-
3
-
-
0016562514
-
The wire-tap channel
-
A. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
4
-
-
0017996501
-
The gaussian wire-tap channel
-
S. Leung-Yan-Cheong and M. Hellman, "The gaussian wire-tap channel," IEEE Transactions on Information Theory, vol. 24, no. 4, pp. 451-456, 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
-
5
-
-
0017973511
-
Broadcast channels with confidential messages
-
I. Csiszár and J. Korner, "Broadcast channels with confidential messages," IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339-348, 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Korner, J.2
-
6
-
-
84931425598
-
Secret communication using artificial noise
-
R. Negi and S. Goel, "Secret communication using artificial noise," in IEEE Vehicular Technology Conference, 2005, vol. 62, no. 3, p. 1906.
-
IEEE Vehicular Technology Conference, 2005
, vol.62
, Issue.3
, pp. 1906
-
-
Negi, R.1
Goel, S.2
-
8
-
-
72349099904
-
Cooperative jamming for wireless physical layer security
-
L. Dong, Z. Han, A. Petropulu, and H. Poor, "Cooperative jamming for wireless physical layer security," in IEEE Workshop on Statistical Signal Processing, 2009, pp. 417-420.
-
IEEE Workshop on Statistical Signal Processing, 2009
, pp. 417-420
-
-
Dong, L.1
Han, Z.2
Petropulu, A.3
Poor, H.4
-
9
-
-
48049102969
-
The gaussian multiple access wire-tap channel: Wireless secrecy and cooperative jamming
-
E. Tekin, "The gaussian multiple access wire-tap channel: wireless secrecy and cooperative jamming," in IEEE Information Theory and Applications Workshop, 2007, pp. 404-413.
-
IEEE Information Theory and Applications Workshop, 2007
, pp. 404-413
-
-
Tekin, E.1
-
10
-
-
45249101530
-
The general gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
-
E. Tekin and A. Yener, "The general gaussian multiple-access and two-way wiretap channels: achievable rates and cooperative jamming," IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2735-2751, 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
11
-
-
79951935724
-
Power allocation for cooperative-based jamming in wireless networks with secrecy constraints
-
I. Krikidis, J. Thompson, P. Grant, and S. McLaughlin, "Power allocation for cooperative-based jamming in wireless networks with secrecy constraints," in GLOBECOM Workshops , 2010, pp. 1177-1181.
-
GLOBECOM Workshops, 2010
, pp. 1177-1181
-
-
Krikidis, I.1
Thompson, J.2
Grant, P.3
McLaughlin, S.4
-
12
-
-
52349106158
-
Secret communication on interference channels
-
R. Yates, D. Tse, and Z. Li, "Secret communication on interference channels," in International Symposium on Information Theory, ISIT 2008, pp. 374-378.
-
International Symposium on Information Theory, ISIT 2008
, pp. 374-378
-
-
Yates, R.1
Tse, D.2
Li, Z.3
-
13
-
-
45249090083
-
Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
-
R. Liu, I. Maric, P. Spasojevic, and R. Yates, "Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions," IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2493-2507, 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2493-2507
-
-
Liu, R.1
Maric, I.2
Spasojevic, P.3
Yates, R.4
-
14
-
-
51849144195
-
Interference-assisted secret communication
-
X. Tang, R. Liu, P. Spasojevic, and H. Poor, "Interference-assisted secret communication," in Information Theory Workshop, ITW 2008, pp. 164-168.
-
Information Theory Workshop, ITW 2008
, pp. 164-168
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.4
-
15
-
-
69949124879
-
On the secrecy rate region for the interference channel
-
O. Koyluoglu and H. El Gamal, "On the secrecy rate region for the interference channel," in International Symposium on Personal, Indoor and Mobile Radio Communications, 2008, pp. 1-5.
