-
1
-
-
84890522850
-
A mathematical theory of cryptography
-
Oct
-
C. Shannon, "A mathematical theory of cryptography," Bell System Technical J., vol. 28, pp. 656-715, Oct. 1949.
-
(1949)
Bell System Technical J.
, vol.28
, pp. 656-715
-
-
Shannon, C.1
-
2
-
-
0003851399
-
-
2nd ed. John Wiley and Sons, Inc.
-
B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed. John Wiley and Sons, Inc., 1996.
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
6
-
-
84858162419
-
Information and inference in the wireless physical layer
-
Feb
-
H. V. Poor, "Information and inference in the wireless physical layer," IEEE Wireless Commun., vol. 1, no. 19, pp. 40-47, Feb. 2012.
-
(2012)
IEEE Wireless Commun.
, vol.1
, Issue.19
, pp. 40-47
-
-
Poor, H.V.1
-
7
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Techn. J., vol. 54, no. 8, pp. 1385-1357, Oct. 1975.
-
(1975)
Bell Syst. Techn. J.
, vol.54
, Issue.8
, pp. 1385-1357
-
-
Wyner, A.D.1
-
8
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. K?orner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
9
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
10
-
-
45249104850
-
Wireless information-theoretic security
-
Jun
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
11
-
-
45249119255
-
Secure communication over fading channels
-
Jun
-
Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 6, no. 54, pp. 2470-2492, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.6
, Issue.54
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
12
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct
-
P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687- 5403, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-5403
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
13
-
-
69449086815
-
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel
-
Sep
-
S. Shafiee and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: the 2-2-1 channel," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4033-4039, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.9
, pp. 4033-4039
-
-
Shafiee, S.1
Ulukus, S.2
-
14
-
-
77953802876
-
Secure transmission with multiple antennas- part I: The MISOME wiretap channel
-
Jul
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas- part I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088- 3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
15
-
-
77958560746
-
Secure transmission with multiple antennas- part II: The MIMOME wiretap channel
-
Nov
-
- , "Secure transmission with multiple antennas- part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515- 5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
16
-
-
69249208566
-
An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel
-
R. Bustin, R. Liu, H. V. Poor, and S. Shamai, "An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel," EURASIP J. Wireless Communications and Networking, vol. 3, 2009.
-
(2009)
EURASIP J. Wireless Communications and Networking
, vol.3
-
-
Bustin, R.1
Liu, R.2
Poor, H.V.3
Shamai, S.4
-
17
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Aug
-
F. E. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961- 4972, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.E.1
Hassibi, B.2
-
18
-
-
84858390705
-
Secrecy outage in MISO systems with partial channel information
-
Apr
-
S. Gerbracht, C. Scheunert, and E. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Trans. Inf. Forens. Security, vol. 7, no. 2, pp. 704-716, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forens. Security
, vol.7
, Issue.2
, pp. 704-716
-
-
Gerbracht, S.1
Scheunert, C.2
Jorswieck, E.3
-
19
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar
-
D. Lun, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, part 2, pp. 1845-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3 PART 2
, pp. 1845-1888
-
-
Lun, D.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
20
-
-
79551634548
-
Physical layer security for two way relay communications with friendly jammers
-
Miami, FL Dec.
-
R. Zhang, L. Song, Z. Han, and B. J. M. Debbah, "Physical layer security for two way relay communications with friendly jammers," in Proc. IEEE Global Communications Conference (GLOBECOM), Miami, FL, Dec. 2010, pp. 1-6.
-
(2010)
Proc. IEEE Global Communications Conference (GLOBECOM)
, pp. 1-6
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Debbah, B.J.M.4
-
21
-
-
84867602642
-
Secrecy analysis of unauthenticated amplify-and-forward relaying with antenna selection
-
Kyoto, Japan
-
J. Huang, A. Mukherjee, and A. L. Swindlehurst, "Secrecy analysis of unauthenticated amplify-and-forward relaying with antenna selection," in Proc. IEEE Int. Conference on Acoustics, Speech and Signal Processing (ICASSP), Kyoto, Japan, 2012, pp. 2481- 2484.
