-
1
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
4
-
-
52349090496
-
The secrecy capacity of the MIMO wiretap channel
-
Toronto, Canada, Jul.
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," in Proc. IEEE Int. Symp. Inf. Theory, Toronto, Canada, Jul. 2008, pp. 524-528.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 524-528
-
-
Oggier, F.1
Hassibi, B.2
-
5
-
-
77953712316
-
On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks
-
Princeton, NU, USA, Mar.
-
H.Wang, L. Lightfoot, and T. Li, "On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks," in Proc. Annu. Conf. Inf. Sci. Syst., Princeton, NU, USA, Mar. 2010, pp. 1-6.
-
(2010)
Proc. Annu. Conf. Inf. Sci. Syst.
, pp. 1-6
-
-
Wang, H.1
Lightfoot, L.2
Li, T.3
-
6
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
7
-
-
84867799883
-
Physical layer security for two-way untrusted relaying with friendly jammers
-
Oct.
-
R. Zhang, L. Song, Z. Han, and B. Jiao, "Physical layer security for two-way untrusted relaying with friendly jammers," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693-3704, Oct. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3693-3704
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Jiao, B.4
-
8
-
-
84897584002
-
Jamming games in the MIMO wiretap channel with an active eavesdropper
-
Jan.
-
A. Mukherjee and A. L. Swindlehurst, "Jamming games in the MIMO wiretap channel with an active eavesdropper," IEEE Trans. Signal Process., vol. 61, no. 1, pp. 82-91, Jan. 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.1
, pp. 82-91
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
9
-
-
84878400311
-
Uncoordinated cooperative jamming for secret communications
-
Jul.
-
S. Luo, J. Li, and A. P. Petropulu, "Uncoordinated cooperative jamming for secret communications," IEEE Trans. Inf. Forenics Security, vol. 8, no. 7, pp. 1081-1090, Jul. 2013.
-
(2013)
IEEE Trans. Inf. Forenics Security
, vol.8
, Issue.7
, pp. 1081-1090
-
-
Luo, S.1
Li, J.2
Petropulu, A.P.3
-
10
-
-
70449514137
-
Secrecy throughput of MANETs with malicious nodes
-
Seoul, Korea, Jun.
-
Y. Liang, H. V. Poor, and L. Ying, "Secrecy throughput of MANETs with malicious nodes," in Proc. IEEE Int. Symp. Inf. Theory, Seoul, Korea, Jun. 2009, pp. 1189-1193.
-
(2009)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1189-1193
-
-
Liang, Y.1
Poor, H.V.2
Ying, L.3
-
11
-
-
79951681560
-
Secure wireless network connectivity with multi-antenna transmission
-
Feb.
-
X. Zhou, R. K. Ganti, and J. G. Andrews, "Secure wireless network connectivity with multi-antenna transmission," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 425-430, Feb. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.2
, pp. 425-430
-
-
Zhou, X.1
Ganti, R.K.2
Andrews, J.G.3
-
12
-
-
84855923041
-
Secure communication in stochastic wireless networks-Part I: Connectivity
-
Feb.
-
P. C. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks-Part I: Connectivity," IEEE Trans. Inf. Forenics Security, vol. 7, no. 1, pp. 125-138, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forenics Security
, vol.7
, Issue.1
, pp. 125-138
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
13
-
-
84860402665
-
On the throughput cost of physical layer security in decentralized wireless networks
-
Aug.
-
X. Zhou, R. K. Ganti, J. G. Andrews, and A. Hjørungnes, "On the throughput cost of physical layer security in decentralized wireless networks," IEEE Trans.Wireless Commun., vol. 10, no. 8, pp. 2764-2775, Aug. 2011.
-
(2011)
IEEE Trans.Wireless Commun.
, vol.10
, Issue.8
, pp. 2764-2775
-
-
Zhou, X.1
Ganti, R.K.2
Andrews, J.G.3
Hjørungnes, A.4
-
14
-
-
84871945106
-
Secure node packing of large-scale wireless networks
-
Ottawa, Canada, Jun.
