-
1
-
-
0016562514
-
The wire-tap channel
-
October
-
A. D. Wyner, "The Wire-Tap Channel," The Bell System Technical Hournal, vol. 54, no. 8, pp. 1355-1387, October 1975.
-
(1975)
The Bell System Technical Hournal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
54749106691
-
-
Oct
-
P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
On the Secrecy Capacity of Fading Channels
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
3
-
-
39049144353
-
Secrecy capacity of wireless channels
-
Seattle, WA, July
-
J. Barros and M. R. D. Rodrigues, "Secrecy capacity of wireless channels," in Proc. IEEE Int. Symposium Inform. Theory, Seattle, WA, July 2006, pp. 356-360.
-
(2006)
Proc. IEEE Int. Symposium Inform. Theory
, pp. 356-360
-
-
Barros, J.1
Rodrigues, M.R.D.2
-
4
-
-
77951118738
-
Secret communication with feedback
-
Auckland, New Zealand, Dec
-
D. Gunduz, R. Brown, and H. V. Poor, "Secret communication with feedback," in Proc. IEEE Intl. Symposium on Information Theory and its Applications, Auckland, New Zealand, Dec. 2008.
-
(2008)
Proc. IEEE Intl. Symposium on Information Theory and Its Applications
-
-
Gunduz, D.1
Brown, R.2
Poor, H.V.3
-
5
-
-
77953802876
-
Secure transmission with multiple antennas: The MISOME wiretap channel
-
July
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas: The MISOME wiretap channel," IEEE Trans. Inform. Theory, vol. 56, no. 7, pp. 3088-3104, July 2010.
-
(2010)
IEEE Trans. Inform. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
6
-
-
45249119255
-
Secure communication over fading channels
-
June
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Trans. Inform. Theory, vol. 54, no. 6, pp. 2470-2492, June 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
8
-
-
76249124606
-
A secure communication game with a relay helping the eavesdropper
-
Italy Oct
-
M. Yuksel, X. Liu, and E. Erkip, "A secure communication game with a relay helping the eavesdropper," Taormina, Italy, Oct 2009.
-
(2009)
Taormina
-
-
Yuksel, M.1
Liu, X.2
Erkip, E.3
-
9
-
-
84860255627
-
-
May
-
O. O. Koyluoglu, C. E. Koksal, and H. E. Gamal, "On secrecy capacity scaling in wireless networks," vol. 58, no. 5, pp. 3000-3015, May 2012.
-
(2012)
On Secrecy Capacity Scaling in Wireless Networks
, vol.58
, Issue.5
, pp. 3000-3015
-
-
Koyluoglu, O.O.1
Koksal, C.E.2
Gamal, H.E.3
-
10
-
-
84883417799
-
On the effect of colluding eavesdroppers on secrecy scaling
-
EW, Lucca, Italy
-
-, "On the effect of colluding eavesdroppers on secrecy scaling," in Proceedings of European Wireless, EW, Lucca, Italy, 2010.
-
(2010)
Proceedings of European Wireless
-
-
Koyluoglu, O.O.1
Koksal, C.E.2
Gamal, H.E.3
-
11
-
-
79955778473
-
-
Austin, TX, June
-
S. Goel, V. Aggarwal, A. Yener, and A. R. Calderbank, "Modeling location uncertainty for eavesdroppers: A secrecy graph approach," Austin, TX, June 2010.
-
(2010)
Modeling Location Uncertainty for Eavesdroppers: A Secrecy Graph Approach
-
-
Goel, S.1
Aggarwal, V.2
Yener, A.3
Calderbank, A.R.4
-
12
-
-
78649274399
-
-
Chicago IL, September
-
S. Vasudevan, D. Goeckel, and D. F. Towsley, "Security-capacity tradeoff in large wireless networks using keyless secrecy," Chicago, IL, September 2010.
-
(2010)
Security-capacity Tradeoff in Large Wireless Networks Using Keyless Secrecy
-
-
Vasudevan, S.1
Goeckel, D.2
Towsley, D.F.3
-
14
-
-
79958019544
-
Control of wireless networks with secrecy
-
Pacific Grove, CA Nov
-
C. E. Koksal and O. Ercetin, "Control of wireless networks with secrecy," in "Asilomar Conference on Signals, Systems, and Computers", Pacific Grove, CA, Nov. 2010.
