-
1
-
-
0002503713
-
Communication theory of secrecy systems
-
C. Shannon, Communication theory of secrecy systems. AT&T, 1949
-
(1949)
AT&T
-
-
Shannon, C.1
-
4
-
-
0017973511
-
Broadcast channels with confidential messages
-
I. Csiszár and J. Korner. Broadcast channels with confidential messages. IEEE Trans. Inf. Theory, vol. 24, no. 3, 1978
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
-
-
Csiszár, I.1
Korner, J.2
-
5
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. M. Maurer. Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory, vol. 39, no. 3, 1993
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
-
-
Maurer, U.M.1
-
6
-
-
45249104850
-
Wireless information-Theoretic security
-
M. Bloch et al. Wireless information-Theoretic security. IEEE Trans. Inf. Theory, vol. 54, no. 6, 2008
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
-
-
Bloch, M.1
-
7
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
S. Goel and R. Negi. Guaranteeing secrecy using artificial noise. IEEE Trans. Wireless Commun., vol. 7, no. 6, 2008
-
(2008)
IEEE Trans. Wireless Commun
, vol.7
, Issue.6
-
-
Goel, S.1
Negi, R.2
-
8
-
-
45249101530
-
The general gaussian multiple-Access and twoway wiretap channels: Achievable rates and cooperative jamming
-
E. Tekin and A. Yener. The general Gaussian multiple-Access and twoway wiretap channels: Achievable rates and cooperative jamming. IEEE Trans. Inf. Theory, vol. 54, no. 6, 2008
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
-
-
Tekin, E.1
Yener, A.2
-
9
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
L. Dong et al. Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process., vol. 58, no. 3, 2010
-
(2010)
IEEE Trans. Signal Process
, vol.58
, Issue.3
-
-
Dong, L.1
-
10
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
L. Lai and H. El Gamal. The relay-eavesdropper channel: Cooperation for secrecy. IEEE Trans. Inf. Theory, vol. 54, no. 9, 2008
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
-
-
Lai, L.1
El Gamal, H.2
-
11
-
-
82055177123
-
Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks
-
D. Goeckel et al. Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks. IEEE J. Sel. Areas Commun., vol. 29, no. 10, 2011
-
(2011)
IEEE J. Sel. Areas Commun
, vol.29
, Issue.10
-
-
Goeckel, D.1
-
12
-
-
84863157582
-
Robust secure transmission in miso channels with imperfect ecsi
-
Dec
-
J. Huang and A. L. Swindlehurst. Robust secure transmission in MISO channels with imperfect ECSI. in IEEE Globecom, Dec. 2011
-
(2011)
IEEE Globecom
-
-
Huang, J.1
Swindlehurst, A.L.2
-
13
-
-
78649286561
-
The secrecy graph and some of its properties
-
Jun
-
M. Haenggi. The secrecy graph and some of its properties. in IEEE ISIT, Jun. 2008
-
(2008)
IEEE ISIT
-
-
Haenggi, M.1
-
14
-
-
84890880878
-
Physical-layer security in stochastic wireless networks
-
Nov
-
P. Pinto, J. Barros, and M. Win. Physical-layer security in stochastic wireless networks. in IEEE ICCS, Nov. 2008
-
(2008)
IEEE ICCS
-
-
Pinto, P.1
Barros, J.2
Win, M.3
-
15
-
-
84890867325
-
Wireless physical-layer security: The case of colluding eavesdroppers
-
Jun
-
P. Pinto, J. Barros, and M. Win. Wireless physical-layer security: The case of colluding eavesdroppers. in IEEE ISIT, Jun. 2009
-
(2009)
IEEE ISIT
-
-
Pinto, P.1
Barros, J.2
Win, M.3
-
16
-
-
84890883378
-
Secrecy throughput of manets with malicious nodes
-
Jun
-
Y. Liang, H. Poor, and L. Ying. Secrecy throughput of MANETs with malicious nodes. in IEEE ISIT, Jun. 2009
-
(2009)
IEEE ISIT
-
-
Liang, Y.1
Poor, H.2
Ying, L.3
-
17
-
-
84890873998
-
On secrecy capacity scaling in wireless networks
-
Feb
-
O. Koyluoglu, E. Koksal, and H. El Gamal. On secrecy capacity scaling in wireless networks. in IEEE ITA, Feb. 2010
-
(2010)
IEEE ITA
-
-
Koyluoglu, O.1
Koksal, E.2
El Gamal, H.3
-
18
-
-
85053985067
-
Security-capacity trade-off in large wireless networks using keyless secrecy
-
Sep
-
