-
2
-
-
0021157174
-
A general coding scheme for the two-way channel
-
Jan
-
T. Han, "A general coding scheme for the two-way channel," IEEE Trans. Inf. Theory, vol. 30, no. 1, pp. 35-44, Jan. 1984.
-
(1984)
IEEE Trans. Inf. Theory
, vol.30
, Issue.1
, pp. 35-44
-
-
Han, T.1
-
3
-
-
0018443950
-
Capacity region of the two-Way channel can exceed the inner bound
-
G. Dueck, "The capacity region of the two-way channel can exceed the inner bound," Inf. Control., vol. 40, no. 3, pp. 258-266, 1979. (Pubitemid 9456494)
-
(1979)
Inf Control
, vol.40
, Issue.3
, pp. 258-266
-
-
Dueck Gunter1
-
4
-
-
84890522850
-
Communication theory of secrecy systems
-
Sep
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Sep. 1949.
-
(1949)
Bell Syst. Tech. J
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
5
-
-
77955641859
-
Wiretap channel with secure rate-limited feedback
-
Dec
-
E. Ardetsanizadeh, M. Franceschetti, T. Javidi, and Y. H. Kim, "Wiretap channel with secure rate-limited feedback," IEEE Trans. Inf. Theory, vol. 55, no. 12, pp. 5353-5361, Dec. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.12
, pp. 5353-5361
-
-
Ardetsanizadeh, E.1
Franceschetti, M.2
Javidi, T.3
Kim, Y.H.4
-
6
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
7
-
-
51849094090
-
Strictly positive secrecy rates of binary wiretapper channels using feedback schemes
-
Mar
-
G. T. Amariucai and S. Wei, "Strictly positive secrecy rates of binary wiretapper channels using feedback schemes," in Proc. 42nd Annu. Conf. Inf. Sci. Syst., Mar. 2008, pp. 624-629.
-
(2008)
Proc. 42nd Annu. Conf. Inf. Sci. Syst
, pp. 624-629
-
-
Amariucai, G.T.1
Wei, S.2
-
9
-
-
84870916633
-
Transmission, identification and common randomness capacities for wire-tape channels with secure feedback from the decoder
-
ser. Lecture Notes in Computer Science. Berlin, Germany: Springer
-
R. Ahlswede and N. Cai, "Transmission, Identification and Common Randomness Capacities for Wire-Tape Channels With Secure Feedback From the Decoder," in General Theory of Information Transfer and Combinatorics, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer, 2006, vol. 4123, pp. 258-275.
-
(2006)
General Theory of Information Transfer and Combinatorics
, vol.4123
, pp. 258-275
-
-
Ahlswede, R.1
Cai, N.2
-
11
-
-
0019566096
-
Achievable rate region for the multiple-Access channel with feedback
-
T. M. Cover and C. Leung, "An achievable rate region for the multipleaccess channel with feedback," IEEE Trans. Inf. Theory, vol. IT-27, no. 3, pp. 292-298, May 1981. (Pubitemid 11420459)
-
(1981)
IEEE Transactions on Information Theory
, vol.IT-27
, Issue.3
, pp. 292-298
-
-
Cover Thomas, M.1
Leung Cyril, S.2
-
12
-
-
45249101530
-
The general Gaussian multiple access and twoway wire-tap channels: Achievable rates and cooperative jamming
-
Jun
-
E. Tekin and A. Yener, "The general Gaussian multiple access and twoway wire-tap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
13
-
-
51649118865
-
Random linear network coding: A free cipher?
-
Jun
-
L. Lima, M. Medard, and J. Barros, "Random linear network coding: A free cipher?," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2007, pp. 546-550.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 546-550
-
-
Lima, L.1
Medard, M.2
Barros, J.3
-
15
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Aug
-
X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3801-3827, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3801-3827
-
-
He, X.1
Yener, A.2
-
16
-
-
78650894311
-
Secrecy in cooperative relay broadcast channels
-
Jan
-
E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 137-155, Jan. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.1
, pp. 137-155
-
-
Ekrem, E.1
Ulukus, S.2
-
17
-
-
76649123145
-
Two-hop secure communication using an untrusted relay
-
Network., Spec. Issue Wireless Phys. Layer Security, Mar. 305146
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay," Eurasip J. Wireless Commun. Network., Spec. Issue Wireless Phys. Layer Security, no. 305146, pp. 13-13, Mar. 2009.