-
(2012)
Proc. IEEE Int. Conference on Acoustics, Speech and Signal Processing (ICASSP)
, pp. 2481-2484
-
-
Huang, J.1
Mukherjee, A.2
Swindlehurst, A.L.3
-
22
-
-
79955491895
-
Interference assisted secret communication
-
May
-
X. Tang, R. Liu, P. Spasojevic, and H.V. Poor, "Interference assisted secret communication," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153-3167, May 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.5
, pp. 3153-3167
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.V.4
-
23
-
-
84859904000
-
Achievable secrecy rates in physical layer secure systems with a helping interferer
-
Maui, HI Feb.
-
A. Chorti and H. V. Poor, "Achievable secrecy rates in physical layer secure systems with a helping interferer," in Proc. IEEE Int. Conference on Computing, Networking and Communications, Maui, HI, Feb. 2012, pp. 18-22.
-
(2012)
Proc. IEEE Int. Conference on Computing, Networking and Communications
, pp. 18-22
-
-
Chorti, A.1
Poor, H.V.2
-
24
-
-
84868536644
-
Helping interferer physical layer security strategies for M-QAM and M-PSK systems
-
Princeton, NJ Mar.
-
A. Chorti, "Helping interferer physical layer security strategies for M-QAM and M-PSK systems," in Proc. 46th Annual Conference on Information Sciences and Systems, Princeton, NJ, Mar. 2012, pp. 1-6.
-
(2012)
Proc. 46th Annual Conference on Information Sciences and Systems
, pp. 1-6
-
-
Chorti, A.1
-
25
-
-
84862963131
-
Joint relay and jammer selection for secure two-way relay networks
-
Feb
-
J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, "Joint relay and jammer selection for secure two-way relay networks," IEEE Trans. Inf. Forens. Security, vol. 7, no. 1, pp. 388-396, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forens. Security
, vol.7
, Issue.1
, pp. 388-396
-
-
Chen, J.1
Zhang, R.2
Song, L.3
Han, Z.4
Jiao, B.5
-
26
-
-
84940668880
-
Secure broadcasting with multiuser diversity
-
Monticello IL Sep.
-
A. Khisti, A. Tchamkerten, and G. Wornell, "Secure broadcasting with multiuser diversity," in Proc. 44th Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, Sep. 2006.
-
(2006)
Proc. 44th Annual Allerton Conference on Communication, Control and Computing
-
-
Khisti, A.1
Tchamkerten, A.2
Wornell, G.3
-
27
-
-
77951491977
-
On multiuser secrecy rate in flat fading channel
-
Boston, MA Oct.
-
J. Hyoungsuk, K. Namshik, C. Jinho, L. Hyuckjae, and H. Jeongseok, "On multiuser secrecy rate in flat fading channel," in Proc. IEEE Military Communications Conference (MILCOM), Boston, MA, Oct. 2009.
-
(2009)
Proc. IEEE Military Communications Conference (MILCOM)
-
-
Hyoungsuk, J.1
Namshik, K.2
Jinho, C.3
Hyuckjae, L.4
Jeongseok, H.5
-
28
-
-
77955394210
-
Secure communications through Rayleigh fading SIMO channel with multiple eavesdroppers
-
Cape Town, South Africa, May
-
M. Z. I. Sarkar and T. Ratnarajah, "Secure communications through Rayleigh fading SIMO channel with multiple eavesdroppers," in Proc. IEEE Int. Conference on Communications (ICC), Cape Town, South Africa, May 2010.
-
(2010)
Proc. IEEE Int. Conference on Communications (ICC)
-
-
Sarkar, M.Z.I.1
Ratnarajah, T.2
-
29
-
-
76649135514
-
Physical layer security game: Interaction between source, eavesdropper and friendly jammer
-
Jun., special issue on Wireless Physical Layer Security
-
Z. Han, N. Marina, M. Debbah, and A. Hjorungnes, "Physical layer security game: Interaction between source, eavesdropper and friendly jammer," EURASIP J. Wireless Communications and Networking, Jun. 2009, special issue on Wireless Physical Layer Security.
