-
1
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin, "Wireless information-theoretic security," IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.3
McLaughlin, S.4
-
2
-
-
45249119255
-
Secure communication over fading channels
-
June
-
Y. Liang, H. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2470-2492, June 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.2
Shamai, S.3
-
3
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Transactions on Information Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.1
Lai, L.2
El Gamal, H.3
-
4
-
-
84861324114
-
On the ergodic secrecy capacity of the wiretap channel under imperfect main channel estimation
-
Z. Rezki, A. Khisti, and M.-S. Alouini, "On the ergodic secrecy capacity of the wiretap channel under imperfect main channel estimation," in Proc. 2011 45th Asilomar Conference on Signals, Systems and Computers (Asilomar'2011), Pacific Grove, CA, USA, Nov 2011, pp. 952-957.
-
Proc. 2011 45th Asilomar Conference on Signals, Systems and Computers (Asilomar'2011), Pacific Grove, CA, USA, Nov 2011
, pp. 952-957
-
-
Rezki, Z.1
Khisti, A.2
Alouini, M.-S.3
-
5
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
6
-
-
77958083375
-
Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
-
Oct.
-
X. Zhou and M. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Transactions on Vehicular Technology, vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
-
(2010)
IEEE Transactions on Vehicular Technology
, vol.59
, Issue.8
, pp. 3831-3842
-
-
Zhou, X.1
McKay, M.2
-
7
-
-
77955371392
-
Ensuring secrecy in MIMO wiretap channels with imperfect CSIT: A beamforming approach
-
A. Mukherjee and A. Swindlehurst, "Ensuring secrecy in MIMO wiretap channels with imperfect CSIT: A beamforming approach," in 2010 IEEE International Conference on Communications (ICC'2010), Cape Town, South Africa, May 2010, pp. 1-5.
-
2010 IEEE International Conference on Communications (ICC'2010), Cape Town, South Africa, May 2010
, pp. 1-5
-
-
Mukherjee, A.1
Swindlehurst, A.2
-
8
-
-
70349297353
-
Information-spectrum methods for information-theoretic security
-
M. Bloch and J. Laneman, "Information-spectrum methods for information-theoretic security," in Proc. Information Theory and Applications Workshop (ITA'2009), San Diego, CA, USA, Feb. 2009, pp. 23-28.
-
Proc. Information Theory and Applications Workshop (ITA'2009), San Diego, CA, USA, Feb. 2009
, pp. 23-28
-
-
Bloch, M.1
Laneman, J.2
-
9
-
-
33750593475
-
MIMO broadcast channels with finite-rate feedback
-
Nov.
-
N. Jindal, "MIMO broadcast channels with finite-rate feedback," IEEE Transactions on Information Theory, vol. 52, no. 11, pp. 5045-5060, Nov. 2006.
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.11
, pp. 5045-5060
-
-
Jindal, N.1
-
10
-
-
80051755314
-
Keys through ARQ: Theory and practice
-
Sep.
-
Y. Abdallah, M. Latif, M. Youssef, A. Sultan, and H. El Gamal, "Keys through ARQ: Theory and practice," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 737-751, Sep. 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.3
, pp. 737-751
-
-
Abdallah, Y.1
Latif, M.2
Youssef, M.3
Sultan, A.4
El Gamal, H.5
-
11
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Transactions on Information Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
12
-
-
0027629488
-
Common randomness in information theory and cryptography, part I: Secret sharing
-
Jul.
-
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography, part I: Secret sharing,," IEEE Transactions on Information Theory, vol. 39, no. 4, p. 11211132, Jul. 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.4
, pp. 11211132
-
-
Ahlswede, R.1
Csiszar, I.2
|