메뉴 건너뛰기




Volumn 59, Issue 12, 2013, Pages 8099-8114

Achievable secrecy rate regions for the two-way wiretap channel

Author keywords

Body area networks; channel prefixing; near field wireless communication; randomization for security; randomized scheduling

Indexed keywords

BODY AREA NETWORK; CHANNEL PREFIXING; RANDOMIZATION FOR SECURITY; RANDOMIZED SCHEDULING; WIRELESS COMMUNICATIONS;

EID: 84889560692     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2013.2281716     Document Type: Article
Times cited : (44)

References (22)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, Oct. 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1974.
    • (1974) Bell Syst. Tech. J. , vol.54 , pp. 1355-1387
    • Wyner, A.1
  • 4
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 5
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 6
    • 55349095058 scopus 로고    scopus 로고
    • The wiretap channel with feedback: Encryption over the channel
    • Nov
    • L. Lai, H. El Gamal, and H. V. Poor, "The wiretap channel with feedback: Encryption over the channel," IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 5059-5067, Nov. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.11 , pp. 5059-5067
    • Lai, L.1    El Gamal, H.2    Poor, H.V.3
  • 8
    • 80052369884 scopus 로고    scopus 로고
    • Cooperative encoding for secrecy in interference channels
    • Sep
    • O. O. Koyluoglu and H. El Gamal, "Cooperative encoding for secrecy in interference channels," IEEE Trans. Inf. Theory, vol. 57, no. 9, pp. 5682-5694, Sep. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.9 , pp. 5682-5694
    • Koyluoglu, O.O.1    El Gamal, H.2
  • 9
    • 40949121595 scopus 로고    scopus 로고
    • Achievable rates for two-way wire-tap channels
    • Jun.
    • E. Tekin and A. Yener, "Achievable rates for two-way wire-tap channels," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2007, pp. 941-945.
    • (2007) Proc. IEEE Int. Symp. Inf. Theory , pp. 941-945
    • Tekin, E.1    Yener, A.2
  • 10
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
    • Jun
    • E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 11
    • 77955379757 scopus 로고    scopus 로고
    • The role of feedback in two-way secure communications
    • submitted for publication, submitted for publication
    • X. He and A. Yener, "The role of feedback in two-way secure communications," IEEE Trans. Inf. Theory, 2009 [Online]. Available: http:// arxiv.org/abs/0911.4432, submitted for publication, submitted for publication
    • (2009) IEEE Trans. Inf. Theory
    • He, X.1    Yener, A.2
  • 13
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • Aug
    • X. H. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3807-3827
    • Yener, X.H.1
  • 14
    • 80051727482 scopus 로고    scopus 로고
    • Strongly secure communications over the two-way wiretap channel
    • Sep
    • A. J. Pierrot and M. R. Bloch, "Strongly secure communications over the two-way wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 595-605, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 595-605
    • Pierrot, A.J.1    Bloch, M.R.2
  • 15
    • 0000478763 scopus 로고
    • Cipher printing telegraph systems for secret wire and radio telegraphic communications
    • G. S. Vernam, "Cipher printing telegraph systems for secret wire and radio telegraphic communications," J. Amer. Inst. Elect. Eng., vol. 55, pp. 109-115, 1926.
    • (1926) J. Amer. Inst. Elect. Eng. , vol.55 , pp. 109-115
    • Vernam, G.S.1
  • 17
    • 77955729519 scopus 로고    scopus 로고
    • Correction to: "The Gaussian multiple-Access wire-Tap channel" and "the general Gaussian multiple-Access and two-Way wiretap channels: Achievable rates and cooperative jamming
    • Sep
    • E. Tekin and A. Yener, "Correction to: "The Gaussian multiple-access wire-tap channel" and "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming"," IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4762-4763, Sep. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.9 , pp. 4762-4763
    • Tekin, E.1    Yener, A.2
  • 20
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • Jul.-Oct
    • C. E. Shannon, "A mathematical theory of communication," Bell Syst. Tech. J., vol. 27, pp. 379-423, Jul.-Oct. 1948.
    • (1948) Bell Syst. Tech. J. , vol.27 , pp. 379-423
    • Shannon, C.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.