-
J. Lee, H. Shin, and M. Z. Win, "Secure node packing of large-scale wireless networks," in Proc. IEEE Int. Conf. Commun., Ottawa, Canada, Jun. 2012, pp. 815-819.
-
(2012)
Proc. IEEE Int. Conf. Commun.
, pp. 815-819
-
-
Lee, J.1
Shin, H.2
Win, M.Z.3
-
15
-
-
77952682796
-
On secrecy capacity scaling in wireless networks
-
La Jolla, CA, USA, Feb.
-
O. O. Koyluoglu, C. E. Koksal, and H. E. Gamal, "On secrecy capacity scaling in wireless networks," in Proc. Inf. Theory Applicat.Workshop, La Jolla, CA, USA, Feb. 2010, pp. 1-4.
-
(2010)
Proc. Inf. Theory Applicat.Workshop
, pp. 1-4
-
-
Koyluoglu, O.O.1
Koksal, C.E.2
Gamal, H.E.3
-
16
-
-
78649282396
-
Security-capacity trade-off in large wireless networks using keyless secrecy
-
Chicago, IL, USA
-
S. Vasudevan, D. Goeckel, and D. Towsley, "Security-capacity trade-off in large wireless networks using keyless secrecy," in Proc. ACM Int. Symp. Mobile Ad Hoc Network. Comput., Chicago, IL, USA, 2010, pp. 21-30.
-
(2010)
Proc. ACM Int. Symp. Mobile Ad Hoc Network. Comput.
, pp. 21-30
-
-
Vasudevan, S.1
Goeckel, D.2
Towsley, D.3
-
17
-
-
84871984718
-
Cooperative jamming for secrecy in decentralized wireless networks
-
Ottawa, Canada, Jun.
-
X. Zhou, M. Tao, and R. A. Kennedy, "Cooperative jamming for secrecy in decentralized wireless networks," in Proc. IEEE Int. Conf. Commun., Ottawa, Canada, Jun. 2012.
-
(2012)
Proc. IEEE Int. Conf. Commun.
-
-
Zhou, X.1
Tao, M.2
Kennedy, R.A.3
-
18
-
-
84876278704
-
Distributed jamming for secure communication in Poisson fields of legitimate nodes and eavesdroppers
-
Pacific Grove, CA, USA, Nov.
-
W. Shi and J. A. Ritcey, "Distributed jamming for secure communication in Poisson fields of legitimate nodes and eavesdroppers," in Proc. Asilomar Conf. Signals, Syst., Comput., Pacific Grove, CA, USA, Nov. 2012, pp. 1881-1885.
-
(2012)
Proc. Asilomar Conf. Signals, Syst., Comput.
, pp. 1881-1885
-
-
Shi, W.1
Ritcey, J.A.2
-
19
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
20
-
-
70349223815
-
Fixed SINR solutions for the MIMO wiretap channel
-
Taipei, China, Apr.
-
A. L. Swindlehurst, "Fixed SINR solutions for the MIMO wiretap channel," in Proc. IEEE Int. Conf. Acoust., Speech Signal Process., Taipei, China, Apr. 2009, pp. 2437-2440.
-
(2009)
Proc. IEEE Int. Conf. Acoust., Speech Signal Process.
, pp. 2437-2440
-
-
Swindlehurst, A.L.1
-
21
-
-
45249101530
-
The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
22
-
-
78751535549
-
Cooperative jamming: The tale of friendly interference for secrecy
-
New York, NY, USA: Springer
-
X. He and A. Yener, "Cooperative jamming: The tale of friendly interference for secrecy," in Securing Wireless Communications at the Physical Layer. New York, NY, USA: Springer, 2010, pp. 65-88.
-
(2010)
Securing Wireless Communications at the Physical Layer
, pp. 65-88
-
-
He, X.1
Yener, A.2
-
23
-
-
77958083375
-
Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
-
Oct.
-
X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.8
, pp. 3831-3842
-
-
Zhou, X.1
McKay, M.R.2
-
24
-
-
79951595646
-
QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach
-
Mar.
-
W. C. Liao, T. H. Chang, W. K. Ma, and C. Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1202-1216
-
-
Liao, W.C.1
Chang, T.H.2
Ma, W.K.3
Chi, C.Y.4
-
25
-
-
84861304874
-
Benefits of multiple transmit antennas in secure communication: A secrecy outage viewpoint
-
Pacific Grove, CA, USA, Nov.
