-
1
-
-
42649092608
-
A survey on spectrum management in cognitive radio networks
-
Apr.
-
I. F. Akyildiz, W. Lee, M. C. Vuran, and S. Mohanty, "A survey on spectrum management in cognitive radio networks," IEEE Commun. Mag., vol. 46, no. 4, pp. 40-48, Apr. 2008.
-
(2008)
IEEE Commun. Mag.
, vol.46
, Issue.4
, pp. 40-48
-
-
Akyildiz, I.F.1
Lee, W.2
Vuran, M.C.3
Mohanty, S.4
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csisźar and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csisźar, I.1
Körner, J.2
-
4
-
-
0017996501
-
The Gaussian wire-tap channel
-
July
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
5
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
6
-
-
45249119255
-
Secure communication over fading channels
-
June
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
7
-
-
77958560746
-
Secure transmission with multiple antennas-part II: The MISOME wiretap channel
-
Nov.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-part II: the MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
9
-
-
66949180834
-
A note on the secrecy capacity of the multiple-antenna wiretap channel
-
June
-
T. Liu and S. Shamai (Shitz), "A note on the secrecy capacity of the multiple-antenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, June 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
10
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sept.
-
L. Lai and H. El Gamal, "The relay-eavesdropper channel: cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sept. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
11
-
-
45249090083
-
Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
-
June
-
R. Liu, I. Maric, P. Spasojevíc, and R. D. Yates, "Discrete memoryless interference and broadcast channels with confidential messages: secrecy rate regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2493-2507
-
-
Liu, R.1
Maric, I.2
Spasojevíc, P.3
Yates, R.D.4
-
13
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
July
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J.-M. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, July 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
14
-
-
80051953037
-
Strong secrecy for erasure wiretap channels
-
A. Suresh, A. Subramanian, A. Thangaraj, M. Bloch, and S. W. McLaughlin, "Strong secrecy for erasure wiretap channels," in Proc. 2010 IEEE Information Theory Workshop, pp. 1-5.
-
Proc. 2010 IEEE Information Theory Workshop
, pp. 1-5
-
-
Suresh, A.1
Subramanian, A.2
Thangaraj, A.3
Bloch, M.4
McLaughlin, S.W.5
-
15
-
-
79957996831
-
-
CoRR abs/1009.4610
-
V. Rathi, M. Andersson, R. Thobaben, J. Kliewer, and M. Skoglund, "Performance analysis and design of two edge type LDPC codes for the BEC wiretap channel," CoRR, vol. abs/1009.4610, 2010.
-
(2010)
Performance Analysis and Design of Two Edge Type LDPC Codes for the BEC Wiretap Channel
-
-
Rathi, V.1
Andersson, M.2
Thobaben, R.3
Kliewer, J.4
Skoglund, M.5
-
16
-
-
80051775152
-
Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes
-
Sept.
-
A. Subramanian, A. Thangaraj, M. Bloch, and S. W. McLaughlin, "Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 585-594, Sept. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 585-594
-
-
Subramanian, A.1
Thangaraj, A.2
Bloch, M.3
McLaughlin, S.W.4
-
17
-
-
80051720839
-
LDPC codes for the Gaussian wiretap channel
-
Sept.
-
D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, and B.-J. Kwak, "LDPC codes for the Gaussian wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 532-540, Sept. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 532-540
-
-
Klinc, D.1
Ha, J.2
McLaughlin, S.W.3
Barros, J.4
Kwak, B.-J.5
-
18
-
-
80053941690
-
Achieving the secrecy capacity of wiretap channels using polar codes
-
Oct.
-
H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6428-6443, Oct. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.10
, pp. 6428-6443
-
-
Mahdavifar, H.1
Vardy, A.2
-
20
-
-
77955596749
-
Nested polar codes for wiretap and relay channels
-
Aug.
-
M. Andersson, V. Rathi, R. Thobaben, J. Kliewer, and M. Skoglund, "Nested polar codes for wiretap and relay channels," IEEE Commun. Lett., vol. 14, no. 8, pp. 752-754, Aug. 2010.
-
(2010)
IEEE Commun. Lett.
, vol.14
, Issue.8
, pp. 752-754
-
-
Andersson, M.1
Rathi, V.2
Thobaben, R.3
Kliewer, J.4
Skoglund, M.5
-
24
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Springer-Verlag
-
U. Maurer and S. Wolf, "Information-theoretic key agreement: from weak to strong secrecy for free," in Proc. 2000 EUROCRYPT, Lecture Notes in Computer Science, vol. 1807, Springer-Verlag, pp. 351-368.
-
Proc. 2000 EUROCRYPT, Lecture Notes in Computer Science
, vol.1807
, pp. 351-368
-
-
Maurer, U.1
Wolf, S.2
-
27
-
-
80051757604
-
An information secrecy game in cognitive radio networks
-
Sept.
