-
1
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Sys. Tech. J., vol. 54, 1975.
-
(1975)
Bell Sys. Tech. J.
, vol.54
-
-
Wyner, A.D.1
-
2
-
-
79959299435
-
Optimal cooperative relaying schemes for improving wireless physical layer security
-
March
-
J. Li, A. P. Petropulu, and S. Weber, "Optimal cooperative relaying schemes for improving wireless physical layer security," IEEE Trans. Inf. Theory, vol. 56, pp. 1875 - 1888, March 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, pp. 1875-1888
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
3
-
-
77955698393
-
Information theoretic security
-
April
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Information theoretic security," Foundations and Trends in Communications and Information Theory, vol. 57, April 2009.
-
(2009)
Foundations and Trends in Communications and Information Theory
, vol.57
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
5
-
-
80051757604
-
An information secrecy game in cognitive radio networks
-
September
-
Y. Wu and K. R. Liu, "An information secrecy game in cognitive radio networks," IEEE Trans. Inf. Forens. and Sec., vol. 6, pp. 831-842, September 2011.
-
(2011)
IEEE Trans. Inf. Forens. and Sec.
, vol.6
, pp. 831-842
-
-
Wu, Y.1
Liu, K.R.2
-
6
-
-
61349186445
-
Capacity of cognitive interference channels with and without secrecy
-
February
-
Y. Liang, A. Somekh-Baruch, H. V. Poor, S. S. Shamai, and S. Verdu, "Capacity of cognitive interference channels with and without secrecy," IEEE Trans. Inf. Theory, vol. 55, pp. 604 - 619, February 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, pp. 604-619
-
-
Liang, Y.1
Somekh-Baruch, A.2
Poor, H.V.3
Shamai, S.S.4
Verdu, S.5
-
7
-
-
84867211423
-
Secure broadcasting in cooperative cognitive radio networks
-
F. Gabry, N. Li, N. Schrammar, M. Girnyk, E. Karipidis, R. Thobaben, L. K. Rasmussen, E. G. Larsson, and M. Skoglund, "Secure broadcasting in cooperative cognitive radio networks," in Proc. Future Network & Mobile Summit, 2012.
-
(2012)
Proc. Future Network & Mobile Summit
-
-
Gabry, F.1
Li, N.2
Schrammar, N.3
Girnyk, M.4
Karipidis, E.5
Thobaben, R.6
Rasmussen, L.K.7
Larsson, E.G.8
Skoglund, M.9
-
8
-
-
45249101530
-
The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming
-
June
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, pp. 2735 - 2751, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
9
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
September
-
L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, pp. 4005-4019, September 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, pp. 4005-4019
-
-
Lai, L.1
Gamal, H.E.2
-
10
-
-
79955491895
-
Interference assisted secret communication
-
May
-
X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "Interference assisted secret communication," IEEE Trans. Inf. Theory, vol. 5, pp. 3153 - 3167, May 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.5
, pp. 3153-3167
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.V.4
-
12
-
-
78651317611
-
Cognitive interference channel with two confidential messages
-
H. G. Bafghi, S. Salimi, B. Seyfe, and M. Aref, "Cognitive interference channel with two confidential messages," in Proc. IEEE ISITA, 2010.
-
(2010)
Proc. IEEE ISITA
-
-
Bafghi, H.G.1
Salimi, S.2
Seyfe, B.3
Aref, M.4
|