-
X. Zhang, X. Zhou, and M. R. McKay, "Benefits of multiple transmit antennas in secure communication: A secrecy outage viewpoint," in Proc. Asilomar Conf. Signals, Syst., Comput., Pacific Grove, CA, USA, Nov. 2011, pp. 212-216.
-
(2011)
Proc. Asilomar Conf. Signals, Syst., Comput.
, pp. 212-216
-
-
Zhang, X.1
Zhou, X.2
McKay, M.R.3
-
26
-
-
79952985755
-
On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem
-
Mar.
-
S. C. Lin, T. H. Chang, Y. L. Liang, Y. W. P. Hong, and C. Y. Chi, "On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem," IEEE Trans.Wireless Commun., vol. 10, no. 3, pp. 901-915, Mar. 2011.
-
(2011)
IEEE Trans.Wireless Commun.
, vol.10
, Issue.3
, pp. 901-915
-
-
Lin, S.C.1
Chang, T.H.2
Liang, Y.L.3
Hong, Y.W.P.4
Chi, C.Y.5
-
27
-
-
84861311185
-
Safe convex approximation to outage-basedMISO secrecy rate optimization under imperfect CSI and with artificial noise
-
Pacific Grove, CA, USA, Nov.
-
Q. Li, W. K. Ma, and A. M. C. So, "Safe convex approximation to outage-basedMISO secrecy rate optimization under imperfect CSI and with artificial noise," in Proc. Asilomar Conf. Signals Syst. Comput., Pacific Grove, CA, USA, Nov. 2011, pp. 207-211.
-
(2011)
Proc. Asilomar Conf. Signals Syst. Comput.
, pp. 207-211
-
-
Li, Q.1
Ma, W.K.2
So, A.M.C.3
-
28
-
-
84855381750
-
Outage probability based power distribution between data and artificial noise for physical layer security
-
Feb.
-
N. Romero-Zurita,M. Ghogho, and D.McLernon, "Outage probability based power distribution between data and artificial noise for physical layer security," IEEE Signal Process. Lett., vol. 19, no. 2, pp. 71-74, Feb. 2012.
-
(2012)
IEEE Signal Process. Lett.
, vol.19
, Issue.2
, pp. 71-74
-
-
Romero-Zurita, M.1
Ghogho, N.2
McLernon, D.3
-
29
-
-
84858390705
-
Secrecy outage in MISO systems with partial channel information
-
Apr.
-
S. Gerbracht, C. Scheunert, and E. A. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 704-716, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 704-716
-
-
Gerbracht, S.1
Scheunert, C.2
Jorswieck, E.A.3
-
30
-
-
84879203277
-
On the design of artificialnoise-aided secure multi-antenna transmission in slow fading channels
-
Jun.
-
X. Zhang, X. Zhou, and M. R. McKay, "On the design of artificialnoise-aided secure multi-antenna transmission in slow fading channels," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2170-2181, Jun. 2013.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, Issue.5
, pp. 2170-2181
-
-
Zhang, X.1
Zhou, X.2
McKay, M.R.3
-
31
-
-
79957978453
-
Stochastic geometry and random graphs for the analysis and design of wireless networks
-
Sep.
-
M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, "Stochastic geometry and random graphs for the analysis and design of wireless networks," IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029-1046, Sep. 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.7
, pp. 1029-1046
-
-
Haenggi, M.1
Andrews, J.G.2
Baccelli, F.3
Dousse, O.4
Franceschetti, M.5
-
32
-
-
77953303267
-
Stochastic analysis of non-slotted Aloha in wireless ad-hoc networks
-
San Diego, CA, USA, Mar.
-
B. B?aszczyszyn and P. Mühlethaler, "Stochastic analysis of non-slotted Aloha in wireless ad-hoc networks," in Proc. IEEE Int. Conf. Comput. Commun., San Diego, CA, USA, Mar. 2010, pp. 1-9.
-
(2010)
Proc. IEEE Int. Conf. Comput. Commun.