-
International Symposium on Personal, Indoor and Mobile Radio Communications, 2008
, pp. 1-5
-
-
Koyluoglu, O.1
El Gamal, H.2
-
17
-
-
62949215603
-
Physical-layer security in stochastic wireless networks
-
P. Pinto, J. Barros, and M. Win, "Physical-layer security in stochastic wireless networks," in ICCS 2008, pp. 974-979.
-
ICCS 2008
, pp. 974-979
-
-
Pinto, P.1
Barros, J.2
Win, M.3
-
21
-
-
77955697302
-
Modeling location uncertainty for eavesdroppers: A secrecy graph approach
-
S. Goel, V. Aggarwal, A. Yener, and A. Calderbank, "Modeling location uncertainty for eavesdroppers: A secrecy graph approach," in International Symposium on Information Theory Proceedings, ISIT 2010, pp. 2627-2631.
-
International Symposium on Information Theory Proceedings, ISIT 2010
, pp. 2627-2631
-
-
Goel, S.1
Aggarwal, V.2
Yener, A.3
Calderbank, A.4
-
22
-
-
79958005307
-
Secrecy coverage
-
A. Sarkar and M. Haenggi, "Secrecy coverage," in Asilomar Conference on Signals, Systems and Computers, 2010, pp. 42-46.
-
Asilomar Conference on Signals, Systems and Computers, 2010
, pp. 42-46
-
-
Sarkar, A.1
Haenggi, M.2
-
23
-
-
70449514137
-
Secrecy throughput of manets with malicious nodes
-
Y. Liang, H. Poor, and L. Ying, "Secrecy throughput of manets with malicious nodes," in International Symposium on Information Theory Proceedings, ISIT 2009, pp. 1189-1193.
-
International Symposium on Information Theory Proceedings, ISIT 2009
, pp. 1189-1193
-
-
Liang, Y.1
Poor, H.2
Ying, L.3
-
24
-
-
77952682796
-
On secrecy capacity scaling in wireless networks
-
O. Koyluoglu, E. Koksal, and H. El Gamal, "On secrecy capacity scaling in wireless networks," in Information Theory and Applications Workshop (ITA), 2010, pp. 1-4.
-
Information Theory and Applications Workshop (ITA), 2010
, pp. 1-4
-
-
Koyluoglu, O.1
Koksal, E.2
El Gamal, H.3
-
25
-
-
78649282396
-
Security-capacity trade-off in large wireless networks using keyless secrecy
-
S. Vasudevan, D. Goeckel, and D. Towsley, "Security-capacity trade-off in large wireless networks using keyless secrecy," in ACM international symposium on Mobile ad hoc networking and computing, 2010, pp. 21-30.
-
ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2010
, pp. 21-30
-
-
Vasudevan, S.1
Goeckel, D.2
Towsley, D.3
-
26
-
-
84861618493
-
Secret communication in large wireless networks without eavesdropper location information
-
C. Capar, D. Goeckel, B. Liu, and D. Towsley, "Secret communication in large wireless networks without eavesdropper location information,"in INFOCOM 2012.
-
INFOCOM 2012
-
-
Capar, C.1
Goeckel, D.2
Liu, B.3
Towsley, D.4
-
27
-
-
82055177123
-
Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks
-
D. Goeckel, S. Vasudevan, D. Towsley, S. Adams, Z. Ding, and K. Leung, "Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks," IEEE Journal on Selected Areas in Communications, vol. 29, pp. 2067-2076, 2011.
-
(2011)
IEEE Journal on Selected Areas in Communications
, vol.29
, pp. 2067-2076
-
-
Goeckel, D.1
Vasudevan, S.2
Towsley, D.3
Adams, S.4
Ding, Z.5
Leung, K.6
-
28
-
-
33747142749
-
The capacity of wireless networks
-
P. Gupta and P. R. Kumar, "The capacity of wireless networks," IEEE Transactions on Information Theory, vol. 46, no. 2, pp. 388-404, 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.2
, pp. 388-404
-
-
Gupta, P.1
Kumar, P.R.2
-
30
-
-
2442421542
-
Large wireless networks under fading, mobility, and delay constraints
-
S. Toumpis and A. Goldsmith, "Large wireless networks under fading, mobility, and delay constraints," in INFOCOM 2004, vol. 1.
-
INFOCOM 2004
, vol.1
-
-
Toumpis, S.1
Goldsmith, A.2
|