-
1
-
-
0016562514
-
The wire-tap channel
-
Jan.
-
A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Jan. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
2
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
3
-
-
38349115043
-
Wiretap channel with side information
-
Jan.
-
Y. Chen and A. Han Vinck, "Wiretap channel with side information," IEEE Trans. Inf. Theory, vol. 54, no. 1, pp. 395-402, Jan. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.1
, pp. 395-402
-
-
Chen, Y.1
Vinck, A.H.2
-
4
-
-
33646073724
-
An achievable region for the Gaussian wiretap channel with side information
-
May
-
C. Mitrpant, A. Vinck, and Y. Luo, "An achievable region for the Gaussian wiretap channel with side information," IEEE Trans. Inf. Theory, vol. 52, no. 5, pp. 2181-2190, May 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.5
, pp. 2181-2190
-
-
Mitrpant, C.1
Vinck, A.2
Luo, Y.3
-
5
-
-
80051780323
-
Secret-key agreement with channel state information at the transmitter
-
Sep.
-
A. Khisti, S. N. Diggavi, and G. W.Wornell, "Secret-key agreement with channel state information at the transmitter," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 672-681, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 672-681
-
-
Khisti, A.1
Diggavi, S.N.2
Wornell, G.W.3
-
6
-
-
84860260503
-
Wiretap channel with causal state information
-
May
-
Y.-K. Chia and A. El Gamal, "Wiretap channel with causal state information," IEEE Trans. Inf. Theory, vol. 58, no. 5, pp. 2838-2849, May 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.5
, pp. 2838-2849
-
-
Chia, Y.-K.1
Gamal, A.E.2
-
7
-
-
79955491895
-
Interference-assisted secret communication
-
May
-
X. Tang, R. Liu, P. Spasojevic, and H. Poor, "Interference-assisted secret communication," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153-3167, May 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.5
, pp. 3153-3167
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.4
-
8
-
-
77951565555
-
Secure degrees of freedom for Gaussian channels with interference: Structured codes outperform Gaussian signaling
-
Nov./Dec.
-
X. He and A. Yener, "Secure degrees of freedom for Gaussian channels with interference: Structured codes outperform Gaussian signaling," in Proc. IEEE Global Telecommun. Conf., Nov./Dec. 2009, pp. 1-6.
-
(2009)
Proc. IEEE Global Telecommun. Conf.
, pp. 1-6
-
-
He, X.1
Yener, A.2
-
9
-
-
84881483763
-
Secure degrees of freedom of the Gaussian wiretap channel with helpers and no eavesdropper CSI: Blind cooperative jamming
-
Mar.
-
J. Xie and S. Ulukus, "Secure degrees of freedom of the Gaussian wiretap channel with helpers and no eavesdropper CSI: Blind cooperative jamming," in Proc. CISS, Mar. 2013, pp. 1-5.
-
(2013)
Proc. CISS
, pp. 1-5
-
-
Xie, J.1
Ulukus, S.2
-
10
-
-
84870266491
-
Deaf cooperation for secrecy with multiple antennas at the helper
-
Dec.
-
R. Bassily and S. Ulukus, "Deaf cooperation for secrecy with multiple antennas at the helper," IEEE Trans. Inf. Forensics Security, vol. 7, no. 6, pp. 1885-1864, Dec. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.6
, pp. 1885-1864
-
-
Bassily, R.1
Ulukus, S.2
-
11
-
-
45249101530
-
The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
12
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
13
-
-
45249090083
-
Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
-
Jun.
-
R. Liu, I. Maric, P. Spasojevic, and R. Yates, "Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2493-2507
-
-
Liu, R.1
Maric, I.2
Spasojevic, P.3
Yates, R.4
-
14
-
-
80052369884
-
Cooperative encoding for secrecy in interference channels
-
Sep.
