메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Secure degrees of freedom of the Gaussian wiretap channel with helpers and no eavesdropper CSI: Blind cooperative jamming

Author keywords

[No Author keywords available]

Indexed keywords

COOPERATIVE JAMMING; GAUSSIANS; INFORMATION LEAKAGE; INFORMATION SYMBOL; WIRE-TAP CHANNELS;

EID: 84881483763     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CISS.2013.6552261     Document Type: Conference Paper
Times cited : (42)

References (31)
  • 2
    • 84881536934 scopus 로고    scopus 로고
    • Secure degrees of freedom of one-hop wireless networks
    • September. Also available at [arXiv:1209.5370]
    • J. Xie and S. Ulukus. Secure degrees of freedom of one-hop wireless networks. Submitted to IEEE Trans. on Information Theory, September 2012. Also available at [arXiv:1209.5370].
    • (2012) IEEE Trans. on Information Theory
    • Xie, J.1    Ulukus, S.2
  • 4
    • 0016562514 scopus 로고
    • The wiretap channel
    • January
    • A. D. Wyner. The wiretap channel. Bell Syst. Tech. J., 54(8):1355-1387, January 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 5
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszar and J. Korner. Broadcast channels with confidential messages. IEEE Trans. Inf. Theory, 24(3):339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 7
    • 45249090083 scopus 로고    scopus 로고
    • Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
    • June
    • R. Liu, I. Maric, P. Spasojevic, and R. D. Yates. Discrete memoryless interference and broadcast channels with confidential messages: secrecy rate regions. IEEE Trans. Inf. Theory, 54(6):2493-2507, June 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2493-2507
    • Liu, R.1    Maric, I.2    Spasojevic, P.3    Yates, R.D.4
  • 8
    • 70349665189 scopus 로고    scopus 로고
    • A new outer bound for the Gaussian interference channel with confidential messages
    • Baltimore, MD, March
    • X. He and A. Yener. A new outer bound for the Gaussian interference channel with confidential messages. In 43rd Annual Conference on Information Sciences and Systems, Baltimore, MD, March 2009.
    • (2009) 43rd Annual Conference on Information Sciences and Systems
    • He, X.1    Yener, A.2
  • 9
    • 80052369884 scopus 로고    scopus 로고
    • Cooperative encoding for secrecy in interference channels
    • September
    • O. O. Koyluoglu and H. El Gamal. Cooperative encoding for secrecy in interference channels. IEEE Trans. Inf. Theory, 57(9):5681-5694, September 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.9 , pp. 5681-5694
    • Koyluoglu, O.O.1    El Gamal, H.2
  • 10
    • 57349093480 scopus 로고    scopus 로고
    • The Gaussian multiple access wire-tap channel
    • December
    • E. Tekin and A. Yener. The Gaussian multiple access wire-tap channel. IEEE Trans. Inf. Theory, 54(12):5747-5755, December 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.12 , pp. 5747-5755
    • Tekin, E.1    Yener, A.2
  • 11
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming
    • June
    • E. Tekin and A. Yener. The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming. IEEE Trans. Inf. Theory, 54(6):2735-2751, June 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 13
    • 40949147785 scopus 로고    scopus 로고
    • Multiple-access channels with confidential messages
    • March
    • Y. Liang and H. V. Poor. Multiple-access channels with confidential messages. IEEE Trans. Inf. Theory, 54(3):976-1002, March 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.3 , pp. 976-1002
    • Liang, Y.1    Poor, H.V.2
  • 16
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • September
    • L. Lai and H. El Gamal. The relay-eavesdropper channel: cooperation for secrecy. IEEE Trans. Inf. Theory, 54(9):4005-4019, September 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    El Gamal, H.2
  • 19
    • 79952406869 scopus 로고    scopus 로고
    • Real interference alignment for the K-user Gaussian interference compound wiretap channel
    • Monticello, IL, September
