-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon, C.E., Communication theory of secrecy systems. Bell Sys. Tech. J., 28, pp. 656-715, 1949.
-
(1949)
Bell Sys. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
Wyner, A.D., The wire-tap channel. Bell Sys. Tech. J., 54, pp. 1355- 1387, 1975.
-
(1975)
Bell Sys. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
Csiszár, I., and Körner, J., Broadcast channels with confidential messages, IEEE Trans. Inform. Theory, 24, pp. 339-348, 1978.
-
(1978)
IEEE Trans. Inform. Theory
, vol.24
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
5
-
-
76249114101
-
-
Now Publishers, MA
-
Liang, Y., Poor, H.V., and Shamai, S., Information Theoretic Security. Now Publishers, MA, 2009.
-
(2009)
Information Theoretic Security
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
6
-
-
84892287919
-
-
Eds., Springer-Verlag, NY
-
Liu, R., and Trappe, W., Eds., Securing Wireless Communications at the Physical Layer. Springer-Verlag, NY, 2010.
-
(2010)
Securing Wireless Communications at the Physical Layer
-
-
Liu, R.1
Trappe, W.2
-
8
-
-
45249119255
-
Secure communications over fading channels
-
Liang, Y., Poor, H.V., and Shamai, S., Secure communications over fading channels, IEEE Trans. Inform. Theory, 54, pp.2470-2492, 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
9
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Gopala, P. K., Lai, L., and El Gamal, H., On the Secrecy Capacity of Fading Channels. IEEE Trans. Inform. Theory, 54, pp. 4687-4698, 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
10
-
-
84940654702
-
Secrecy capacity of independent parallel channels
-
Li, Z., Yates, R., and Trappe, W., Secrecy Capacity of Independent Parallel Channels, The 44th Annual Allerton Conference on Communication, Control, and Computing, 2006.
-
(2006)
The 44th Annual Allerton Conference on Communication, Control, and Computing
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
11
-
-
70349719178
-
-
(Shitz)., ITA
-
Liang, Y., Poor, H.V., and Shamai, S.(Shitz). Secrecy capacity region of parallel broadcast channels, ITA 2007.
-
(2007)
Secrecy Capacity Region of Parallel Broadcast Channels
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
12
-
-
44049095075
-
Secret communication via multi-antenna transmission
-
Li, Z., Trappe, W., and Yates, R., Secret Communication via Multi-antenna Transmission, CISS2007, pp. 905-910, 2007.
-
(2007)
CISS2007
, pp. 905-910
-
-
Li, Z.1
Trappe, W.2
Yates, R.3
-
13
-
-
77953802876
-
Secure transmission with multiple antennas i: The misome wiretap channel
-
Khisti, A., and Wornell, G., Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel, IEEE Trans. Inform. Theory, 56, pp. 3088-3104, 2010.
-
(2010)
IEEE Trans. Inform. Theory
, vol.56
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.2
-
14
-
-
45249085230
-
Secure communication with a fading eavesdropper channel
-
Li, Z., Yates, R., and Trappe, W., Secure Communication with a Fading Eavesdropper Channel, IEEE ISIT 2007, pp. 1296-1300.
-
(2007)
IEEE ISIT
, pp. 1296-1300
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
15
-
-
79957667257
-
Interference alignment for secrecy
-
Koyluoglu, O.O., El Gamal, H., Lai, L., and Poor, H.V., Interference alignment for secrecy, IEEE Trans. Inform. Theory, 57, pp. 3323-3332, 2011.
-
(2011)
IEEE Trans. Inform. Theory
, vol.57
, pp. 3323-3332
-
-
Koyluoglu, O.O.1
El Gamal, H.2
Lai, L.3
Poor, H.V.4
-
18
-
-
84856969548
-
-
MILCOM
-
Zhu, Q., Saad, W., Han, Z., Poor, H.V., and Basar, T., Eavesdropping and Jamming in Next-Generation Wireless Networks: A Game-Theoretic Approach, MILCOM 2011.
-
(2011)
Eavesdropping and Jamming in Next-Generation Wireless Networks: A Game-Theoretic Approach
-
-
Zhu, Q.1
Saad, W.2
Han, Z.3
Poor, H.V.4
Basar, T.5
-
19
-
-
0037003792
-
-
MILCOM
-
Gupta, V., Krishnamurthy, S.V., and Faloutsos, M., Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks, MILCOM 2002.
-
(2002)
Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks
-
-
Gupta, V.1
Krishnamurthy, S.V.2
Faloutsos, M.3
-
21
-
-
29844457889
-
-
MobiHoc
-
Xu, X., Trappe, W., Zhang, Y., and Wood, T., The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. MobiHoc 2005.
