domination by product measures
-
T. M. Liggett, R. H. Schonmann, and A. M. Stacey, "Domination by product measures," Ann. Probabil., vol. 25, no. 1, pp. 71-95, 1997.
-
(1997)
Ann. Probabil.
, vol.25
, Issue.1
, pp. 71-95
-
-
Liggett, T.M.1
Schonmann, R.H.2
Stacey, A.M.3
-
26
-
-
79957667257
-
Interference alignment for secrecy
-
Jun.
-
O. O. Koyluoglu, H. El Gamal, L. Lai, and H. V. Poor, "Interference alignment for secrecy," IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. 3323-3332, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.6
, pp. 3323-3332
-
-
Koyluoglu, O.O.1
El Gamal, H.2
Lai, L.3
Poor, H.V.4
-
27
-
-
77954453442
-
On the effect of colluding eavesdroppers on secrecy capacity scaling
-
Lucca, Italy, Apr.
-
O. O. Koyluoglu, C. E. Koksal, and H. El Gamal, "On the effect of colluding eavesdroppers on secrecy capacity scaling," presented at the presented at the 16th Eur. Wireless Conf., Lucca, Italy, Apr. 2010.
-
(2010)
Presented at the presented at the 16th Eur. Wireless Conf.
-
-
Koyluoglu, O.O.1
Koksal, C.E.2
El Gamal, H.3
-
29
-
-
33847353721
-
Secret communication in presence of colluding eavesdroppers
-
Oct.
-
S. Goel and R. Negi, "Secret communication in presence of colluding eavesdroppers," in Proc. IEEE Military Commun. Conf., Oct. 2005, pp. 1501-1506.
-
(2005)
Proc. IEEE Military Commun. Conf.
, pp. 1501-1506
-
-
Goel, S.1
Negi, R.2
-
30
-
-
69949124879
-
On the secrecy rate region for the interference channel
-
France Sep.
-
O. O. Koyluoglu and H. El Gamal, "On the secrecy rate region for the interference channel," in Proc. IEEE 19th Int. Symp. Pers., Indoor Mobile Radio Commun., Cannes, France, Sep. 2008, pp. 1-5.
-
(2008)
Proc. IEEE 19th Int. Symp. Pers., Indoor Mobile Radio Commun., Cannes
, pp. 1-5
-
-
Koyluoglu, O.O.1
El Gamal, H.2
-
31
-
-
80052369884
-
Cooperative encoding for secrecy in interference channels
-
Sep.
-
O. O. Koyluoglu and H. El Gamal, "Cooperative encoding for secrecy in interference channels," IEEE Trans. Inf. Theory, vol. 57, no. 9, pp. 5682-5694, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.9
, pp. 5682-5694
-
-
Koyluoglu, O.O.1
El Gamal, H.2
-
32
-
-
68249159623
-
The capacity of wireless networks: Information-theoretic and physical limits
-
Aug.
-
M. Franceschetti, M. D. Migliore, and P. Minero, "The capacity of wireless networks: Information-theoretic and physical limits," IEEE Trans. Inf. Theory, vol. 55, no. 8, pp. 3413-3424, Aug. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.8
, pp. 3413-3424
-
-
Franceschetti, M.1
Migliore, M.D.2
Minero, P.3
|