    • J. Xie and S. Ulukus. Real interference alignment for the K-user Gaussian interference compound wiretap channel. In 48th Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, September 2010.
    • (2010) 48th Annual Allerton Conference on Communication, Control and Computing
    • Xie, J.1    Ulukus, S.2
  • 20
    • 84860255627 scopus 로고    scopus 로고
    • On secrecy capacity scaling in wireless networks
    • May
    • O. O. Koyluoglu, C. E. Koksal, and H. El Gamal. On secrecy capacity scaling in wireless networks. IEEE Trans. Inf. Theory, 58(5):3000-3015, May 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.5 , pp. 3000-3015
    • Koyluoglu, O.O.1    Koksal, C.E.2    El Gamal, H.3
  • 21
    • 77951565555 scopus 로고    scopus 로고
    • Secure degrees of freedom for Gaussian channels with interference: Structured codes outperform Gaussian signaling
    • Honolulu, Hawaii, December
    • X. He and A. Yener. Secure degrees of freedom for Gaussian channels with interference: Structured codes outperform Gaussian signaling. In IEEE Global Telecommunications Conference, Honolulu, Hawaii, December 2009.
    • (2009) IEEE Global Telecommunications Conference
    • He, X.1    Yener, A.2
  • 22
    • 79951955741 scopus 로고    scopus 로고
    • Providing secrecy with structured codes: Tools and applications to two-user Gaussian channels
    • submitted July. Also [arXiv:0907.5388]
    • X. He and A. Yener. Providing secrecy with structured codes: Tools and applications to two-user Gaussian channels. IEEE Trans. Inf. Theory, submitted July 2009. Also available at [arXiv:0907.5388].
    • (2009) IEEE Trans. Inf. Theory
    • He, X.1    Yener, A.2
  • 24
    • 80052150968 scopus 로고    scopus 로고
    • On the secure degrees-of-freedom of the multiple-access-channel
    • submitted March. [arXiv:1003.0729]
    • G. Bagherikaram, A. S. Motahari, and A. K. Khandani. On the secure degrees-of-freedom of the multiple-access-channel. IEEE Trans. Inf. Theory, submitted March 2010. Also available at [arXiv:1003.0729].
    • (2010) IEEE Trans. Inf. Theory
    • Bagherikaram, G.1    Motahari, A.S.2    Khandani, A.K.3
  • 25
    • 84857722105 scopus 로고    scopus 로고
    • Ergodic secret alignment
    • March
    • R. Bassily and S. Ulukus. Ergodic secret alignment. IEEE Trans. Inf. Theory, 58(3):1594-1611, March 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.3 , pp. 1594-1611
    • Bassily, R.1    Ulukus, S.2
  • 26
    • 79955497445 scopus 로고    scopus 로고
    • Interference alignment for the multiantenna compound wiretap channel
    • May
    • A. Khisti. Interference alignment for the multiantenna compound wiretap channel. IEEE Trans. Inf. Theory, 57(5):2976-2993, May 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.5 , pp. 2976-2993
    • Khisti, A.1
  • 28
    • 84867549102 scopus 로고    scopus 로고
    • On the sum secure degrees of freedom of twounicast layered wireless networks
    • Cambridge, MA, July
    • J. Xie and S. Ulukus. On the sum secure degrees of freedom of twounicast layered wireless networks. In IEEE International Symposium on Information Theory, Cambridge, MA, July 2012.
    • (2012) IEEE International Symposium on Information Theory
    • Xie, J.1    Ulukus, S.2
  • 30
    • 77953864343 scopus 로고    scopus 로고
    • Real interference alignment with real numbers
    • August [arXiv:0908.1208]
    • A. S. Motahari, S. Oveis-Gharan, and A. K. Khandani. Real interference alignment with real numbers. IEEE Trans. Inf. Theory, submitted August 2009. Also available at [arXiv:0908.1208].
    • (2009) IEEE Trans. Inf. Theory
    • Motahari, A.S.1    Oveis-Gharan, S.2    Khandani, A.K.3
  • 31
    • 78649258308 scopus 로고    scopus 로고
    • Real interference alignment: Exploiting the potential of single antenna systems
    • November [arXiv:0908.2282]
    • A. S. Motahari, S. Oveis-Gharan, M. A. Maddah-Ali, and A. K. Khandani. Real interference alignment: Exploiting the potential of single antenna systems. IEEE Trans. Inf. Theory, submitted November 2009. Also available at [arXiv:0908.2282].
    • (2009) IEEE Trans. Inf. Theory
    • Motahari, A.S.1    Oveis-Gharan, S.2    Maddah-Ali, M.A.3    Khandani, A.K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.