-
(2009)
Eurasip J. Wireless Commun
, pp. 13-13
-
-
He, X.1
Yener, A.2
-
18
-
-
0027629488
-
Common randomness in information theory and cryptography part i.Secret sharing
-
Jul
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography - Part I. Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
19
-
-
84856821725
-
Secret-key generation using correlated sources and channels
-
Feb
-
A. Khisti, S. Diggavi, and G. Wornell, "Secret-key generation using correlated sources and channels," IEEE Trans. Inf. Theory, vol. 58, no. 2, pp. 652-670, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.2
, pp. 652-670
-
-
Khisti, A.1
Diggavi, S.2
Wornell, G.3
-
20
-
-
52349084992
-
Secrecy via sources and channels A secret key Secret message rate tradeoff region," in Proc
-
Jul
-
V. M. Prabhakaran, K. Eswaran, and K. Ramchandran, "Secrecy via sources and channels - A secret key - Secret message rate tradeoff region," in Proc. IEEE Int. Symp. Inf. Theory, Jul. 2008, pp. 1010-1014.
-
(2008)
IEEE Int. Symp. Inf. Theory
, pp. 1010-1014
-
-
Prabhakaran, V.M.1
Eswaran, K.2
Ramchandran, K.3
-
21
-
-
77954570193
-
Information-theoretic key agreement of multiple terminals Part II: Channel model
-
Aug
-
A. A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals - Part II: Channel model," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3997-4010, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3997-4010
-
-
Gohari, A.A.1
Anantharam, V.2
-
22
-
-
70449515425
-
Secrecy generation for multiple input multiple output channelmodels
-
Jun
-
I. Csiszár and P. Narayan, "Secrecy generation for multiple input multiple output channelmodels," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2009, pp. 2447-2451.
-
(2009)
Proc IEEE Int. Symp. Inf. Theory
, pp. 2447-2451
-
-
Csiszár, I.1
Narayan, P.2
-
23
-
-
40949121595
-
Achievable rates for two-way wire-tap channels
-
Jun
-
E. Tekin and A. Yener, "Achievable rates for two-way wire-tap channels," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2007, pp. 941-945.
-
(2007)
Proc IEEE Int. Symp. Inf. Theory
, pp. 941-945
-
-
Tekin, E.1
Yener, A.2
-
24
-
-
51849134999
-
Confidential messages to a cooperative relay
-
May
-
M. Bloch and A. Thangraj, "Confidential messages to a cooperative relay," in Proc. IEEE Inf. Theory Workshop, May 2008, pp. 154-158.
-
(2008)
Proc IEEE Inf. Theory Workshop
, pp. 154-158
-
-
Bloch, M.1
Thangraj, A.2
-
25
-
-
70449504460
-
Channel scrambling for secrecy
-
Jun
-
M. Bloch, "Channel scrambling for secrecy," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2009, pp. 2452-2456.
-
(2009)
Proc IEEE Int. Symp. Inf. Theory
, pp. 2452-2456
-
-
Bloch, M.1
-
26
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
27
-
-
77953802876
-
Secure transmission with multiple antennas- I: The MISOME Wiretap channel
-
Jul
-
A. Khisti and G. Wornell, "Secure transmission with multiple antennas- I: The MISOME Wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.2
-
28
-
-
70349678716
-
On the role of feedback in two way secure communication
-
Systems, Computing, Oct
-
X. He and A. Yener, "On the role of feedback in two way secure communication," in Proc. 42nd Annu. Asilomar Conf. Signals, Systems, Computing, Oct. 2008, pp. 1093-1097.
-
(2008)
Proc. 42nd Annu. Asilomar Conf. Signals
, pp. 1093-1097
-
-
He, X.1
Yener, A.2
-
29
-
-
84866300754
-
-
Ph.D. dissertation The Pennsylvania State University, University Park, PA, USA
-
X. He, "Cooperation and information theoretic security in wireless networks," Ph.D. dissertation, The Pennsylvania State University, University Park, PA, USA, 2010.
-
(2010)
Cooperation and Information Theoretic Security in Wireless Networks
-
-
He, X.1
-
30
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul
-
S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
|