-
1
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1367, Oct. 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1367
-
-
Wyner, A.D.1
-
2
-
-
79958014300
-
Equivocation of eve using two edge type LDPC codes for the binary erasure wiretap channel
-
Nov.
-
M. Andersson, Y Rathi, R. Thobaben, J. Kliewer, and M. Skoglund, "Equivocation of eve using two edge type LDPC codes for the binary erasure wiretap channel," in Proc. of the Forty Fourth Asilomar Conference on Signals, Systems and Computers, Nov. 2010, pp. 2045-2049.
-
(2010)
Proc. of the Forty Fourth Asilomar Conference on Signals, Systems and Computers
, pp. 2045-2049
-
-
Andersson, M.1
Rathi, Y.2
Thobaben, R.3
Kliewer, J.4
Skoglund, M.5
-
3
-
-
84863393230
-
LDPC code design for the BPSK-constrained Gaussian wiretap channel
-
Dec.
-
c. w. Wong, T. F. Wong, and J. M. Shea, "LDPC code design for the BPSK-constrained Gaussian wiretap channel," in Proc. of 20ii Globecom Workshops, Dec. 2011, pp. 898-902.
-
(2011)
Proc. of 20ii Globecom Workshops
, pp. 898-902
-
-
Wong, C.W.1
Wong, T.F.2
Shea, J.M.3
-
4
-
-
80051720839
-
LDPC codes for the Gaussian wiretap channel
-
Sept.
-
D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, and B.-J. Kwak, "LDPC codes for the Gaussian wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 532-540, Sept. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 532-540
-
-
Klinc, D.1
Ha, J.2
McLaughlin, S.W.3
Barros, J.4
Kwak, B.-J.5
-
5
-
-
0033184966
-
Time-varying periodic convolutional codes with low-density parity-check matrix
-
A. Jimenez Felstrom and K. Zigangirov, "Time-varying periodic convolutional codes with low-density parity-check matrix," IEEE Trans. Inf. Theory, vol. 45, no. 6, pp. 2181-2191, 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.6
, pp. 2181-2191
-
-
Jimenez Felstrom, A.1
Zigangirov, K.2
-
6
-
-
77955673204
-
Threshold saturation via spatial coupling: Why convolutional LDPC ensembles perform so well over the BEC
-
S. Kudekar, T. Richardson, and R. Urbanke, "Threshold saturation via spatial coupling: Why convolutional LDPC ensembles perform so well over the BEC," in Proc. of iEEE international Symposium on Information Theory, 2010, pp. 684-688.
-
(2010)
Proc. of IEEE International Symposium on Information Theory
, pp. 684-688
-
-
Kudekar, S.1
Richardson, T.2
Urbanke, R.3
-
7
-
-
80054816671
-
Rate-equivocation optimal spatially coupled ldpc codes for the bec wiretap channel
-
2011 IEEE International Symposium on, 31 2011-aug. 5
-
Y Rathi, R. Urbanke, M. Andersson, and M. Skoglund, "Rate- equivocation optimal spatially coupled ldpc codes for the bec wiretap channel," in Information Theory Proceedings (ISIT), 2011 IEEE International Symposium on, 31 2011-aug. 5 2011, pp. 2393-2397.
-
(2011)
Information Theory Proceedings (ISIT)
, pp. 2393-2397
-
-
Rathi, Y.1
Urbanke, R.2
Andersson, M.3
Skoglund, M.4
-
8
-
-
80053941690
-
Achieving the secrecy capacity of wiretap channels using polar codes
-
Oct.
-
H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6428-6443, Oct. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.10
, pp. 6428-6443
-
-
Mahdavifar, H.1
Vardy, A.2
-
11
-
-
45249101530
-
The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
-
June
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. inf. Theory, vol. 54, no. 6, pp. 2735-2751, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
12
-
-
80051727482
-
Strongly secure communications over the two-way wiretap channel
-
Sept.
-
A. J. Pierrot and M. R. Bloch, "Strongly secure communications over the two-way wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, pp. 595-605, Sept. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, pp. 595-605
-
-
Pierrot, A.J.1
Bloch, M.R.2
-
13
-
-
84873157836
-
-
Arxiv preprint arXiv: 1006.0778
-
A. E. Gamal, O. O. Koyluoglu, M. Youssef, and H. E. Gamal, "The two-way wiretap channel: Achievable regions and experimental results," Arxiv preprint arXiv: 1006.0778, 2010.
-
(2010)
The Two-way Wiretap Channel: Achievable Regions and Experimental Results
-
-
Gamal, A.E.1
Koyluoglu, O.O.2
Youssef, M.3
Gamal, H.E.4
-
16
-
-
80051775152
-
Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes
-
Sept.
-
A. Subramanian, A. Thangaraj, M. Bloch, and S. McLaughlin, "Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes," iEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 585-594, Sept. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 585-594
-
-
Subramanian, A.1
Thangaraj, A.2
Bloch, M.3
McLaughlin, S.4
|