-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 29, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.29
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-349, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-349
-
-
Csiszár, I.1
Körner, J.2
-
4
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. Shamai, "Information theoretic security," Commun. Inf. Theory, ser. Foundations and Trends, vol. 5, no. 4-5, pp. 355-580, 2009.
-
(2009)
Commun. Inf. Theory, Ser. Foundations and Trends
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
5
-
-
0017996501
-
The Gaussian wiretap channel
-
Jul.
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wiretap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
6
-
-
0347337828
-
Secure space-time communication
-
Dec.
-
A. Hero, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero, A.1
-
7
-
-
45249104850
-
Wireless information- theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin, "Wireless information- theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.3
McLaughlin, S.4
-
8
-
-
45249119255
-
Secure communication over fading channels
-
Jun.
-
Y. Liang, H. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.2
Shamai, S.3
-
9
-
-
84940654702
-
Secrecy capacity of independent parallel channels
-
Z. Li, R. Yates, and W. Trappe, "Secrecy capacity of independent parallel channels," in Proc. 44th Annu. Allerton Conf. Commun., Control, Comput., Allerton, 2006, pp. 841-848.
-
(2006)
Proc. 44th Annu. Allerton Conf. Commun., Control, Comput., Allerton
, pp. 841-848
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
10
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.1
Lai, L.2
El Gamal, H.3
-
11
-
-
33749450172
-
Secrecy capacity of SIMO and slow fading channels
-
DOI 10.1109/ISIT.2005.1523727, 1523727, Proceedings of the 2005 IEEE International Symposium on Information Theory, ISIT 05
-
P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Sep. 2005, pp. 2152-2155. (Pubitemid 44508426)
-
(2005)
IEEE International Symposium on Information Theory - Proceedings
, vol.2005
, pp. 2152-2155
-
-
Parada, P.1
Blahut, R.2
-
12
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Aug.
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
13
-
-
69449086815
-
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel
-
Sep.
-
S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4033-4039, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.9
, pp. 4033-4039
-
-
Shafiee, S.1
Liu, N.2
Ulukus, S.3
-
14
-
-
69249208566
-
AnMMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel
-
Mar.
-
R. Liu, R. Bustin, S. Shamai, and H. Poor, "AnMMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel," EURASIP J. Wireless Commun. Netw., vol. 2009, no. 1, pp. 1-9, Mar. 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw.
, vol.2009
, Issue.1
, pp. 1-9
-
-
Liu, R.1
Bustin, R.2
Shamai, S.3
Poor, H.4
-
15
-
-
77958560746
-
Secure transmission with multiple antennas- Part II: The MIMOME wiretap channel
-
Nov.
-
A. Khisti and G. Wornell, "Secure transmission with multiple antennas- Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.2
-
16
-
-
70349690308
-
Optimal power allocation for achieving perfect secrecy capacity in MIMO wire-tap channels
-
Mar.
-
J. Liu, Y. Hou, and H. Sherali, "Optimal power allocation for achieving perfect secrecy capacity in MIMO wire-tap channels," in Proc. 43rd Annu. Conf. Inf. Sci. Syst. (CISS), Mar. 2009, pp. 606-611.
-
(2009)
Proc. 43rd Annu. Conf. Inf. Sci. Syst. (CISS)
, pp. 606-611
-
-
Liu, J.1
Hou, Y.2
Sherali, H.3
-
17
-
-
78049382115
-
Optimal input covariance for achieving secrecy capacity in Gaussian MIMO wiretap channels
-
Mar.
-
J. Li and A. Petropulu, "Optimal input covariance for achieving secrecy capacity in Gaussian MIMO wiretap channels," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP), Mar. 2010, pp. 3362-3365.
-
(2010)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP)
, pp. 3362-3365
-
-
Li, J.1
Petropulu, A.2
-
18
-
-
80051719720
-
MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design
-
Sep.
-
S. Fakoorian and A. Swindlehurst, "MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 640-649, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 640-649
-
-
Fakoorian, S.1
Swindlehurst, A.2
-
19
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
20
-
-
84857366666
-
Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI
-
Feb.
-
M. Pei, J. Wei, K.-K. Wong, and X. Wang, "Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI," IEEE Trans. Wireless Commun., vol. 11, no. 2, pp. 544-549, Feb. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.2
, pp. 544-549
-
-
Pei, M.1
Wei, J.2
Wong, K.-K.3
Wang, X.4
-
21
-
-
79960399745
-
Robust beamforming for security in MIMO wiretap channels with imperfect CSI
-
Jan.
-
A. Mukherjee and A. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, A.2
-
22
-
-
77949575243
-
Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels
-
A. Mukherjee and A. Swindlehurst, "Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels," in Proc. 47th Annu. Allerton Conf. Commun., Control, Comput., 2009, pp. 1134-1141.
