-
1
-
-
0024012644
-
An introduction to contemporary cryptology
-
May
-
J. L. Massey, "An introduction to contemporary cryptology," Proc. IEEE, vol. 76, no. 5, pp. 533-549, May 1988.
-
(1988)
Proc. IEEE
, vol.76
, Issue.5
, pp. 533-549
-
-
Massey, J.L.1
-
3
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Information theoretic security," Found. Trends Commun. Inf. Theory, vol. 5, pp. 355-580, 2008.
-
(2008)
Found. Trends Commun. Inf. Theory
, vol.5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
5
-
-
0016562514
-
The wire-tap channel
-
Jan.
-
A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Jan. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
6
-
-
0017996501
-
The Gaussian wire-tap channel
-
July
-
S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
-
7
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
9
-
-
45249119255
-
Secure communication over fading channels
-
June
-
Y. Liang and H. V. Poor, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
-
12
-
-
66949180834
-
A note on the secrecy capacity of the multiple-antenna wiretap channel
-
June
-
T. Liu and S. Shamai (Shitz), "A note on the secrecy capacity of the multiple-antenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, June 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
13
-
-
77953802876
-
Secure transmission with multiple antennas I: The MISOME wiretap channel
-
July
-
A. Khisti and G. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, July 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.2
-
14
-
-
77958560746
-
Secure transmission with multiple antennas II: The MIMOME wiretap channel
-
Nov.
-
-, "Secure transmission with multiple antennas II: the MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.2
-
15
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
June
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
16
-
-
79951595646
-
QoS-based transmit beamforming in the presence of eavesdroppers: An artificial-noise-aided approach
-
Mar.
-
W.-C. Liao, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: an artificial-noise-aided approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1202-1216
-
-
Liao, W.-C.1
Chang, T.-H.2
Ma, W.-K.3
Chi, C.-Y.4
-
17
-
-
78649287920
-
Training sequence design for discriminatory channel estimation in wireless MIMO systems
-
Dec.
-
T.-H. Chang, W.-C. Chiang, Y.-W. Peter Hong, and C.-Y. Chi, "Training sequence design for discriminatory channel estimation in wireless MIMO systems," IEEE Trans. Signal Process., vol. 58, no. 12, pp. 6223-6237, Dec. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.12
, pp. 6223-6237
-
-
Chang, T.-H.1
Chiang, W.-C.2
Peter Hong, Y.-W.3
Chi, C.-Y.4
-
18
-
-
79960433598
-
Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming
-
Aug.
-
Q. Li and W.-K. Ma, "Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming," IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799-3812, Aug. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.8
, pp. 3799-3812
-
-
Li, Q.1
Ma, W.-K.2
-
19
-
-
84861311185
-
Safe convex approximation to outage-based MISO secrecy rate optimization under imperfect CSI and with artificial noise
-
Q. Li, W.-K. Ma, and A. M.-C. So, "Safe convex approximation to outage-based MISO secrecy rate optimization under imperfect CSI and with artificial noise," in Proc. 2011 Asilomar Conf.
-
Proc. 2011 Asilomar Conf
-
-
Li, Q.1
Ma, W.-K.2
So, A.M.-C.3
-
21
-
-
45249104850
-
Wireless information-theoretic security
-
Dec.
-
M. Bloch, J. Barros, and M. R. D. Rodrigues, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Dec. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
-
22
-
-
55349095058
-
The wiretap channel with feedback: Encryption over the channel
-
Nov.
-
L. Lai, H. E. Gamal, and H. V. Poor, "The wiretap channel with feedback: encryption over the channel," IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 381-392, Nov. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.11
, pp. 381-392
-
-
Lai, L.1
Gamal, H.E.2
Poor, H.V.3
-
23
-
-
77955667690
-
Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis
-
J. W. Wallace and R. K. Sharma, "Automatic secret keys from reciprocal MIMO wireless channels: measurement and analysis," IEEE Trans. Inf. Forens. Security, vol. 5, no. 3, pp. 381-392, 2010.
-
(2010)
IEEE Trans. Inf. Forens. Security
, vol.5
, Issue.3
, pp. 381-392
-
-
Wallace, J.W.1
Sharma, R.K.2
-
25
-
-
84858388451
-
A unified framework for key agreement over wireless fading channels
-
Apr.
-
L. Lai, Y. Liang, and H. V. Poor, "A unified framework for key agreement over wireless fading channels," IEEE Trans. Inf. Forens. Security, vol. 7, no. 2, pp. 480-490, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forens. Security
, vol.7
, Issue.2
, pp. 480-490
-
-
Lai, L.1
Liang, Y.2
Poor, H.V.3
-
27
-
-
84863908572
-
Linear precoding for finite-alphabet signaling over MIMOME wiretap channels
-
July
-
Y. Wu, C. Xiao, Z. Ding, X. Gao, and S. Jin, "Linear precoding for finite-alphabet signaling over MIMOME wiretap channels," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2599-2612, July 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.6
, pp. 2599-2612
-
-
Wu, Y.1
Xiao, C.2
Ding, Z.3
Gao, X.4
Jin, S.5
-
28
-
-
84871643875
-
On secrecy rate analysis of MIMO wiretap channels driven by finite-alphabet input
-
Dec.
-
S. Bashar, Z. Ding, and C. Xiao, "On secrecy rate analysis of MIMO wiretap channels driven by finite-alphabet input," IEEE Trans. Commun., vol. 60, pp. 3816-3825, Dec. 2012.