, pp. 1-9
-
-
Baszczyszyn, B.1
Mühlethaler, P.2
-
33
-
-
15244362024
-
Ad hoc networking with directional antennas: A complete system solution
-
DOI 10.1109/JSAC.2004.842556
-
R. Ramanathan, J. Redi, C. Santivanez, D. Wiggins, and S. Polit, "Ad hoc networking with directional antennas: A complete system solution," IEEE J. Sel. Areas Commun., vol. 23, no. 3, pp. 496-506, Mar. 2005. (Pubitemid 40384340)
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.3
, pp. 496-506
-
-
Ramanathan, R.1
Redi, J.2
Santivanez, C.3
Wiggins, D.4
Polit, S.5
-
34
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
DOI 10.1109/TIT.2007.901143
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J.-M. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007. (Pubitemid 47249863)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
35
-
-
79952706123
-
Rethinking the secrecy outage formulation: A secure transmission design perspective
-
Mar.
-
X. Zhou, M. R. McKay, B. Maham, and A. Hjørungnes, "Rethinking the secrecy outage formulation: A secure transmission design perspective," IEEE Commun. Lett., vol. 15, no. 3, pp. 302-304, Mar. 2011.
-
(2011)
IEEE Commun. Lett.
, vol.15
, Issue.3
, pp. 302-304
-
-
Zhou, X.1
McKay, M.R.2
Maham, B.3
Hjørungnes, A.4
-
37
-
-
84941385097
-
Beweis der unmöglichkeit, algebraische gleichungen von höheren graden als dem vierten allgemein aufzulösen
-
N. H. Abel, "Beweis der unmöglichkeit, algebraische gleichungen von höheren graden als dem vierten allgemein aufzulösen," J. für die reine und angewandte Mathematik, vol. 1, pp. 65-84, 1826.
-
(1826)
J. Für Die Reine und Angewandte Mathematik
, vol.1
, pp. 65-84
-
-
Abel, N.H.1
-
38
-
-
84867511032
-
The topological proof of Abel-Ruffini theorem
-
H. odek, "The topological proof of Abel-Ruffini theorem," J. Juliusz Schauder Center, vol. 16, pp. 253-265, 2000.
-
(2000)
J. Juliusz Schauder Center
, vol.16
, pp. 253-265
-
-
Odek, H.1
-
39
-
-
51649110165
-
Single-hop connectivity in interference-limited hybrid wireless networks
-
Nice, France, Jun.
-
R. K. Ganti and M. Haenggi, "Single-hop connectivity in interference-limited hybrid wireless networks," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 2007, pp. 366-370.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 366-370
-
-
Ganti, R.K.1
Haenggi, M.2
-
40
-
-
26844501347
-
On distances in uniformly random networks
-
DOI 10.1109/TIT.2005.855610
-
M. Haenggi, "On distances in uniformly random networks," IEEE Trans. Inf. Theory, vol. 51, no. 10, pp. 3584-3586, Oct. 2005. (Pubitemid 41448597)
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.10
, pp. 3584-3586
-
-
Haenggi, M.1
-
41
-
-
58149119334
-
Transmission capacity of ad hoc networks with spatial diversity
-
Dec.
-
A. M. Hunter, J. Andrews, and S.Weber, "Transmission capacity of ad hoc networks with spatial diversity," IEEE Trans. Wireless Commun., vol. 7, no. 12, pp. 5058-5071, Dec. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.12
, pp. 5058-5071
-
-
Hunter, A.M.1
Andrews, J.2
Weber, S.3
-
42
-
-
84885803478
-
Enhancing secrecy with sectorized transmission in decentralized wireless networks
-
Darmstadt, Germany, Jun.
-
X. Zhang, X. Zhou, andM. R.McKay, "Enhancing secrecy with sectorized transmission in decentralized wireless networks," in Proc. IEEE Int. Workshop Signal Process. Advances forWireless Commun., Darmstadt, Germany, Jun. 2013, pp. 265-269.
-
(2013)
Proc. IEEE Int. Workshop Signal Process. Advances ForWireless Commun.
, pp. 265-269
-
-
Zhang, X.1
Zhou, X.2
McKay, A.R.3
|