-
1
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct
-
P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687- 4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
2
-
-
45249104850
-
Wireless information-theoretic security
-
June
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
3
-
-
79957465600
-
Wireless secrecy regions with friendly jamming
-
June
-
J. P. Vilela, M. Bloch, J. Barros, and S. W. McLaughlin, "Wireless secrecy regions with friendly jamming," IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 256-266, June 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.2
, pp. 256-266
-
-
Vilela, J.P.1
Bloch, M.2
Barros, J.3
McLaughlin, S.W.4
-
4
-
-
79960433598
-
Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming
-
Aug
-
Q. Li and W.-K. Ma, "Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming," IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799-3812, Aug. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.8
, pp. 3799-3812
-
-
Li, Q.1
Ma, W.-K.2
-
5
-
-
84863359764
-
Robust secure transmission in MISO channels based on worst-case optimization
-
Apr
-
J. Huang and A. L. Swindlehurst, "Robust secure transmission in MISO channels based on worst-case optimization," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1869-1707, Apr. 2012.
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.4
, pp. 1869-1707
-
-
Huang, J.1
Swindlehurst, A.L.2
-
6
-
-
79960399745
-
Robust beamforming for security in MIMO wiretap channels with imperfect CSI
-
Jan
-
A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
7
-
-
78649287920
-
Training sequence design for discriminatory channel estimation in wireless MIMO systems
-
Dec
-
T.-H. Chang, W.-C. Chiang, Y.-W. P. Hong, and C.-Y. Chi, "Training sequence design for discriminatory channel estimation in wireless MIMO systems," IEEE Trans. Signal Process., vol. 58, no. 12, pp. 6223-6237, Dec. 2010.
-
(2010)
IEEE Trans. Signal Process
, vol.58
, Issue.12
, pp. 6223-6237
-
-
Chang, T.-H.1
Chiang, W.-C.2
Hong, Y.-W.P.3
Chi, C.-Y.4
-
8
-
-
79951595646
-
QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise- aided approach
-
Mar
-
W.-C. Liao, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: an optimized artificialnoise- aided approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.3
, pp. 1202-1216
-
-
Liao, W.-C.1
Chang, T.-H.2
Ma, W.-K.3
Chi, C.-Y.4
-
9
-
-
79957977565
-
Robust beamforming for MISO wiretap channel by optimizing the worst-case secrecy capacity
-
W. Shi and J. Ritcey, "Robust beamforming for MISO wiretap channel by optimizing the worst-case secrecy capacity," in Proc. 2010 Asilomar Conf. Signals, Syst. Comput., pp. 300-304.
-
Proc. 2010 Asilomar Conf. Signals, Syst. Comput
, pp. 300-304
-
-
Shi, W.1
Ritcey, J.2
-
10
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct
-
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
11
-
-
82055177123
-
Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks
-
D. Goeckel, S. Vasudevan, D. Towsley, S. Adams, Z. Ding, and K. Leung, "Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks," IEEE J. Sel. Areas Commun., vol. 29, no. 10, pp. 2067-2076, 2011.
-
IEEE J. Sel. Areas Commun
, vol.29
, Issue.10
, pp. 2067-2076
-
-
Goeckel, D.1
Vasudevan, S.2
Towsley, D.3
Adams, S.4
Ding, Z.5
Leung, K.6
-
12
-
-
85027929481
-
Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting
-
June
-
Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "Opportunistic relaying for secrecy communications: cooperative jamming vs. relay chatting," IEEE Trans. Wireless Commun., vol. 10, no. 6, pp. 1725- 1729, June 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.6
, pp. 1725-1729
-
-
Ding, Z.1
Leung, K.K.2
Goeckel, D.L.3
Towsley, D.4
-
13
-
-
0016562514
-
The wire-tap channel
-
A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355- 1387, 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, pp. 1355-1387
-
-
Wyner, A.1
-
14
-
-
0017996501
-
The Gaussian wire-tap channel
-
July
-
S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
-
15
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
16
-
-
0347337828
-
Secure space-time communication
-
Dec
-
A. O. Hero, III, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero Iii, A.O.1
-
19
-
-
51649110931
-
Achievable rates in Gaussian MISO channels with secrecy constraints
-
S. Shafiee and S. Ulukus, "Achievable rates in Gaussian MISO channels with secrecy constraints," in Proc. 2007 IEEE Int. Symp. Inf. Theory, pp. 2466-2470.
