-
1
-
-
84878289144
-
Impact of channel estimation error on secure transmission design
-
Commun. Theory Workshop, Adelaide, Australia Jan./Feb.
-
B. He and X. Zhou, "Impact of channel estimation error on secure transmission design," in Proc. IEEE Austral. Commun. Theory Workshop, Adelaide, Australia, Jan./Feb. 2013, pp. 19-24.
-
(2013)
Proc.IEEE Austral
, pp. 19-24
-
-
He, B.1
Zhou, X.2
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May.
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
4
-
-
79960399745
-
Robust beamforming for security in MIMO wiretap channels with imperfect CSI
-
Jan
-
A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
5
-
-
84857227438
-
Resource allocation for secure OFDMA networks with imperfect CSIT
-
Dec.
-
D. W. K. Ng, E. S. Lo, and R. Schober, "Resource allocation for secure OFDMA networks with imperfect CSIT," in Proc. IEEE Global Telecommun. Conf., Dec. 2011, pp. 1-6.
-
(2011)
Proc.IEEE Global Telecommun. Conf
, pp. 1-6
-
-
Ng, D.W.K.1
Lo, E.S.2
Schober, R.3
-
6
-
-
79960433598
-
Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming
-
Aug.
-
Q. Li and W.-K. Ma, "Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming," IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799-3812, Aug. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.8
, pp. 3799-3812
-
-
Li, Q.1
Ma, W.-K.2
-
7
-
-
79952985755
-
On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem
-
Mar.
-
S.-C. Lin, T.-H. Chang, Y.-L. Liang, Y.-W. P. Hong, and C.-Y. Chi, "On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem," IEEE Trans. Wireless Commun., vol. 10, no. 3, pp. 901-915, Mar. 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.3
, pp. 901-915
-
-
Lin, S.-C.1
Chang, T.-H.2
Liang, Y.-L.3
Hong, Y.-W.P.4
Chi, C.-Y.5
-
8
-
-
84863359764
-
Robust secure transmission in MISO channels based on worst-case optimization
-
Apr.
-
J. Huang and A. L. Swindlehurst, "Robust secure transmission in MISO channels based on worst-case optimization," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1696-1707, Apr. 2012.
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.4
, pp. 1696-1707
-
-
Huang, J.1
Swindlehurst, A.L.2
-
9
-
-
45249119255
-
Secure communication over fading channels
-
Jun.
-
Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
10
-
-
77953802876
-
Secure transmission with multiple antennas I: The MISOME wiretap channel
-
Jul.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
11
-
-
84861306235
-
Two-way secrecy schemes for the broadcast channel with internal eavesdroppers
-
Pacific Grove, CA, USA Nov.
-
C. Y. Leow, Ç. Çapar, D. Goeckel, and K. K. Leung, "Two-way secrecy schemes for the broadcast channel with internal eavesdroppers," in Proc. Asilomar Conf. Signals Syst. Comput., Pacific Grove, CA, USA, Nov. 2011, pp. 1840-1844.
-
(2011)
Proc. Asilomar Conf. Signals Syst. Comput
, pp. 1840-1844
-
-
Leow, C.Y.1
Çapar, C.2
Goeckel, D.3
Leung, K.K.4
-
12
-
-
79961140767
-
Impact of channel estimation errors on effectiveness of eigenvector-based jamming for physical layer security in wireless networks
-
Kyoto, Japan Jun.
-
J. M. Taylor, M. Hempel, H. Sharif, S. Ma, and Y. Yang, "Impact of channel estimation errors on effectiveness of eigenvector-based jamming for physical layer security in wireless networks," in Proc. IEEE CAMAD Workshop, Kyoto, Japan, Jun. 2011, pp. 122-126.
-
(2011)
Proc.IEEE CAMAD Workshop
, pp. 122-126
-
-
Taylor, J.M.1
Hempel, M.2
Sharif, H.3
Ma, S.4
Yang, Y.5
-
13
-
-
77958083375
-
Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
-
McKay Oct.
