-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shanon, "Communication theory of secrecy systems," J. Bell Syst. Tech., vol. 28, pp. 656-715, 1948.
-
(1948)
J. Bell Syst. Tech
, vol.28
, pp. 656-715
-
-
Shanon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel," J. Bell Sys. Tech., vol. 54, no. 8, pp. 1355-1367, Oct. 1975.
-
(1975)
J. Bell Sys. Tech
, vol.54
, Issue.8
, pp. 1355-1367
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
Jul
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
4
-
-
52349086199
-
The secrecy graph and some of its properties
-
Toronto, ON, Canada, Jul
-
M. Haenggi, "The secrecy graph and some of its properties," in Proc. IEEE ISIT, Toronto, ON, Canada, Jul. 2008, pp. 539-543.
-
(2008)
Proc. IEEE ISIT
, pp. 539-543
-
-
Haenggi, M.1
-
5
-
-
85015762550
-
Wireless secrecy in large-scale networks
-
Feb
-
P. C. Pinto, J. Barros, and M. Z. Win, "Wireless secrecy in large-scale networks," in Proc. IEEE ITA, Feb. 2011, pp. 1-10.
-
(2011)
Proc. IEEE ITA
, pp. 1-10
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
6
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
7
-
-
70349668660
-
On cooperativewireless network secrecy
-
Rio de Janeiro, Brazil, Apr
-
E. Perron, S. Diggavi, and E. Telatar, "On cooperativewireless network secrecy," in Proc. IEEE INFOCOM, Rio de Janeiro, Brazil, Apr. 2009, pp. 1935-1943.
-
(2009)
Proc. IEEE INFOCOM
, pp. 1935-1943
-
-
Perron, E.1
Diggavi, S.2
Telatar, E.3
-
8
-
-
66949180834
-
A note on the secrecy capacity of the multiple antenna wiretap channel
-
Jun
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multiple antenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
9
-
-
77958560746
-
Secure transmission with multiple antennas- Part II: The MIMOME wiretap channel
-
Nov
-
A. Khist and G. W. Wornell, "Secure transmission with multiple antennas- Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khist, A.1
Wornell, G.W.2
-
10
-
-
45249104850
-
Wireless information-theoretic security
-
Jun
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
11
-
-
80054124220
-
Delay and capacity tradeoff analysis for motioncast
-
Oct
-
X. Wang, W. Huang, S. Wang, J. Zhang, and C. Hu, "Delay and capacity tradeoff analysis for motioncast," IEEE/ACM Trans. Netw., vol. 19, no. 5, pp. 1354-1367, Oct. 2011.
-
(2011)
IEEE/ACM Trans. Netw
, vol.19
, Issue.5
, pp. 1354-1367
-
-
Wang, X.1
Huang, W.2
Wang, S.3
Zhang, J.4
Hu, C.5
-
12
-
-
78649282396
-
Security-capacity trade-off in large wireless networks using keyless secrecy
-
Chicago, IL, USA, Sep
-
S. Vasudevan, D. Goeckel, and D. Towsley, "Security-capacity trade-off in large wireless networks using keyless secrecy," in Proc. ACM MobiHoc, Chicago, IL, USA, Sep. 2010, pp. 21-30.
-
(2010)
Proc. ACM MobiHoc
, pp. 21-30
-
-
Vasudevan, S.1
Goeckel, D.2
Towsley, D.3
-
13
-
-
84860255627
-
On secrecy capacity scaling in wireless networks
-
May
-
O. Koyluoglu, E. Koksal, and E. Gammel, "On secrecy capacity scaling in wireless networks," IEEE Trans. Inf. Theory, vol. 58, no. 5, pp. 3000-3015, May 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.5
, pp. 3000-3015
-
-
Koyluoglu, O.1
Koksal, E.2
Gammel, E.3
-
14
-
-
84861647733
-
-
Arxiv Preprint arXiv:1012.4552
-
X. Zhou, R. K. Ganti, J. G. Andrews, and A. Hjorungnes, "The throughput cost of information-theoretic security in decentralized wireless networks," Arxiv Preprint arXiv: 1012.4552, 2010.
-
(2010)
The Throughput Cost of Information-theoretic Security in Decentralized Wireless Networks
-
-
Zhou, X.1
Ganti, R.K.2
Andrews, J.G.3
Hjorungnes, A.4
-
15
-
-
84861585672
-
Impact of secrecy on capacity in largescale wireless networks
-
Orlando, FL, USA, Mar
-
J. Zhang, L. Fu, and X. Wang, "Impact of secrecy on capacity in largescale wireless networks," in Proc. IEEE INFOCOM Mini Conf., Orlando, FL, USA, Mar. 2012, pp. 3051-3055.
