-
3
-
-
84890522850
-
Communication theory of secrecy systems
-
C. Shannon, "Communication theory of secrecy systems," Bell System Technical J., vol. 28, no. 4, pp. 656-715, 1949.
-
(1949)
Bell System Technical J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.1
-
4
-
-
0016562514
-
The wire-tap channel
-
A. Wyner, "The wire-tap channel," Bell System Technical J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell System Technical J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
5
-
-
0017973511
-
Broadcast channels with confidential messages
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
6
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
7
-
-
0027629488
-
Common randomness in information theory and cryptography i secret sharing
-
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography. i. secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
9
-
-
84931425598
-
Secret communication using artificial noise
-
R. Negi and S. Goel, "Secret communication using artificial noise," in IEEE Vehicular Technology Conference, 2005, vol. 62, p. 1906.
-
(2005)
IEEE Vehicular Technology Conference
, vol.62
, pp. 1906
-
-
Negi, R.1
Goel, S.2
-
10
-
-
33847353721
-
Secret communication in presence of colluding eavesdroppers
-
S. Goel and R. Negi, "Secret communication in presence of colluding eavesdroppers," in IEEE Military Communications Conference, 2005, pp. 1501-1506.
-
(2005)
IEEE Military Communications Conference
, pp. 1501-1506
-
-
Goel, S.1
Negi, R.2
-
11
-
-
80051752373
-
Two-hop secure communication using an untrusted relay: A case for cooperative jamming
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay: A case for cooperative jamming," in IEEE GLOBECOM 2008, pp. 1-5, 2008.
-
(2008)
IEEE GLOBECOM
, vol.2008
, pp. 1-5
-
-
He, X.1
Yener, A.2
-
13
-
-
54749106691
-
On the secrecy capacity of fading channels
-
P. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.1
Lai, L.2
El Gamal, H.3
-
14
-
-
82055177123
-
Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks
-
D. Goeckel, S. Vasudevan, D. Towsley, S. Adams, Z. Ding, and K. Leung, "Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks," IEEE J. Sel. Areas Commun., vol. 29, pp. 2067-2076, 2011.
-
(2011)
IEEE J. Sel. Areas Commun.
, vol.29
, pp. 2067-2076
-
-
Goeckel, D.1
Vasudevan, S.2
Towsley, D.3
Adams, S.4
Ding, Z.5
Leung, K.6
-
15
-
-
84861601537
-
Physical layer security from inter-session interference in large wireless networks
-
A. Sheikholeslami, D. Goeckel, H. Pishro-Nik, and D. Towsley, "Physical layer security from inter-session interference in large wireless networks," in IEEE INFOCOM Proceedings, pp. 1179-1187, 2012.
-
(2012)
IEEE INFOCOM Proceedings
, pp. 1179-1187
-
-
Sheikholeslami, A.1
Goeckel, D.2
Pishro-Nik, H.3
Towsley, D.4
-
16
-
-
84958598231
-
Unconditional Security Against Memory-Bounded Adversaries
-
Advances in Cryptology - CRYPTO '97
-
C. Cachin and U. Maurer, "Unconditional security against memorybounded adversaries," Advances in Cryptology, pp. 292-306, 1997. (Pubitemid 127112560)
-
(1997)
Lecture Notes In Computer Science
, Issue.1294
, pp. 292-306
-
-
Cachin, C.1
Maurer, U.2
-
17
-
-
84883329227
-
Imft 25-nm mlc nand: Technology scaling barriers broken
-
R. Kuchibhatla, "Imft 25-nm mlc nand: technology scaling barriers broken," EE Times News and Analysis, 2010.
-
(2010)
EE Times News and Analysis
-
-
Kuchibhatla, R.1
-
19
-
-
78149250982
-
A fundamental physical limit to data transmission and processing
-
S. Krone and G. Fettweis, "A fundamental physical limit to data transmission and processing," IEEE Signal Process. Lett., vol. 17, no. 3, pp. 305-307, 2010.
-
(2010)
IEEE Signal Process. Lett.
, vol.17
, Issue.3
, pp. 305-307
-
-
Krone, S.1
Fettweis, G.2
-
20
-
-
84875757535
-
Systems and circuits for sensing, co-existence, and interference mitigation in sdr and cognitive radios
-
R. Harjani, B. Sadler, H. Hashemi, and J. Rudell (Organizers), "Systems and circuits for sensing, co-existence, and interference mitigation in sdr and cognitive radios," in IEEE RFIC Symposium, 2011.
-
(2011)
IEEE RFIC Symposium
-
-
Harjani, R.1
Sadler, B.2
Hashemi, H.3
Rudell, J.4
-
21
-
-
0000898978
-
Single-sideband transmission by envelope elimination and restoration
-
L. Kahn, "Single-sideband transmission by envelope elimination and restoration," Proc. IRE, vol. 40, no. 7, pp. 803-806, 1952.
-
(1952)
Proc. IRE
, vol.40
, Issue.7
, pp. 803-806
-
-
Kahn, L.1
-
23
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644-654, 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
27
-
-
64549110900
-
On the secrecy capacity of arbitrary wiretap channels
-
M. Bloch and J. Laneman, "On the secrecy capacity of arbitrary wiretap channels," in 46th Annual Allerton Conference, pp. 818-825, 2008.
-
(2008)
46th Annual Allerton Conference
, pp. 818-825
-
-
Bloch, M.1
Laneman, J.2
-
29
-
-
0025462466
-
Non-equiprobable signaling on the gaussian channel
-
A. Calderbank and L. Ozarow, "Non-equiprobable signaling on the gaussian channel," IEEE Trans. Inf. Theory, vol. 36, pp. 726-740, 1990.
-
(1990)
IEEE Trans. Inf. Theory
, vol.36
, pp. 726-740
-
-
Calderbank, A.1
Ozarow, L.2
-
30
-
-
0029195849
-
Spread spectrum access methods for wireless communications
-
R. Kohno, R. Meidan, and L. Milstein, "Spread spectrum access methods for wireless communications," IEEE Commun. Mag., vol. 33, no. 1, pp. 58-67, 1995.
-
(1995)
IEEE Commun. Mag.
, vol.33
, Issue.1
, pp. 58-67
-
-
Kohno, R.1
Meidan, R.2
Milstein, L.3
-
31
-
-
39049144353
-
Secrecy capacity of wireless channels
-
DOI 10.1109/ISIT.2006.261613, 4035982, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
-
J. Barros and M. Rodrigues, "Secrecy capacity of wireless channels," in IEEE International Symposium on Information Theory, pp. 356-360, 2006. (Pubitemid 351244113)
-
(2006)
IEEE International Symposium on Information Theory - Proceedings
, pp. 356-360
-
-
Barros, J.1
Rodrigues, M.R.D.2
-
32
-
-
84883419094
-
Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy
-
A. Sheikholeslami, D. Goeckel, and Pishro-Nik, "Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy," to apear in 2013 IEEE International Symposium on Information Theory Proceedings, (available online: www.ecs.umass.edu/∼goeckel/Artificial Intersymbol Interference.pdf) .
-
(2013)
IEEE International Symposium on Information Theory Proceedings
-
-
Sheikholeslami, A.1
Goeckel, D.2
Pishro-Nik3
|