-
X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
-
(2010)
IEEE Trans. Veh. Technol
, vol.59
, Issue.8
, pp. 3831-3842
-
-
Zhou, X.1
McKay, M.R.2
-
14
-
-
84871946867
-
How much training is enough for secrecy beamforming with artificial noise
-
June.
-
T.-Y. Liu, S.-C. Lin, T.-H. Chang, and Y.-W. P. Hong, "How much training is enough for secrecy beamforming with artificial noise," in Proc. IEEE Int. Conf. Commun., June 2012, pp. 4782-4787.
-
(2012)
Proc.IEEE Int. Conf. Commun
, pp. 4782-4787
-
-
Liu, T.-Y.1
Lin, S.-C.2
Chang, T.-H.3
Hong, Y.-W.P.4
-
15
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
Gamal, H.E.3
-
16
-
-
79952706123
-
Rethinking the secrecy outage formulation: A secure transmission design perspective
-
McKay, B. Maham, and A. Hjørungnes Mar.
-
X. Zhou, M. R. McKay, B. Maham, and A. Hjørungnes, "Rethinking the secrecy outage formulation: A secure transmission design perspective," IEEE Commun. Lett., vol. 15, no. 3, pp. 302-304, Mar. 2011.
-
(2011)
IEEE Commun. Lett
, vol.15
, Issue.3
, pp. 302-304
-
-
Zhou, X.1
McKay, M.R.2
-
17
-
-
0028427058
-
Information theoretic considerations for cellular mobile radio
-
May
-
L. H. Ozarow, S. Shamai, and A. D. Wyner, "Information theoretic considerations for cellular mobile radio," IEEE Trans. Veh. Technol, vol. 43, no. 2, pp. 359-378, May 1994.
-
(1994)
IEEE Trans. Veh. Technol
, vol.43
, Issue.2
, pp. 359-378
-
-
Ozarow, L.H.1
Shamai, S.2
Wyner, A.D.3
-
19
-
-
0026260768
-
An analysis of pilot symbol assisted modulation for Rayleigh fading channels
-
Nov.
-
J. K. Cavers, "An analysis of pilot symbol assisted modulation for Rayleigh fading channels," IEEE Trans. Veh. Technol., vol. 40, no. 4, pp. 686-693, Nov. 1991.
-
(1991)
IEEE Trans. Veh. Technol
, vol.40
, Issue.4
, pp. 686-693
-
-
Cavers, J.K.1
-
20
-
-
0037399093
-
How much training is needed in multiple-antenna wireless links
-
Apr.
-
B. Hassibi and B. M. Hochwald, "How much training is needed in multiple-antenna wireless links?" IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 951-963, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 951-963
-
-
Hassibi, B.1
Hochwald, B.M.2
-
21
-
-
33947638897
-
The effect of channel estimation error on the throughput of broadcast channels
-
May
-
A. Vakili, M. Sharif, and B. Hassibi, "The effect of channel estimation error on the throughput of broadcast channels," in Proc. IEEE Int. Conf. Acoustics, Speech Signal Process., vol. 4. May 2006, pp. 1-4.
-
(2006)
Proc.IEEE Int. Conf. Acoustics, Speech Signal Process
, vol.4
, pp. 1-4
-
-
Vakili, A.1
Sharif, M.2
Hassibi, B.3
-
22
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
DOI 10.1109/TIT.2007.901143
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J.-M. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007. (Pubitemid 47249863)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
23
-
-
64249156371
-
On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels
-
Apr.
-
X. Tang, R. Liu, P. Spasojevíc, and H. V. Poor, "On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels," IEEE Trans. Inf. Theory, vol. 55, no. 4, pp. 1575-1591, Apr. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.4
, pp. 1575-1591
-
-
Tang, X.1
Liu, R.2
Spasojevíc, P.3
Poor, H.V.4
-
24
-
-
0004225706
-
-
Santa Monica CA USA:Rand Corporation
-
J. I. Marcum, Table of Q Functions. Santa Monica, CA, USA: Rand Corporation, 1950.
-
(1950)
Table of Q Functions
-
-
Marcum, J.I.1
|