-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1974.
-
(1974)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.1
-
3
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul
-
S. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.E.2
-
4
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
5
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
6
-
-
55349095058
-
The wiretap channel with feedback: Encryption over the channel
-
Nov
-
L. Lai, H. El Gamal, and H. V. Poor, "The wiretap channel with feedback: Encryption over the channel," IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 5059-5067, Nov. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.11
, pp. 5059-5067
-
-
Lai, L.1
El Gamal, H.2
Poor, H.V.3
-
7
-
-
69949124879
-
On the secrecy rate region for the interference channel
-
Cannes, France Sep.
-
O. O. Koyluoglu and H. El Gamal, "On the secrecy rate region for the interference channel," presented at the IEEE Int. Symp. Personal, Indoor and Mobile Radio Communication, Cannes, France, Sep. 2008.
-
(2008)
IEEE Int. Symp. Personal, Indoor and Mobile Radio Communication
-
-
Koyluoglu, O.O.1
El Gamal, H.2
-
8
-
-
80052369884
-
Cooperative encoding for secrecy in interference channels
-
Sep
-
O. O. Koyluoglu and H. El Gamal, "Cooperative encoding for secrecy in interference channels," IEEE Trans. Inf. Theory, vol. 57, no. 9, pp. 5682-5694, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.9
, pp. 5682-5694
-
-
Koyluoglu, O.O.1
El Gamal, H.2
-
9
-
-
40949121595
-
Achievable rates for two-way wire-tap channels
-
Jun.
-
E. Tekin and A. Yener, "Achievable rates for two-way wire-tap channels," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2007, pp. 941-945.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 941-945
-
-
Tekin, E.1
Yener, A.2
-
10
-
-
45249101530
-
The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
-
Jun
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
11
-
-
77955379757
-
The role of feedback in two-way secure communications
-
submitted for publication, submitted for publication
-
X. He and A. Yener, "The role of feedback in two-way secure communications," IEEE Trans. Inf. Theory, 2009 [Online]. Available: http:// arxiv.org/abs/0911.4432, submitted for publication, submitted for publication
-
(2009)
IEEE Trans. Inf. Theory
-
-
He, X.1
Yener, A.2
-
12
-
-
80052169777
-
Practical provably secure communication for Half-Duplex radios
-
Jun.
-
A. Elmorsy, M. Nour, M. Elsabagh, and M. Youssef, "Practical provably secure communication for Half-Duplex radios," in Proc. IEEE Int. Conf. Commun., Jun. 2011, pp. 1-5.
-
(2011)
Proc. IEEE Int. Conf. Commun.
, pp. 1-5
-
-
Elmorsy, A.1
Nour, M.2
Elsabagh, M.3
Youssef, M.4
-
13
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Aug
-
X. H. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
Yener, X.H.1
-
14
-
-
80051727482
-
Strongly secure communications over the two-way wiretap channel
-
Sep
-
A. J. Pierrot and M. R. Bloch, "Strongly secure communications over the two-way wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 595-605, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 595-605
-
-
Pierrot, A.J.1
Bloch, M.R.2
-
15
-
-
0000478763
-
Cipher printing telegraph systems for secret wire and radio telegraphic communications
-
G. S. Vernam, "Cipher printing telegraph systems for secret wire and radio telegraphic communications," J. Amer. Inst. Elect. Eng., vol. 55, pp. 109-115, 1926.
-
(1926)
J. Amer. Inst. Elect. Eng.
, vol.55
, pp. 109-115
-
-
Vernam, G.S.1
-
17
-
-
77955729519
-
Correction to: "The Gaussian multiple-Access wire-Tap channel" and "the general Gaussian multiple-Access and two-Way wiretap channels: Achievable rates and cooperative jamming
-
Sep
-
E. Tekin and A. Yener, "Correction to: "The Gaussian multiple-access wire-tap channel" and "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming"," IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4762-4763, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.9
, pp. 4762-4763
-
-
Tekin, E.1
Yener, A.2
-
20
-
-
84856043672
-
A mathematical theory of communication
-
Jul.-Oct
-
C. E. Shannon, "A mathematical theory of communication," Bell Syst. Tech. J., vol. 27, pp. 379-423, Jul.-Oct. 1948.
-
(1948)
Bell Syst. Tech. J.
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
21
-
-
0034445661
-
System architecture directions for networked sensors
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, "System architecture directions for networked sensors," Archit. Support Program. Lang. Operat. Syst., vol. 28, pp. 93-104, 2000. (Pubitemid 32474159)
-
(2000)
International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
22
-
-
33745136118
-
Exploiting the capture effect for collision detection and recovery
-
DOI 10.1109/EMNETS.2005.1469098, 1469098, Second IEEE Workshop on Embedded Networked Sensors, EmNetS-II
-
K. Whitehouse, A. Woo, F. Jiang, J. Polastre, and D. Culler, "Exploiting the capture effect for collision detection and recovery," in Proc. 2nd IEEE Workshop Embedd. Netw. Sensors, May 30-31, 2005, pp. 45-52. (Pubitemid 43897528)
-
(2005)
Second IEEE Workshop on Embedded Networked Sensors, EmNetS-II
, vol.2005
, pp. 45-52
-
-
Whitehouse, K.1
Woo, A.2
Jiang, F.3
Polastre, J.4
Culler, D.5
|