-
1
-
-
54849430727
-
Identitybased key management in mobile ad hoc networks: Techniques and applications
-
Oct.
-
E. D. Silva, A. L. D. Santos, L. C. P. Albini, and M. Lima, "Identitybased key management in mobile ad hoc networks: Techniques and applications," IEEE Wireless Commun., vol. 15, no. 5, pp. 46-52, Oct. 2008.
-
(2008)
IEEE Wireless Commun.
, vol.15
, Issue.5
, pp. 46-52
-
-
Silva, E.D.1
Santos, A.L.D.2
Albini, L.C.P.3
Lima, M.4
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017996501
-
The Gaussian wiretap channel
-
Jul.
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wiretap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
4
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
5
-
-
33749450172
-
Secrecy capacity of SIMO and slow fading channels
-
Adelaide, Australia, Sep.
-
P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. Information Theory, Adelaide, Australia, Sep. 2005.
-
(2005)
Proc. IEEE Int. Symp. Information Theory
-
-
Parada, P.1
Blahut, R.2
-
7
-
-
45249119255
-
Secure communication over fading channels
-
Jun.
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
8
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
Gamal, H.E.3
-
9
-
-
39049130758
-
Generalized multiple access channels with confidential messages
-
Seattle, WA, Jul.
-
Y. Liang and H. V. Poor, "Generalized multiple access channels with confidential messages," in Proc. IEEE Int. Symp. Information Theory, Seattle, WA, Jul. 2006.
-
(2006)
Proc. IEEE Int. Symp. Information Theory
-
-
Liang, Y.1
Poor, H.V.2
-
10
-
-
40949147785
-
Multiple-access channels with confidential messages
-
DOI 10.1109/TIT.2007.915978
-
Y. Liang and H. V. Poor, "Multiple-access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008. (Pubitemid 351410914)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.3
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
11
-
-
45249104852
-
Secrecy capacities for multiterminal channel models
-
Jun.
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiterminal channel models," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2437-2452, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2437-2452
-
-
Csiszár, I.1
Narayan, P.2
-
12
-
-
45249092485
-
Secure broadcasting over fading channels
-
Jun.
-
A. Khisti, A. Tchamkerten, and G. W. Wornell, "Secure broadcasting over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453-2469, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2453-2469
-
-
Khisti, A.1
Tchamkerten, A.2
Wornell, G.W.3
-
13
-
-
64549128283
-
Secure wireless communications via cooperation
-
UIUC, Illinois, Sep.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Secure wireless communications via cooperation," in Proc. 46th Ann. Allerton Conf. Communication, Control, and Computing, UIUC, Illinois, Sep. 2008.
-
(2008)
Proc. 46th Ann. Allerton Conf. Communication, Control, and Computing
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
14
-
-
70349218031
-
Amplify-andforward based cooperation for secure wireless communications
-
Taipei, Taiwan, Apr.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Amplify- andforward based cooperation for secure wireless communications," in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Taipei, Taiwan, Apr. 2009.
-
(2009)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
15
-
-
84940659555
-
Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy
-
Monticello, IL, Sep.
-
E. Tekin and A. Yener, "Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy," in Proc. 44th Ann. Allerton Conf. Communication, Control, and Computing, Monticello, IL, Sep. 2006.
-
(2006)
Proc. 44th Ann. Allerton Conf. Communication, Control, and Computing
-
-
Tekin, E.1
Yener, A.2
-
16
-
-
48049102969
-
Themultiple access wire-tap channel:Wireless secrecy and cooperative jamming
-
San Diego, CA, Jan.
-
E. Tekin and A. Yener, "Themultiple access wire-tap channel:Wireless secrecy and cooperative jamming," in Proc. Information Theory and Applications Workshop, San Diego, CA, Jan. 2007.
-
(2007)
Proc. Information Theory and Applications Workshop
-
-
Tekin, E.1
Yener, A.2
-
18
-
-
77955410655
-
Cooperative secrecy in wireless communications
-
W. Trappe and R. Liu, Eds. New York: Springer-Verlag
-
E. Ekrem and S. Ulukus, "Cooperative secrecy in wireless communications," in Securing Wireless Communications at the Physical Layer, W. Trappe and R. Liu, Eds. New York: Springer-Verlag, 2009.
-
(2009)
Securing Wireless Communications at the Physical Layer
-
-
Ekrem, E.1
Ulukus, S.2
-
19
-
-
78650894311
-
Secrecy in cooperative relay broadcast channels
-
Jan
-
E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 137-155, Jan. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.1
, pp. 137-155
-
-
Ekrem, E.1
Ulukus, S.2
-
20
-
-
50249162005
-
On the equivocation region of relay channels with orthogonal components
-
Pacific Grove, CA, Nov.
-
X. He and A. Yener, "On the equivocation region of relay channels with orthogonal components," in Proc. 41st Ann. Asilomar Conf. Signals, Systems, and Computers, Pacific Grove, CA, Nov. 2007.
-
(2007)
Proc. 41st Ann. Asilomar Conf. Signals, Systems, and Computers
-
-
He, X.1
Yener, A.2
-
21
-
-
52349100899
-
The role of an untrusted relay in secret communication
-
Toronto, Canada, Jul.