-
(2005)
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks
-
-
Xu, X.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
22
-
-
50649125455
-
Game theoretic modeling of malicious users in collaborative networks
-
Theodorakopoulos, G., and Baras, J.S., Game Theoretic Modeling of Malicious Users in Collaborative Networks. IEEE Journal on Selected Areas in Communications, 26, pp. 1317-1327, 2008.
-
(2008)
IEEE Journal on Selected Areas in Communications
, vol.26
, pp. 1317-1327
-
-
Theodorakopoulos, G.1
Baras, J.S.2
-
23
-
-
4544354908
-
Correlated jamming on MIMO gaussian fading channels
-
Kashyap, A., Basar, T., and Srikant, R. Correlated Jamming on MIMO Gaussian Fading Channels, IEEE Trans. Inform. Theory, 50, pp. 2119- 2123, 2004.
-
(2004)
IEEE Trans. Inform. Theory
, vol.50
, pp. 2119-2123
-
-
Kashyap, A.1
Basar, T.2
Srikant, R.3
-
25
-
-
84891351344
-
Obtaining secrecy through intentional uncertainty
-
(Eds. Liu, R. Trappe W.), New York, Springer
-
Goel, N., and Negi, R., Obtaining Secrecy Through Intentional Uncertainty. Engineering Securing Wireless Communications at the Physical Layer (Eds. Liu, R., Trappe W.), New York, Springer, 19-37, 2010.
-
(2010)
Engineering Securing Wireless Communications at the Physical Layer
, pp. 19-37
-
-
Goel, N.1
Negi, R.2
-
26
-
-
63749110244
-
A game-theoretic analysis of denial of service attacks in wireless random access
-
Sagduyu, Y.E., and Ephremides, A., A Game-Theoretic Analysis of Denial of Service Attacks in Wireless Random Access, Journal of Wireless Networks, 15, pp. 651-666, 2009.
-
(2009)
Journal of Wireless Networks
, vol.15
, pp. 651-666
-
-
Sagduyu, Y.E.1
Ephremides, A.2
-
28
-
-
84890820289
-
Combined power control and transmission selection in cellular networks
-
Kim, S.L., Rosberg, Z., and Zander, J., Combined power control and transmission selection in cellular networks. IEEE VTC 1999.
-
(1999)
IEEE VTC
-
-
Kim, S.L.1
Rosberg, Z.2
Zander, J.3
-
29
-
-
0032658512
-
Analysis of erlang capacity for the multimedia DS-CDMA systems
-
Koo, I., Ahn, J., Lee, H.A., and Kim, K., Analysis of Erlang capacity for the multimedia DS-CDMA systems. IEICE Trans. Fundamentals, E82- A(5), pp.849-855, 1999.
-
(1999)
IEICE Trans. Fundamentals
, vol.E82- A
, Issue.5
, pp. 849-855
-
-
Koo, I.1
Ahn, J.2
Lee, H.A.3
Kim, K.4
-
31
-
-
85184305615
-
Dependence of optimal monitoring strategy on the application to be protected
-
Garnaev, A., Trappe, W., Kung, C.-T., Dependence of Optimal Monitoring Strategy on the Application to be Protected. IEEE Globecom 2012, pp. 1072-1077.
-
(2012)
IEEE Globecom
, pp. 1072-1077
-
-
Garnaev, A.1
Trappe, W.2
Kung, C.-T.3
-
32
-
-
79956100559
-
Jamming in wireless networks under uncertainty
-
Altman, E., Avrachenkov, K., and Garnaev, A., Jamming in Wireless Networks Under Uncertainty. Mobile Networks and Applications, 16, pp.246-254, 2011.
-
(2011)
Mobile Networks and Applications
, vol.16
, pp. 246-254
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
33
-
-
77349115760
-
Fair resource allocation in wireless networks in the presence of a jammer
-
Altman E., Avrachenkov K., Garnaev A., Fair Resource Allocation in Wireless Networks in the Presence of a Jammer. Performance Evaluation, 67, pp.338-349, 2010.
-
(2010)
Performance Evaluation
, vol.67
, pp. 338-349
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
34
-
-
63449130855
-
-
NETCOOP 2009. Lecture Notes in Computer Science, v.5425
-
Altman, E., Avrachenkov, K., and Garnaev, A., Transmission Power Control Game with SINR as Objective Function. NETCOOP 2009. Lecture Notes in Computer Science, v.5425, pp.112-120, 2009.
-
(2009)
Transmission Power Control Game with SINR as Objective Function
, pp. 112-120
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
|