-
(2009)
EURASIP J. Wireless Communications and Networking
-
-
Han, Z.1
Marina, N.2
Debbah, M.3
Hjorungnes, A.4
-
30
-
-
79957667257
-
Interference alignment for secrecy
-
Jun
-
O. Koyluoglu, H. El Gamal, L. Lai, and H. V. Poor, "Interference alignment for secrecy," IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. 3323-3332, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.6
, pp. 3323-3332
-
-
Koyluoglu, O.1
El Gamal, H.2
Lai, L.3
Poor, H.V.4
-
31
-
-
79960433598
-
Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming
-
Aug
-
Q. Li and W. Ma, "Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming," IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799-3812, Aug. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.8
, pp. 3799-3812
-
-
Li, Q.1
Ma, W.2
-
32
-
-
84877662582
-
Physical layer security in wireless networks with passive and active eavesdroppers
-
Anaheim, CA Dec.
-
A. Chorti, S. M. Perlaza, Z. Han, and H. V. Poor, Physical layer security in wireless networks with passive and active eavesdroppers, in Proc. IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, Dec. 2012.
-
(2012)
Proc. IEEE Global Communications Conference (GLOBECOM)
-
-
Chorti, A.1
Perlaza, S.M.2
Han, Z.3
Poor, H.V.4
-
36
-
-
0029214373
-
Information capacity and power control in single-cell multiuser communications
-
Seattle, WA Jun.
-
R. Knopp and P. A. Humblet, "Information capacity and power control in single-cell multiuser communications," in IEEE Int. Conference on Communications (ICC), vol. 1, Seattle, WA, Jun. 1995, pp. 331-335.
-
(1995)
IEEE Int. Conference on Communications (ICC)
, vol.1
, pp. 331-335
-
-
Knopp, R.1
Humblet, P.A.2
-
37
-
-
84976699318
-
The Byzantine generals problem
-
Jul
-
L. Lamport, R. Shostak, and M. Pease, "The Byzantine generals problem," ACM Trans. Programming Languages Syst., vol. 4, no. 3, pp. 382-401, Jul. 1982.
-
(1982)
ACM Trans. Programming Languages Syst.
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
38
-
-
58649109373
-
Distributed detection in the presence of Byzantine attack
-
Jan
-
S. Marano, V. Matta, and L. Tong, "Distributed detection in the presence of Byzantine attack," IEEE Trans. Signal Process., vol. 57, no. 1, pp. 16-29, Jan. 2009.
-
(2009)
IEEE Trans. Signal Process.
, vol.57
, Issue.1
, pp. 16-29
-
-
Marano, S.1
Matta, V.2
Tong, L.3
-
39
-
-
34547488337
-
Robust detection of selfish misbehavior in wireless networks
-
DOI 10.1109/JSAC.2007.070807
-
A. L. Toledo and X. Wang, "Robust detection of selfish misbehavior in wireless networks," IEEE J. Sel. Areas Commun., vol. 25, no. 6, pp. 1124-1134, Aug. 2007. (Pubitemid 47171203)
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.6
, pp. 1124-1134
-
-
Toledo, A.L.1
Wang, X.2
-
40
-
-
0036530960
-
Experimental analysis of the joint statistical properties of azimuth spread, delay spread, and shadow fading
-
DOI 10.1109/49.995511, PII S0733871602032948
-
A. Algans, K. I. Pedersen, and P. E. Mogensen, "Experimental analysis of the joint statistical properties of azimuth spread, delay spread, and shadow fading," IEEE J. Sel. Areas Commun., vol. 20, no. 3, pp. 523- 531, Apr. 2002. (Pubitemid 34554892)
-
(2002)
IEEE Journal on Selected Areas in Communications
, vol.20
, Issue.3
, pp. 523-531
-
-
Algans, A.1
Pedersen, K.I.2
Mogensen, P.E.3
-
41
-
-
84877673847
-
A new neighbor discovery scheme based on spatial correlation of wireless channel
-
Barcelona, Spain Apr.
-
L. Woongsup and C. Dong-Ho, "A new neighbor discovery scheme based on spatial correlation of wireless channel," in Proc. IEEE Vehicular Technology Conference (VTC-Spring), Barcelona, Spain, Apr. 2009.
-
(2009)
Proc. IEEE Vehicular Technology Conference (VTC-Spring)
-
-
Woongsup, L.1
Dong-Ho, C.2
|