-
O. Koyluoglu and H. El Gamal, "Cooperative encoding for secrecy in interference channels," IEEE Trans. Inf. Theory, vol. 57, no. 9, pp. 5682-5694, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.9
, pp. 5682-5694
-
-
Koyluoglu, O.1
Gamal, H.E.2
-
15
-
-
84858392930
-
Secure communication over parallel relay channel
-
Apr.
-
Z. H. Awan, A. Zaidi, and L. Vandendorpe, "Secure communication over parallel relay channel," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 359-371, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 359-371
-
-
Awan, Z.H.1
Zaidi, A.2
Vandendorpe, L.3
-
16
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
17
-
-
46749102916
-
Multiple access channels with generalized feedback and confidential messages
-
Sep.
-
X. Tang, R. Liu, P. Spasojevic, and H. Poor, "Multiple access channels with generalized feedback and confidential messages," in Proc. IEEE Inf. Theory Workshop, Sep. 2007, pp. 608-613.
-
(2007)
Proc. IEEE Inf. Theory Workshop
, pp. 608-613
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.4
-
18
-
-
40949147785
-
Multiple-access channels with confidential messages
-
DOI 10.1109/TIT.2007.915978
-
Y. Liang and H. Poor, "Multiple-access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008. (Pubitemid 351410914)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.3
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
19
-
-
84888354468
-
Rate regions for multiple access channel with conference and secrecy constraints
-
Dec.
-
P. Xu, Z. Ding, and X. Dai, "Rate regions for multiple access channel with conference and secrecy constraints," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1961-1974, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.12
, pp. 1961-1974
-
-
Xu, P.1
Ding, Z.2
Dai, X.3
-
20
-
-
70349616112
-
Capacity bounds for broadcast channels with confidential messages
-
Oct.
-
J. Xu, Y. Cao, and B. Chen, "Capacity bounds for broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 55, no. 10, pp. 4529-4542, Oct. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.10
, pp. 4529-4542
-
-
Xu, J.1
Cao, Y.2
Chen, B.3
-
21
-
-
78650894311
-
Secrecy in cooperative relay broadcast channels
-
Jan.
-
E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 137-155, Jan. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.1
, pp. 137-155
-
-
Ekrem, E.1
Ulukus, S.2
-
23
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Aug.
-
X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
24
-
-
67249087217
-
Two-hop secure communication using an untrusted relay: A case for cooperative jamming
-
Nov./Dec.
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay: A case for cooperative jamming," in Proc. IEEE Global Telecommun. Conf., Nov./Dec. 2008, pp. 1-5.
-
(2008)
Proc. IEEE Global Telecommun. Conf.
, pp. 1-5
-
-
He, X.1
Yener, A.2
-
25
-
-
79957667257
-
Interference alignment for secrecy
-
Jun.
-
O. Koyluoglu, H. El Gamal, L. Lai, and H. Poor, "Interference alignment for secrecy," IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. 3323-3332, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.6
, pp. 3323-3332
-
-
Koyluoglu, O.1
Gamal, H.E.2
Lai, L.3
Poor, H.4
-
26
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. Shamai, "Information theoretic security," Foundations Trends Commun. Inf. Theory, vol. 5, nos. 4-5, pp. 355-580, 2009.
-
(2009)
Foundations Trends Commun. Inf. Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
28
-
-
0019148101
-
Coding for channel with random parameters
-
S. Gelfand and M. Pinsker, "Coding for channel with random parameters," Problems Control Inf. Theory, vol. 9, no. 1, pp. 19-31, 1980.
-
(1980)
Problems Control Inf. Theory
, vol.9
, Issue.1
, pp. 19-31
-
-
Gelfand, S.1
Pinsker, M.2
-
30
-
-
0020752342
-
Writing on dirty paper (corresp.)
-
May
-
M. Costa, "Writing on dirty paper (corresp.)," IEEE Trans. Inf. Theory, vol. 29, no. 3, pp. 439-441, May 1983.
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.3
, pp. 439-441
-
-
Costa, M.1
|