S. Vasudevan et al. Security-capacity trade-off in large wireless networks using keyless secrecy. in ACM Mobihoc, Sep. 2010
-
(2010)
ACM Mobihoc
-
-
Vasudevan, S.1
-
19
-
-
62149087803
-
Distributed transmit beamforming: Challenges and recent progress
-
R. Mudumbai et al. Distributed transmit beamforming: Challenges and recent progress. IEEE Commun. Mag., vol. 47, no. 2, 2009
-
(2009)
IEEE Commun. Mag
, vol.47
, Issue.2
-
-
Mudumbai, R.1
-
20
-
-
84890880116
-
Fully wireless implementation of distributed beamforming on a software-defined radio platform
-
M. Rahman et al. Fully wireless implementation of distributed beamforming on a software-defined radio platform. in IEEE IPSN, 2012
-
(2012)
IEEE IPSN
-
-
Rahman, M.1
-
21
-
-
84863174459
-
Coordinated multipoint transmission and reception in lte-Advanced: Deployment scenarios and operational challenges
-
D. Lee et al. Coordinated multipoint transmission and reception in LTE-Advanced: Deployment scenarios and operational challenges. IEEE Commun. Mag., vol. 50, no. 2, 2012
-
(2012)
IEEE Commun. Mag
, vol.50
, Issue.2
-
-
Lee, D.1
-
22
-
-
84877658480
-
Distributed beamforming with software-defined radios: Frequency synchronization and digital feedback
-
Dec
-
F. Quitin et al. Distributed beamforming with software-defined radios: Frequency synchronization and digital feedback. in IEEE Glebecom, Dec. 2012
-
(2012)
IEEE Glebecom
-
-
Quitin, F.1
-
23
-
-
84890883636
-
A scalable architecture for distributed transmit beamforming with commodity radios: Design and proof of concept
-
submitted to
-
F. Quitin et al. A scalable architecture for distributed transmit beamforming with commodity radios: Design and proof of concept. submitted to IEEE Trans. Wireless Commun., 2012
-
(2012)
IEEE Trans. Wireless Commun
-
-
Quitin, F.1
-
24
-
-
70450164574
-
A survey of secure mobile ad hoc routing protocols
-
L. Abusalah et al. A survey of secure mobile ad hoc routing protocols. IEEE Commun. Surveys Tuts., vol. 10, no. 4, 2008
-
(2008)
IEEE Commun. Surveys Tuts
, vol.10
, Issue.4
-
-
Abusalah, L.1
-
25
-
-
60049091288
-
Spread: Improving network security by multipath routing in mobile ad hoc networks
-
W. Lou et al. SPREAD: Improving network security by multipath routing in mobile ad hoc networks. ACM Wireless Nets., 2009
-
(2009)
ACM Wireless Nets
-
-
Lou, W.1
-
26
-
-
77952986444
-
Secure data collection in wireless sensor networks using randomized dispersive routes
-
T. Shu, M. Krunz, and S. Liu. Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Trans. Mobile Comput., vol. 9, no. 7, 2010
-
(2010)
IEEE Trans. Mobile Comput
, vol.9
, Issue.7
-
-
Shu, T.1
Krunz, M.2
Liu, S.3
-
27
-
-
84890866044
-
Efficient wireless security through jamming, coding and routing
-
Online Available
-
M. Ghaderi, D. Goeckel, A. Orda, and M. Dehghan. Efficient wireless security through jamming, coding and routing. Tech. Rep. [Online]. Available: Http://arxiv.org/abs/1304.2688
-
Tech. Rep
-
-
Ghaderi, M.1
Goeckel, D.2
Orda, A.3
Dehghan, M.4
-
30
-
-
84866730731
-
Energy efficiency of cooperative jamming strategies in secure wireless networks
-
M. Dehghan et al. Energy efficiency of cooperative jamming strategies in secure wireless networks. IEEE Trans. Wireless Commun., 2012
-
(2012)
IEEE Trans. Wireless Commun
-
-
Dehghan, M.1
-
31
-
-
84868585200
-
Receiver-coordinated distributed transmit nullforming with channel state uncertainty
-
Mar
-
D. R. Brown et al. Receiver-coordinated distributed transmit nullforming with channel state uncertainty. in CISS, Mar. 2012
-
(2012)
CISS
-
-
Brown, D.R.1
-
32
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Commun. ACM, 1979
-
(1979)
Commun. ACM
-
-
Shamir, A.1
-
34
-
-
0035364530
-
A simple efficient approximation scheme for the restricted shortest path problem
-
D. H. Lorenz and D. Raz. A simple efficient approximation scheme for the restricted shortest path problem. Oper. Res. Lett., vol. 28, 1999
-
(1999)
Oper. Res. Lett
, vol.28
-
-
Lorenz, D.H.1
Raz, D.2
|