-
(2012)
Proc. IEEE INFOCOM Mini Conf
, pp. 3051-3055
-
-
Zhang, J.1
Fu, L.2
Wang, X.3
-
16
-
-
80053983111
-
Secrecy throughput of MANETs under passive and active attacks
-
Oct
-
Y. Liang, H. V. Poor, and L. Ying, "Secrecy throughput of MANETs under passive and active attacks," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6692-6702, Oct. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.10
, pp. 6692-6702
-
-
Liang, Y.1
Poor, H.V.2
Ying, L.3
-
17
-
-
78649281129
-
Achieving single channel, full duplex wireless communication
-
Chicago, IL, USA, Sep
-
J. I. Choiy,M. Jainy, K. Srinivasany, P. Levis, and S. Katti, "Achieving single channel, full duplex wireless communication," in Proc. ACM MobiCom, Chicago, IL, USA, Sep. 2010, pp. 1-12.
-
(2010)
Proc. ACM MobiCom
, pp. 1-12
-
-
Choiy, J.I.1
Jainy, M.2
Srinivasany, K.3
Levis, P.4
Katti, S.5
-
18
-
-
33747142749
-
The capacity of wireless networks
-
Mar
-
P. Gupta and P. Kumar, "The capacity of wireless networks," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 388-404, Mar. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.2
, pp. 388-404
-
-
Gupta, P.1
Kumar, P.2
-
19
-
-
20544449224
-
Capacity and delay tradeoffs for ad hoc mobile networks
-
DOI 10.1109/TIT.2005.847717
-
M. J. Neely and E. Modiano, "Capacity and delay tradeoffs for ad hoc mobile networks," IEEE Trans. Inf. Theory, vol. 51, no. 6, pp. 1917-1937, Jun. 2005. (Pubitemid 40843617)
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.6
, pp. 1917-1937
-
-
Neely, M.J.1
Modiano, E.2
-
20
-
-
33947689700
-
Closing the gap in the capacity of wireless networks via percolation theory
-
DOI 10.1109/TIT.2006.890791
-
M. Franceschetti, O. Dousse, D. N. Tse, and P. Thiran, "Closing the gap in the capacity of wireless networks via percolation theory," IEEE Trans. Inf. Theory, vol. 53, no. 3, pp. 1009-1018, Mar. 2007. (Pubitemid 46487788)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.3
, pp. 1009-1018
-
-
Franceschetti, M.1
Dousse, O.2
Tse, D.N.C.3
Thiran, P.4
-
21
-
-
70350528794
-
Capacity scaling in ad hoc networks with heterogeneous mobile nodes: The super-critical regime
-
Oct
-
M. Garetto, P. Giaccone, and E. Leonardi, "Capacity scaling in ad hoc networks with heterogeneous mobile nodes: The super-critical regime," IEEE/ACM Trans. Netw., vol. 17, no. 5, pp. 1522-1535, Oct. 2009.
-
(2009)
IEEE/ACM Trans. Netw
, vol.17
, Issue.5
, pp. 1522-1535
-
-
Garetto, M.1
Giaccone, P.2
Leonardi, E.3
-
22
-
-
79955482990
-
On the price of security in large-scale wireless ad hoc networks
-
Apr
-
C. Zhang, Y. Song, Y. Fang, and Y. Zhang, "On the price of security in large-scale wireless ad hoc networks," IEEE/ACM Trans. Netw., vol. 19, no. 2, pp. 319-332, Apr. 2011.
-
(2011)
IEEE/ACM Trans. Netw
, vol.19
, Issue.2
, pp. 319-332
-
-
Zhang, C.1
Song, Y.2
Fang, Y.3
Zhang, Y.4
-
23
-
-
0036670170
-
Mobility increases the capacity of ad hoc wireless networks
-
DOI 10.1109/TNET.2002.801403, PII 1011092002801403
-
M. Grossglauser and D. N. C. Tse, "Mobility increases the capacity of ad hoc wireless networks," IEEE/ACM Trans. Netw., vol. 10, no. 4, pp. 477-486, Aug. 2002. (Pubitemid 35000391)
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, Issue.4
, pp. 477-486
-
-
Grossglauser, M.1
Tse, D.N.C.2
-
24
-
-
67650114837
-
Multicast capacity of wireless ad hoc networks
-
Jun
-
X. Li, "Multicast capacity of wireless ad hoc networks," IEEE/ACM Trans. Netw., vol. 17, no. 3, pp. 950-961, Jun. 2009.
-
(2009)
IEEE/ACM Trans. Netw
, vol.17
, Issue.3
, pp. 950-961
-
-
Li, X.1
-
25
-
-
79955458079
-
Multicast throughput for hybrid wireless networks under Gaussian channel model
-
Jun
-
C. Wang, X. Li, C. Jiang, S. Tang, and Y. Liu, "Multicast throughput for hybrid wireless networks under Gaussian channel model," IEEE Trans. Mobile Comput., vol. 10, no. 6, pp. 839-852, Jun. 2011.