-
(2010)
Asilomar Conference on Signals, Systems, and Computers
-
-
Koksal, C.E.1
Ercetin, O.2
-
16
-
-
0026626024
-
Jointly optimal routing and scheduling in packet ratio networks
-
Jan
-
L. Tassiulas and A. Ephremides, "Jointly optimal routing and scheduling in packet ratio networks," IEEE Transactions on Information Theory, vol. 38, no. 1, pp. 165-168, Jan. 1992.
-
(1992)
IEEE Transactions on Information Theory
, vol.38
, Issue.1
, pp. 165-168
-
-
Tassiulas, L.1
Ephremides, A.2
-
17
-
-
0037444521
-
A framework for opportunistic scheduling in wireless networks
-
X. Liu, E. K. P. Chong, and N. B. Shroff, "A framework for opportunistic scheduling in wireless networks," Computer Networks, vol. 41, no. 4, pp. 451-474, 2003.
-
(2003)
Computer Networks
, vol.41
, Issue.4
, pp. 451-474
-
-
Liu, X.1
Chong, E.K.P.2
Shroff, N.B.3
-
18
-
-
33646011240
-
The impact of imperfect scheduling on cross-layer congestion control in wireless networks
-
April
-
X. Lin and N. B. Shroff, "The Impact of Imperfect Scheduling on Cross-Layer Congestion Control in Wireless Networks," IEEE/ACM Transactions on Networking, vol. 14, no. 2, pp. 302-315, April 2006.
-
(2006)
IEEE/ACM Transactions on Networking
, vol.14
, Issue.2
, pp. 302-315
-
-
Lin, X.1
Shroff, N.B.2
-
19
-
-
33747303799
-
Joint congestion control, routing and MAC for stability and fairness in wireless networks
-
August
-
A. Eryilmaz and R. Srikant, "Joint Congestion Control, Routing and MAC for Stability and Fairness in Wireless Networks," IEEE Journal on Selected Areas in Communications, vol. 24, pp. 1514-1524, August 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, pp. 1514-1524
-
-
Eryilmaz, A.1
Srikant, R.2
-
20
-
-
33746909107
-
Energy optimal control for time varying wireless networks
-
July
-
M. J. Neely, "Energy Optimal Control for Time Varying Wireless Networks," IEEE Transactions on Information Theory, vol. 52, no. 7, pp. 2915-2934, July 2006.
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.7
, pp. 2915-2934
-
-
Neely, M.J.1
-
21
-
-
77953310009
-
-
Seoul, Korea, June-July
-
K. Khalil, M. Youssef, O. O. Koyluoglu, and H. El Gamal, "On the delay limited secrecy capacity of fading channels," Seoul, Korea, June-July 2009.
-
(2009)
On the Delay Limited Secrecy Capacity of Fading Channels
-
-
Khalil, K.1
Youssef, M.2
Koyluoglu, O.O.3
El Gamal, H.4
-
22
-
-
79955779971
-
-
San Diego, CA, March
-
O. Gungor, J. Tan, C. E. Koksal, H. El Gamal, and N. B. Shroff, "Joint power and secret key queue management for delay limited secure communication," San Diego, CA, March 2010.
-
(2010)
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
-
-
Gungor, O.1
Tan, J.2
Koksal, C.E.3
El Gamal, H.4
Shroff, N.B.5
-
23
-
-
84859730351
-
Near optimal power and rate control of multi-hop sensor networks with energy replenishment: Basic limitations with finite energy and data storage
-
Z. Mao, C. E. Koksal, and N. B. Shroff, "Near Optimal Power and Rate Control of Multi-hop Sensor Networks with Energy Replenishment: Basic Limitations with Finite Energy and Data Storage," IEEE Transactions on Automatic Control, vol. 57, no. 4, pp. 815-829.
-
IEEE Transactions on Automatic Control
, vol.57
, Issue.4
, pp. 815-829
-
-
Mao, Z.1
Koksal, C.E.2
Shroff, N.B.3
-
25
-
-
14944338971
-
A methodology for estimating interdomain web traffic demand
-
A. Feldmann, N. Kammenhuber, O. Maennel, B. Maggs, R. D. Prisco, and R. Sundaram., "A Methodology for Estimating Interdomain Web Traffic Demand," In IMC, 2004.
-
(2004)
IMC
-
-
Feldmann, A.1
Kammenhuber, N.2
Maennel, O.3
Maggs, B.4
Prisco, R.D.5
Sundaram, R.6
|