-
(2009)
Proc. 47th Annu. Allerton Conf. Commun., Control, Comput.
, pp. 1134-1141
-
-
Mukherjee, A.1
Swindlehurst, A.2
-
23
-
-
0032656755
-
Redundant filterbank precoders and equalizers. I. Unification and optimal designs
-
Jul.
-
A. Scaglione, G. Giannakis, and S. Barbarossa, "Redundant filterbank precoders and equalizers. I. unification and optimal designs," IEEE Trans. Signal Process., vol. 47, no. 7, pp. 1988-2006, Jul. 1999.
-
(1999)
IEEE Trans. Signal Process.
, vol.47
, Issue.7
, pp. 1988-2006
-
-
Scaglione, A.1
Giannakis, G.2
Barbarossa, S.3
-
24
-
-
0242365589
-
Robust linear MIMO receivers: A minimum error-rate approach
-
Nov.
-
D. Gesbert, "Robust linear MIMO receivers: a minimum error-rate approach," IEEE Trans. Signal Process., vol. 51, no. 11, pp. 2863-2871, Nov. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.11
, pp. 2863-2871
-
-
Gesbert, D.1
-
25
-
-
0042283724
-
Joint tx-rx beamforming design for multicarrier MIMO channels: A unified framework for convex optimization
-
Sep.
-
D. P. Palomar, J. M. Cioffi, and M. A. Lagunas, "Joint tx-rx beamforming design for multicarrier MIMO channels: A unified framework for convex optimization," IEEE Trans. Signal Process., vol. 51, no. 9, pp. 2381-2401, Sep. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.9
, pp. 2381-2401
-
-
Palomar, D.P.1
Cioffi, J.M.2
Lagunas, M.A.3
-
26
-
-
85008030284
-
Linear transmit processing in MIMO communications systems
-
Aug.
-
M. Joham,W. Utschick, and J. Nossek, "Linear transmit processing in MIMO communications systems," IEEE Trans. Signal Process., vol. 53, no. 8, pp. 2700-2712, Aug. 2005.
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.8
, pp. 2700-2712
-
-
Johamw. Utschick, M.1
Nossek, J.2
-
27
-
-
77949529945
-
MIMO Gaussian channels with arbitrary inputs: Optimal precoding and power allocation
-
Mar.
-
F. Pérez-Cruz,M. Rodrigues, and S. Verdú, "MIMO Gaussian channels with arbitrary inputs: Optimal precoding and power allocation," IEEE Trans. Inf. Theory, vol. 56, no. 3, pp. 1070-1084, Mar. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.3
, pp. 1070-1084
-
-
Pérez-Cruz, F.1
Rodrigues, M.2
Verdú, S.3
-
28
-
-
70350489664
-
Joint bit allocation and precoding forMIMO systems with decision feedback detection
-
Nov.
-
S. Bergman, D. Palomar, and B. Ottersten, "Joint bit allocation and precoding forMIMO systems with decision feedback detection," IEEE Trans. Signal Process., vol. 57, no. 11, pp. 4509-4521, Nov. 2009.
-
(2009)
IEEE Trans. Signal Process.
, vol.57
, Issue.11
, pp. 4509-4521
-
-
Bergman, S.1
Palomar, D.2
Ottersten, B.3
-
29
-
-
80051953037
-
Strong secrecy for erasure wiretap channels
-
Sep.
-
A. Suresh, A. Subramanian, A. Thangaraj, M. Bloch, and S. McLaughlin, "Strong secrecy for erasure wiretap channels," in Proc. IEEE Inf. Theory Workshop (ITW), Sep. 2010, pp. 1-5.
-
(2010)
Proc. IEEE Inf. Theory Workshop (ITW)
, pp. 1-5
-
-
Suresh, A.1
Subramanian, A.2
Thangaraj, A.3
Bloch, M.4
McLaughlin, S.5
-
30
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
DOI 10.1109/TIT.2007.901143
-
A. Thangaraj, S. Dihidar, A. Calderbank, S. McLaughlin, and J.-M. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007. (Pubitemid 47249863)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
31
-
-
80053941690
-
Achieving the secrecy capacity of wiretap channels using polar codes
-
Oct.
-
H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6428-6443, Oct. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.10
, pp. 6428-6443
-
-
Mahdavifar, H.1
Vardy, A.2
-
32
-
-
84866288919
-
Polar coding for secure transmission and key agreement
-
Oct.
-
O. Koyluoglu and H. El Gamal, "Polar coding for secure transmission and key agreement," IEEE Trans. Inf. Forensics Security, vol. 7, no. 5, pp. 1472-1483, Oct. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.5
, pp. 1472-1483
-
-
Koyluoglu, O.1
El Gamal, H.2
-
34
-
-
84936892450
-
Cryptology for digital tv broadcasting
-
Jun.