-
Proc 2007 IEEE Int. Symp. Inf. Theory
, pp. 2466-2470
-
-
Shafiee, S.1
Ulukus, S.2
-
20
-
-
69449086815
-
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel
-
Sept
-
S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: the 2-2-1 channel," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4033-4039, Sept. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.9
, pp. 4033-4039
-
-
Shafiee, S.1
Liu, N.2
Ulukus, S.3
-
21
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
June
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008.
-
(2008)
IEEE Trans. Wireless Commun
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
22
-
-
51649117832
-
On the Gaussian MIMO wiretap channel
-
A. Khisti, G. Wornell, A. Wiesel, and Y. Eldar, "On the Gaussian MIMO wiretap channel," in Proc. 2007 IEEE Int. Symp. Inf. Theory ISIT, pp. 2471-2475.
-
Proc 2007 IEEE Int. Symp. Inf. Theory ISIT
, pp. 2471-2475
-
-
Khisti, A.1
Wornell, G.2
Wiesel, A.3
Eldar, Y.4
-
25
-
-
77953802876
-
Secure transmission with multiple antennas I: The MISOME wiretap channel
-
July
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: the MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, July 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
26
-
-
77958560746
-
Secure transmission with multiple antennas-part II: The MIMOME wiretap channel
-
IEEE Nov
-
"Secure transmission with multiple antennas - part II: the MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
27
-
-
66949180834
-
A note on the secrecy capacity of the multipleantenna wiretap channel
-
June
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, June 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
28
-
-
78049382115
-
Optimal input covariance for achieving secrecy capacity in Gaussian MIMO wiretap channels
-
J. Li and A. Petropulu, "Optimal input covariance for achieving secrecy capacity in Gaussian MIMO wiretap channels," in Proc. 2010 IEEE Int. Acoustics Speech Signal Process., pp. 3362-3365.
-
Proc 2010 IEEE Int. Acoustics Speech Signal Process
, pp. 3362-3365
-
-
Li, J.1
Petropulu, A.2
-
29
-
-
69249208566
-
An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel
-
8, Mar
-
R. Bustin, R. Liu, H. V. Poor, and S. Shamai, "An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel," EURASIP J. Wireless Commun. Netw., vol. 2009, pp. 3:1-3:8, Mar. 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw 2009
, vol.3
, pp. 1-3
-
-
Bustin, R.1
Liu, R.2
Poor, H.V.3
Shamai, S.4
-
30
-
-
45249101530
-
The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming
-
June
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and twoway wiretap channels: achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
31
-
-
45249090083
-
Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
-
June
-
R. Liu, I. Maric, P. Spasojevic, and R. D. Yates, "Discrete memoryless interference and broadcast channels with confidential messages: secrecy rate regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2493-2507
-
-
Liu, R.1
Maric, I.2
Spasojevic, P.3
Yates, R.D.4
-
32
-
-
7244245854
-
An introduction to the multi-user MIMO downlink
-
Oct
-
Q. H. Spencer, C. B. Peel, A. L. Swindlehurst, and M. Haardt, "An introduction to the multi-user MIMO downlink," IEEE Commun. Mag., vol. 42, no. 10, pp. 60-67, Oct. 2004.
-
(2004)
IEEE Commun. Mag
, vol.42
, Issue.10
, pp. 60-67
-
-
Spencer, Q.H.1
Peel, C.B.2
Swindlehurst, A.L.3
Haardt, M.4
-
33
-
-
80052913251
-
Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer
-
Oct
-
S. A. A. Fakoorian and A. L. Swindlehurst, "Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 5013-5022, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.10
, pp. 5013-5022
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
34
-
-
77955721830
-
Multiple-input multipleoutput Gaussian broadcast channels with confidential messages
-
Sept
-
R. Liu, T. Liu, H. V. Poor, and S. Shamai, "Multiple-input multipleoutput Gaussian broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4215-4227, Sept. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.9
, pp. 4215-4227
-
-
Liu, R.1
Liu, T.2
Poor, H.V.3
Shamai, S.4
-
35
-
-
77949575243
-
Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels
-
A. Mukherjee and A. L. Swindlehurst, "Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels," in Proc. 2009 Allerton Conf. Commun., Control, Comput., pp. 1134-1141.
