-
1
-
-
84890522850
-
Communication Theorey of Secrecy Systems
-
C. E. Shanon, "Communication Theorey of Secrecy Systems", in J. Bell Syst. Tech., Vol.28, pp.656-715, 1948.
-
(1948)
J. Bell Syst. Tech.
, vol.28
, pp. 656-715
-
-
Shanon, C.E.1
-
3
-
-
79955780857
-
Wireless Secrecy in Large-Scale Networks
-
P. C. Pinto, J. Barros, M. Z. Win, "Wireless Secrecy in Large-Scale Networks." in Proc. IEEE ITA'11, California, USA, Feb. 2011.
-
Proc. IEEE ITA'11, California, USA, Feb. 2011
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
4
-
-
45849133457
-
Guaranteeing Secrecy using Artificial Noise
-
S. Goel and R. Negi, "Guaranteeing Secrecy using Artificial Noise", in IEEE Trans. Wireless Commun., Vol. 7, No. 6, pp. 2180-2189, 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
5
-
-
70349668660
-
On Cooperative Wireless Network Secrecy
-
E. Perron, S. Diggavi, and E. Telatar, "On Cooperative Wireless Network Secrecy", in Proc. IEEE INFOCOM, Rio de Janeiro, Brazil, Apri. 2009.
-
Proc. IEEE INFOCOM, Rio de Janeiro, Brazil, Apri. 2009
-
-
Perron, E.1
Diggavi, S.2
Telatar, E.3
-
6
-
-
45249104850
-
Wireless Information-theoretic Security
-
M. Bloch, J. Barros, M. R. D. Rodrigues and S. W. McLaughlin, "Wireless Information-theoretic Security", in IEEE Trans. Inform. Theory, Vol. 54, No. 6, pp. 2515-2534, 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
7
-
-
78649282396
-
Security-capacity Tradeoff in Large Wireless Networks using Keyless Secrecy
-
S. Vasudevan, D. Goeckel and D. Towsley, "Security-capacity Tradeoff in Large Wireless Networks using Keyless Secrecy", in Proc. ACM MobiHoc, Chicago, Illinois, USA, Sept. 2010.
-
Proc. ACM MobiHoc, Chicago, Illinois, USA, Sept. 2010
-
-
Vasudevan, S.1
Goeckel, D.2
Towsley, D.3
-
10
-
-
80053983111
-
Secrecy Throughput of MANETs under Passive and Active Attacks
-
to appear in
-
Y. Liang, H. V. Poor and L. Ying, "Secrecy Throughput of MANETs under Passive and Active Attacks", to appear in IEEE Trans. Inform. Theory.
-
IEEE Trans. Inform. Theory.
-
-
Liang, Y.1
Poor, H.V.2
Ying, L.3
-
11
-
-
84861595909
-
Achieving Single Channel, Full Duplex Wireless Communication
-
J. I. Choiy, M. Jainy, K. Srinivasany, P. Levis and S. Katti, "Achieving Single Channel, Full Duplex Wireless Communication", in ACM Mobicom'10, Chicago, USA, Sept. 2010.
-
ACM Mobicom'10, Chicago, USA, Sept. 2010
-
-
Choiy, J.I.1
Jainy, M.2
Srinivasany, K.3
Levis, P.4
Katti, S.5
-
12
-
-
33747142749
-
The Capacity of Wireless Networks
-
Mar.
-
P. Gupta and P. Kumar, "The Capacity of Wireless Networks", in IEEE Trans. Inform. Theory, Vol. 46, No. 2, pp. 388-404, Mar. 2000.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, Issue.2
, pp. 388-404
-
-
Gupta, P.1
Kumar, P.2
-
13
-
-
33947689700
-
Closing the Gap in the Capacity of Wireless Networks via Percolation Theory
-
M. Franceschetti, O. Dousse, D. N. Tse and P. Thiran, "Closing the Gap in the Capacity of Wireless Networks via Percolation Theory", in IEEE Trans. Inform. Theory, Vol. 53, No. 3, pp. 1009-1018, 2007.
-
(2007)
IEEE Trans. Inform. Theory
, vol.53
, Issue.3
, pp. 1009-1018
-
-
Franceschetti, M.1
Dousse, O.2
Tse, D.N.3
Thiran, P.4
-
14
-
-
80054124220
-
Delay and Capacity Tradeoff Analysis for MotionCast
-
Oct
-
X. Wang, W. Huang, S. Wang, J. Zhang, C. Hu, "Delay and Capacity Tradeoff Analysis for MotionCast," in IEEE/ACM Transactions on Networking, Vol. 19, no. 5, pp. 1354-1367, Oct 2011.
-
(2011)
IEEE/ACM Transactions on Networking
, vol.19
, Issue.5
, pp. 1354-1367
-
-
Wang, X.1
Huang, W.2
Wang, S.3
Zhang, J.4
Hu, C.5
|