-
B. Macq and J.-J. Quisquater, "Cryptology for digital tv broadcasting," Proc. IEEE, vol. 83, no. 6, pp. 944-957, Jun. 1995.
-
(1995)
Proc. IEEE
, vol.83
, Issue.6
, pp. 944-957
-
-
Macq, B.1
Quisquater, J.-J.2
-
35
-
-
0042634258
-
A secure conditional access system using digital signature and encryption
-
Jun.
-
A. Noore, "A secure conditional access system using digital signature and encryption," in Proc. IEEE Int. Conf. Consum. Electron. (ICCE), Jun. 2003, pp. 220-221.
-
(2003)
Proc. IEEE Int. Conf. Consum. Electron. (ICCE)
, pp. 220-221
-
-
Noore, A.1
-
37
-
-
0038087408
-
-
Ph.D. dissertation, Technical Univ. Catalonia (UPC), Barcelona, Spain
-
D. P. Palomar, "A unified framework for communications through MIMO channels," Ph.D. dissertation, Technical Univ. Catalonia (UPC), Barcelona, Spain, 2003.
-
(2003)
A Unified Framework for Communications Through MIMO Channels
-
-
Palomar, D.P.1
-
38
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. Petropulu, and H. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.3
Poor, H.4
-
39
-
-
67249085576
-
Filter design with secrecy constraints: The degraded parallel Gaussian wiretap channel
-
Dec.
-
M. Rodrigues and P. Almeida, "Filter design with secrecy constraints: The degraded parallel Gaussian wiretap channel," in Proc. IEEE Global Telecommun. Conf. (IEEE GLOBECOM), Dec. 2008, pp. 1-5.
-
(2008)
Proc. IEEE Global Telecommun. Conf. (IEEE GLOBECOM)
, pp. 1-5
-
-
Rodrigues, M.1
Almeida, P.2
-
40
-
-
80052017631
-
Filter design with secrecy constraints: The degraded multiple-input multiple-output Gaussian wiretap channel
-
May
-
H. Reboredo, M. Ara, M. Rodrigues, and J. Xavier, "Filter design with secrecy constraints: The degraded multiple-input multiple-output Gaussian wiretap channel," in Proc. IEEE 73rd Veh. Technol. Conf. (VTC Spring 2011), May 2011, pp. 1-5.
-
(2011)
Proc. IEEE 73rd Veh. Technol. Conf. (VTC Spring 2011)
, pp. 1-5
-
-
Reboredo, H.1
Ara, M.2
Rodrigues, M.3
Xavier, J.4
-
41
-
-
70349223815
-
Fixed SINR solutions for the MIMO wiretap channel
-
Apr.
-
A. Swindlehurst, "Fixed SINR solutions for the MIMO wiretap channel," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP), Apr. 2009, pp. 2437-2440.
-
(2009)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP)
, pp. 2437-2440
-
-
Swindlehurst, A.1
-
42
-
-
0026841678
-
Suppression of near-and far-end crosstalk by linear pre-and post-filtering
-
Apr.
-
M. Honig, P. Crespo, and K. Steiglitz, "Suppression of near- and far-end crosstalk by linear pre- and post-filtering," IEEE J. Sel. Areas Commun., vol. 10, no. 3, pp. 614-629, Apr. 1992.
-
(1992)
IEEE J. Sel. Areas Commun.
, vol.10
, Issue.3
, pp. 614-629
-
-
Honig, M.1
Crespo, P.2
Steiglitz, K.3
-
46
-
-
0004236492
-
-
3rd ed. Baltimore, MD, USA: The Johns Hopkins Univ. Press
-
G. H. Golub and C. F. V. Loan, Matrix computations, 3rd ed. Baltimore, MD, USA: The Johns Hopkins Univ. Press, 1996.
-
(1996)
Matrix Computations
-
-
Golub, G.H.1
Loan, C.F.V.2
-
48
-
-
0032668395
-
Optimum power control over fading channels
-
Jul.
-
G. Caire, G. Taricco, and E. Biglieri, "Optimum power control over fading channels," IEEE Trans. Inf. Theory, vol. 45, no. 5, pp. 1468-1489, Jul. 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.5
, pp. 1468-1489
-
-
Caire, G.1
Taricco, G.2
Biglieri, E.3
-
50
-
-
84871653891
-
Power allocation in multi-antenna wireless systems subject to simultaneous power constraints
-
Dec
-
M. Khoshnevisan and J. N. Laneman, "Power allocation in multi-antenna wireless systems subject to simultaneous power constraints," IEEE Trans. Commun., vol. 60, no. 12, pp. 3855-3864, Dec. 2012. Tecnologia Tecnologia Tecnologia Tecnologia
-
(2012)
IEEE Trans. Commun.
, vol.60
, Issue.12
, pp. 3855-3864
-
-
Khoshnevisan, M.1
Laneman, J.N.2
|