-
1
-
-
84944878354
-
-
Boca Raton, FL: CRC
-
A. Menezes, S. C. VanOorschot, and S. A. Vanstone, Handbook of Applied Cryptography, Boca Raton, FL: CRC, 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, S.C.2
Vanstone, S.A.3
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, The wire-tap channel, Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, Broadcast channels with confidential messages, IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
4
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct
-
P. K. Gopala, L. Lai, and H. E. Gamal, On the secrecy capacity of fading channels, IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687- 4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
Gamal, H.E.3
-
5
-
-
45249119255
-
Secure communication over fading channels
-
Shitz, June
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), Secure communication over fading channels, IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
6
-
-
40949147785
-
Multiple-access channels with confidential messages
-
Mar
-
Y. Liang and H. V. Poor, Multiple-access channels with confidential messages, IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.3
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
7
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Aug
-
F. Oggier and B. Hassibi, The secrecy capacity of the MIMO wiretap channel, IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
8
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sept
-
L. Lai and H. E. Gamal, The relay-eavesdropper channel: Cooperation for secrecy, IEEE Trans. Inf. Theory, vol. 54, pp. 4005-4019, Sept. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, pp. 4005-4019
-
-
Lai, L.1
Gamal, H.E.2
-
9
-
-
76649135514
-
Physical layer security game: Interaction between source, eavesdropper and friendly jammer
-
June
-
Z. Han, N. Marina, M. Debbah, and A. Hjøungnes, Physical layer security game: Interaction between source, eavesdropper and friendly jammer, EURASIP J. Wireless Commun. Netw., Speical issue on physical-layer security, June 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw., Speical Issue on Physical-layer Security
-
-
Han, Z.1
Marina, N.2
Debbah, M.3
Hjøungnes, A.4
-
10
-
-
41849091900
-
Secure communications via cooperating base stations
-
Mar
-
O. Simeone and P. Popovski, Secure communications via cooperating base stations, IEEE Commun. Lett., vol. 12, no. 3, pp. 188-190, Mar. 2008.
-
(2008)
IEEE Commun. Lett.
, vol.12
, Issue.3
, pp. 188-190
-
-
Simeone, O.1
Popovski, P.2
-
11
-
-
67649499991
-
Wireless secrecy in cellular systems with infrastructure-aided cooperation
-
June
-
P. Popovski and O. Simeone, Wireless secrecy in cellular systems with infrastructure-aided cooperation, IEEE Trans. Inf. Forensics Security, vol. 4, no. 2, pp. 242-256, June 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.2
, pp. 242-256
-
-
Popovski, P.1
Simeone, O.2
|