-
Proc. 2009 Allerton Conf. Commun., Control, Comput
, pp. 1134-1141
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
37
-
-
84857366666
-
Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI
-
Feb
-
M. Pei, J. Wei, K.-K. Wong, and X. Wang, "Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI," IEEE Trans. Wireless Commun., vol. 11, no. 2, pp. 544-549, Feb. 2012.
-
(2012)
IEEE Trans. Wireless Commun
, vol.11
, Issue.2
, pp. 544-549
-
-
Pei, M.1
Wei, J.2
Wong, K.-K.3
Wang, X.4
-
38
-
-
84866730731
-
Energy efficiency of cooperative jamming strategies in secure wireless networks
-
Sept
-
M. Dehghan, D. L. Goeckel, M. Ghaderi, and Z. Ding, "Energy efficiency of cooperative jamming strategies in secure wireless networks," IEEE Trans. Wireless Commun., vol. 11, no. 9, pp. 3025-3029, Sept. 2012.
-
(2012)
IEEE Trans. Wireless Commun
, vol.11
, Issue.9
, pp. 3025-3029
-
-
Dehghan, M.1
Goeckel, D.L.2
Ghaderi, M.3
Ding, Z.4
-
40
-
-
79951681560
-
Secure wireless network connectivity with multi-antenna transmission
-
Feb
-
X. Zhou, R. K. Ganti, and J. G. Andrews, "Secure wireless network connectivity with multi-antenna transmission," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 425-430, Feb. 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.2
, pp. 425-430
-
-
Zhou, X.1
Ganti, R.K.2
Andrews, J.G.3
-
41
-
-
84855911932
-
Secure communication in stochastic wireless networks-part II: Maximum rate and collusion
-
Feb
-
P. C. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks - part II: maximum rate and collusion," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 139-147, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 139-147
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
43
-
-
80051775150
-
Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks
-
Sep
-
X. Wang, M. Tao, J. Mo, and Y. Xu, "Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 693-702, Sept. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 693-702
-
-
Wang, X.1
Tao, M.2
Mo, J.3
Xu, Y.4
-
44
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
45
-
-
77953844596
-
Secrecy rate optimization under cooperation with perfect channel state information
-
J. Li, A. P. Petropulu, and S. Weber, "Secrecy rate optimization under cooperation with perfect channel state information," in Proc. 2009 Asilomar Conf. Signals, Syst. Comput., pp. 824-828.
-
Proc. 2009 Asilomar Conf. Signals, Syst. Comput
, pp. 824-828
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
46
-
-
67650239840
-
Resource allocation for the wire-tap multi-carrier broadcast channel
-
E. A. Jorswieck and A. Wolf, "Resource allocation for the wire-tap multi-carrier broadcast channel," in Proc. 2008 Int. Conf. Telecommun., pp. 1-6.
-
Proc. 2008 Int. Conf. Telecommun
, pp. 1-6
-
-
Jorswieck, E.A.1
Wolf, A.2
-
48
-
-
70749108038
-
On error analysis and distributed phase steering for wireless network coding over fading channels
-
Nov
-
A. Y.-C. Peng, S. Yousefi, and I.-M. Kim, "On error analysis and distributed phase steering for wireless network coding over fading channels," IEEE Trans. Wireless Commun., vol. 8, no. 11, pp. 5639- 5649, Nov. 2009.
-
(2009)
IEEE Trans. Wireless Commun
, vol.8
, Issue.11
, pp. 5639-5649
-
-
Peng, A.Y.-C.1
Yousefi, S.2
Kim, I.-M.3
-
50
-
-
0017495724
-
A note on Wyner's wiretap channel (corresp.)
-
A. Carleial and M. Hellman, "A note on Wyner's wiretap channel (corresp.)," IEEE Trans. Inf. Theory, vol. 23, no. 3, pp. 387-390, 1977.
-
(1977)
IEEE Trans. Inf. Theory
, vol.23
, Issue.3
, pp. 387-390
-
-
Carleial, A.1
Hellman, M.2
-
51
-
-
73449104694
-
Compound wiretap channels
-
Y. Liang, G. Kramer, H. V. Poor, and S. Shamai, "Compound wiretap channels." EURASIP J. Wireless Commun. Netw., vol. 2009, 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw 2009
-
-
Liang, Y.1
Kramer, G.2
Poor, H.V.3
Shamai, S.4
|