-
(2011)
IEEE Trans. Mobile Comput
, vol.10
, Issue.6
, pp. 839-852
-
-
Wang, C.1
Li, X.2
Jiang, C.3
Tang, S.4
Liu, Y.5
-
26
-
-
84863555856
-
Closing the gap in the multicast capacity of hybrid wireless networks
-
S. Tang, X. Mao, T. Jung, J. Han, X. Li, B. Xu, and C. Ma, "Closing the gap in the multicast capacity of hybrid wireless networks," in Proc. ACM MobiHoc, 2012, pp. 135-144.
-
(2012)
Proc. ACM MobiHoc
, pp. 135-144
-
-
Tang, S.1
Mao, X.2
Jung, T.3
Han, J.4
Li, X.5
Xu, B.6
Ma, C.7
-
27
-
-
37849009714
-
Capacity of a wireless ad hoc network with infrastructure
-
B. Liu, P. Thiran, and D. Towsley, "Capacity of a wireless ad hoc network with infrastructure," in Proc. ACM MobiHoc, 2007, pp. 239-246.
-
(2007)
Proc. ACM MobiHoc
, pp. 239-246
-
-
Liu, B.1
Thiran, P.2
Towsley, D.3
-
28
-
-
35148893949
-
Hierarchical cooperation achieves optimal capacity scaling in Ad Hoc networks
-
DOI 10.1109/TIT.2007.905002, Special issue on Models, Theory, and Codes for Relaying and Cooperation in Communication Network
-
A. Özgür, O. Lévêque, and D. N. C. Tse, "Hierarchical cooperation achieves optimal capacity scaling in ad hoc networks," IEEE Trans. Inf. Theory, vol. 53, no. 10, pp. 3549-3572, Oct. 2007. (Pubitemid 47534513)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.10
, pp. 3549-3572
-
-
Ozgur, A.1
Leveque, O.2
Tse, D.N.C.3
-
30
-
-
33745136745
-
Degenerate delay-capacity tradeoffs in Ad-Hoc networks with Brownian mobility
-
DOI 10.1109/TIT.2006.874544
-
X. Lin, G. Sharma, R. R. Mazumdar, and N. B. Shroff, "Degenerate delay-capacity trade-offs in ad hoc networks with Brownian mobility," IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2777-2784, Jun. 2006. (Pubitemid 43898925)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.6
, pp. 2777-2784
-
-
Lin, X.1
Sharma, G.2
Mazumdar, R.R.3
Shroff, N.B.4
-
31
-
-
0025383763
-
A guided tour of Chernoff bounds
-
Feb
-
T. Hagerup and C. Rüb, "A guided tour of Chernoff bounds," Inf. Process. Lett., vol. 33, no. 6, pp. 305-308, Feb. 1990.
-
(1990)
Inf. Process. Lett
, vol.33
, Issue.6
, pp. 305-308
-
-
Hagerup, T.1
Rüb, C.2
-
32
-
-
4143112460
-
Throughput-delay trade-off inwireless networks
-
Hong Kong, China, Mar
-
A. Gamal, J. Mammen, B. Prabhakar, and D. Shah, "Throughput-delay trade-off inwireless networks," in Proc. IEEE INFOCOM,Hong Kong, China, Mar. 2004, pp. 464-475.
-
(2004)
Proc. IEEE INFOCOM
, pp. 464-475
-
-
Gamal, A.1
Mammen, J.2
Prabhakar, B.3
Shah, D.4
-
33
-
-
33947698356
-
Throughput and delay in random wireless networks with restricted mobility
-
DOI 10.1109/TIT.2006.890720
-
J. Mammen and D. Shah, "Throughput and delay in random wireless networks with restricted mobility," IEEE Trans. Inf. Theory, vol. 53, no. 3, pp. 1108-1116, Mar. 2007. (Pubitemid 46487795)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.3
, pp. 1108-1116
-
-
Mammen, J.1
Shah, D.2
|