-
X. He and A. Yener, "The role of an untrusted relay in secret communication," in Proc. IEEE Int. Symp. Information Theory, Toronto, Canada, Jul. 2008.
-
(2008)
Proc. IEEE Int. Symp. Information Theory
-
-
He, X.1
Yener, A.2
-
22
-
-
70349687277
-
End-to-end secure multi-hop communication with untrusted relays is possible
-
Pacific Grove, CA, Nov.
-
X. He and A. Yener, "End-to-end secure multi-hop communication with untrusted relays is possible," in Proc. 42nd Ann. Asilomar Conf. Signals, Systems, and Computers, Pacific Grove, CA, Nov. 2008.
-
(2008)
Proc. 42nd Ann. Asilomar Conf. Signals, Systems, and Computers
-
-
He, X.1
Yener, A.2
-
23
-
-
84938932265
-
Coding for relay channels with confidential messages
-
Cairns, Australia, Sep.
-
Y. Oohama, "Coding for relay channels with confidential messages," in Proc. IEEE Information Theory Workshop, Cairns, Australia, Sep. 2001.
-
(2001)
Proc. IEEE Information Theory Workshop
-
-
Oohama, Y.1
-
24
-
-
51649095674
-
Capacity theorems for relay channels with confidential messages
-
Nice, France, Jun.
-
Y. Oohama, "Capacity theorems for relay channels with confidential messages," in Proc. IEEE Int. Symp. Information Theory, Nice, France, Jun. 2007.
-
(2007)
Proc. IEEE Int. Symp. Information Theory
-
-
Oohama, Y.1
-
26
-
-
33847736358
-
Spectral efficient protocols for half-duplex fading relay channels
-
DOI 10.1109/JSAC.2007.070213
-
B. Rankov and A. Wittneben, "Spectral efficient protocols for halfduplex fading relay channels," IEEE J. Sel. Areas Commun., vol. 25, no. 2, pp. 379-389, Feb. 2007. (Pubitemid 46376100)
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.2
, pp. 379-389
-
-
Rankov, B.1
Wittneben, A.2
-
27
-
-
42549091703
-
Iterative network and channel decoding for the two-way relay channel
-
Istanbul, Turkey, Jun.
-
C. Hausl and J. Hagenauer, "Iterative network and channel decoding for the two-way relay channel," in Proc. IEEE Int. Conf. Communications, Istanbul, Turkey, Jun. 2006.
-
(2006)
Proc. IEEE Int. Conf. Communications
-
-
Hausl, C.1
Hagenauer, J.2
-
28
-
-
70350584562
-
Memoryless relay strategies for two-way relay channels
-
Oct.
-
T. Cui, T. Ho, and J. Kliewer, "Memoryless relay strategies for two-way relay channels," IEEE Trans. Commun., vol. 57, no. 10, pp. 3132-3143, Oct. 2009.
-
(2009)
IEEE Trans. Commun.
, vol.57
, Issue.10
, pp. 3132-3143
-
-
Cui, T.1
Ho, T.2
Kliewer, J.3
-
29
-
-
70349678716
-
On the role of feedback in two-way secure communication
-
Pacific Grove, CA, Nov.
-
X. He and A. Yener, "On the role of feedback in two-way secure communication," in Proc. 42nd Ann. Asilomar Conf. Signals, Systems, and Computers, Pacific Grove, CA, Nov. 2008.
-
(2008)
Proc. 42nd Ann. Asilomar Conf. Signals, Systems, and Computers
-
-
He, X.1
Yener, A.2
-
30
-
-
77749321176
-
A relay selection scheme for two-way amplify-and-forward relay networks
-
Nanjing, China, Nov.
-
Y. Jing, "A relay selection scheme for two-way amplify-and-forward relay networks," in Proc. Int. Conf. Wireless Communications Signal Processing, Nanjing, China, Nov. 2009.
-
(2009)
Proc. Int. Conf. Wireless Communications Signal Processing
-
-
Jing, Y.1
-
31
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct.
-
I. Krikidis, J. Thompson, and S. Mclaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.2
Mclaughlin, S.3
-
32
-
-
77954376728
-
Design and performance analysis of distributed relay selection techniques in wireless networks
-
Canada, May
-
M. S. Alam, K. Zarifi, S. Affes, and A. Ghrayeb, "Design and performance analysis of distributed relay selection techniques in wireless networks," in Proc. 25th Biennial Symp. Communications (QBSC), Canada, May 2010.
-
(2010)
Proc. 25th Biennial Symp. Communications (QBSC)
-
-
Alam, M.S.1
Zarifi, K.2
Affes, S.3
Ghrayeb, A.4
-
33
-
-
35448931484
-
Cooperative communications with outage-optimal opportunistic relaying
-
DOI 10.1109/TWC.2007.06020050
-
A. Bletsas, H. Shin, and M. Z. Win, "Cooperative communications with outage-optimal opportunistic relaying," IEEE Trans. Wireless Commun., vol. 6, no. 9, pp. 3450-3460, Sep. 2007. (Pubitemid 47625224)
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.9
, pp. 3450-3460
-
-
Bletsas, A.1
Shin, H.2
Win, M.Z.3
-
35
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
Gamal, H.E.2
|