-
(2012)
IEEE Trans. Commun.
, vol.60
, pp. 3816-3825
-
-
Bashar, S.1
Ding, Z.2
Xiao, C.3
-
29
-
-
84863913546
-
Physical-layer secrecy for OFDM transmissions over fading channels
-
Aug.
-
F. Renna, N. Laurenti, and H. V. Poor, "Physical-layer secrecy for OFDM transmissions over fading channels," IEEE Trans. Inf. Forens. Security, vol. 7, no. 4, pp. 1354-1367, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forens. Security
, vol.7
, Issue.4
, pp. 1354-1367
-
-
Renna, F.1
Laurenti, N.2
Poor, H.V.3
-
30
-
-
77956908999
-
Achieving secret communication for fast Rayliegh fading channels
-
Sep.
-
Z. Li, R. Yates, and W. Trappe, "Achieving secret communication for fast Rayliegh fading channels," IEEE Trans. Wireless Commun., vol. 9, no. 9, pp. 2792-2799, Sep. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.9
, pp. 2792-2799
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
33
-
-
79956227370
-
On the secrecy rate of multi-antenna wiretap channel under finite-alphabet input
-
May
-
S. Bashar, Z. Ding, and C. Xiao, "On the secrecy rate of multi-antenna wiretap channel under finite-alphabet input," IEEE Commun. Lett., vol. 15, pp. 527-529, May 2011.
-
(2011)
IEEE Commun. Lett.
, vol.15
, pp. 527-529
-
-
Bashar, S.1
Ding, Z.2
Xiao, C.3
-
34
-
-
17644366813
-
Mutual information and minimum mean-square error in Gaussian channels
-
Apr.
-
D. Guo, S. Shamai (Shitz), and S. Verdú, "Mutual information and minimum mean-square error in Gaussian channels," IEEE Trans. Inf. Theory, vol. 51, no. 4, pp. 1261-1283, Apr. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.4
, pp. 1261-1283
-
-
Guo, D.1
Shamai, S.2
Verdú, S.3
-
38
-
-
67650103105
-
Duality gap estimation and polynomial time approximation for optimal spectrum management
-
July
-
Z. Luo and S. Zhang, "Duality gap estimation and polynomial time approximation for optimal spectrum management," IEEE Trans. Signal Process., vol. 57, no. 7, pp. 2675-2689, July 2009.
-
(2009)
IEEE Trans. Signal Process.
, vol.57
, Issue.7
, pp. 2675-2689
-
-
Luo, Z.1
Zhang, S.2
-
40
-
-
0033732297
-
Wireless multicarrier communications: Where Fourier meets Shannon
-
May
-
Z. Wang and G. B. Giannakis, "Wireless multicarrier communications: where Fourier meets Shannon," IEEE Signal Process. Mag., vol. 17, no. 3, pp. 29-48, May 2000.
-
(2000)
IEEE Signal Process. Mag.
, vol.17
, Issue.3
, pp. 29-48
-
-
Wang, Z.1
Giannakis, G.B.2
-
41
-
-
80052913251
-
Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer
-
Oct.
-
S. A. A. Fakoorian and A. L. Swindlehurst, "Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 381-392, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 381-392
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
43
-
-
79952832483
-
Estimation in Gaussian noise: Properties of the minimum mean-square error
-
Apr.
-
D. Guo, Y. Wu, S. Shamai (Shitz), and S. Verdú, "Estimation in Gaussian noise: properties of the minimum mean-square error," IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 2371-2385, Apr. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.4
, pp. 2371-2385
-
-
Guo, D.1
Wu, Y.2
Shamai, S.3
Verdú, S.4
-
45
-
-
0033296299
-
Using SeDuMi 1.02: A MATLAB toolbox for optimization over symmetric cones
-
July
-
J. Strum, "Using SeDuMi 1.02: a MATLAB toolbox for optimization over symmetric cones," Opt. Methods Software, vol. 11-12, pp. 625-653, July 1999.
-
(1999)
Opt. Methods Software
, vol.11-12
, pp. 625-653
-
-
Strum, J.1
-
46
-
-
34547453958
-
A general inner approximation algorithm for nonconvex mathematical program
-
B. R. Marks and G. P. Wright, "A general inner approximation algorithm for nonconvex mathematical program," Operations Research, vol. 26, no. 4, pp. 681-683, 1978.
-
(1978)
Operations Research
, vol.26
, Issue.4
, pp. 681-683
-
-
Marks, B.R.1
Wright, G.P.2
-
47
-
-
33746879933
-
Optimum power allocation for parallel Gaussian channels with arbitrary input distributions
-
July
-
A. Lozano, A. Tulino, and S. Verdú, "Optimum power allocation for parallel Gaussian channels with arbitrary input distributions," IEEE Trans. Inf. Theory, vol. 52, no. 7, pp. 3033-3051, July 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.7
, pp. 3033-3051
-
-
Lozano, A.1
Tulino, A.2
Verdú, S.3
-
49
-
-
33144485285
-
Gradient of mutual information in linear vector Gaussian channels
-
Jan.
-
D. P. Palomar and S. Verdú, "Gradient of mutual information in linear vector Gaussian channels," IEEE Trans. Inf. Theory, vol. 52, no. 1, pp. 141-154, Jan. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.1
, pp. 141-154
-
-
Palomar, D.P.1
Verdú, S.2
|