-
Y. Wu and K. J. R. Liu, "An information secrecy game in cognitive radio networks," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 831-842, Sept. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 831-842
-
-
Wu, Y.1
Liu, K.J.R.2
-
28
-
-
84873097542
-
Improving secrecy rate via spectrum leasing for friendly jamming
-
Jan.
-
I. Stanojev and A. Yener, "Improving secrecy rate via spectrum leasing for friendly jamming," IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 134-145, Jan. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.1
, pp. 134-145
-
-
Stanojev, I.1
Yener, A.2
-
29
-
-
77951274829
-
Secure communication over MISO cognitive radio channels
-
Apr.
-
Y. Pei, Y. Liang, L. Zhang, K. Teh, and K. Li, "Secure communication over MISO cognitive radio channels," IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1494-1502, Apr. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.4
, pp. 1494-1502
-
-
Pei, Y.1
Liang, Y.2
Zhang, L.3
Teh, K.4
Li, K.5
-
30
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
June
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
31
-
-
61349186445
-
Capacity of cognitive interference channels with and without secrecy
-
Feb.
-
Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai (Shitz), and S. Verd́u, "Capacity of cognitive interference channels with and without secrecy," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 604-619, Feb. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.2
, pp. 604-619
-
-
Liang, Y.1
Somekh-Baruch, A.2
Poor, H.V.3
Shamai, S.4
Verd́u, S.5
-
32
-
-
84938932265
-
Coding for relay channels with confidential messages
-
Y. Oohama, "Coding for relay channels with confidential messages," in Proc. 2001 IEEE Inf. Theory Workshop, pp. 87-89.
-
Proc. 2001 IEEE Inf. Theory Workshop
, pp. 87-89
-
-
Oohama, Y.1
-
33
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Aug.
-
X. He and A. Yener, "Cooperation with an untrusted relay: a secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
34
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
-
Jan.
-
C. Jeong, I.-M. Kim, and D. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.3
-
35
-
-
5044252003
-
Cooperative diversity in wireless networks: Efficient protocols and outage behavior
-
Dec.
-
J. N. Laneman, D. N. C. Tse, and G. W. Wornell, "Cooperative diversity in wireless networks: efficient protocols and outage behavior," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3062-3080
-
-
Laneman, J.N.1
Tse, D.N.C.2
Wornell, G.W.3
-
36
-
-
79955491895
-
Interference assisted secret communication
-
Sept.
-
X. Tang, R. Liu, P. Spasojevíc, and H. V. Poor, "Interference assisted secret communication," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153-3167, Sept. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.5
, pp. 3153-3167
-
-
Tang, X.1
Liu, R.2
Spasojevíc, P.3
Poor, H.V.4
-
39
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
40
-
-
84866621680
-
A closed-form power allocation for minimizing secrecy outage probability for miso wiretap channels via masked beamforming
-
Sept.
-
J. Xiong, K.-K. Wong, D. Ma, and J. Wei, "A closed-form power allocation for minimizing secrecy outage probability for miso wiretap channels via masked beamforming," IEEE Commun. Lett., vol. 16, no. 9, pp. 1496-1499, Sept. 2012.
-
(2012)
IEEE Commun. Lett.
, vol.16
, Issue.9
, pp. 1496-1499
-
-
Xiong, J.1
Wong, K.-K.2
Ma, D.3
Wei, J.4
-
41
-
-
84855381750
-
Outage probability based power distribution between data and artificial noise for physical layer security
-
Feb.
-
N. Romero-Zurita, M. Ghogho, and D. McLernon, "Outage probability based power distribution between data and artificial noise for physical layer security," IEEE Signal Process. Lett., vol. 19, no. 2, pp. 71-74, Feb. 2012.
-
(2012)
IEEE Signal Process. Lett.
, vol.19
, Issue.2
, pp. 71-74
-
-
Romero-Zurita, N.1
Ghogho, M.2
McLernon, D.3
-
42
-
-
84855923041
-
Secure communication in stochastic wireless networks-part I: Connectivity
-
Feb.
-
P. Pinto, J. Barros, and M. Win, "Secure communication in stochastic wireless networks-part I: connectivity," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 125-138, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 125-138
-
-
Pinto, P.1
Barros, J.2
Win, M.3
-
43
-
-
84855911932
-
Secure communication in stochastic wireless networks-part II: Maximum rate and collusion
-
Feb.
-
-, "Secure communication in stochastic wireless networks-part II: maximum rate and collusion," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 139-147, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 139-147
-
-
Pinto, P.1
Barros, J.2
Win, M.3
-
44
-
-
84860255627
-
On the secrecy capacity scaling in wireless networks
-
May
-
O. Koyluoglu, C. Koksal, and H. El Gamal, "On the secrecy capacity scaling in wireless networks," IEEE Trans. Inf. Theory, vol. 58, no. 5, pp. 3000-3015, May 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.5
, pp. 3000-3015
-
-
Koyluoglu, O.1
Koksal, C.2
El Gamal, H.3
-
45
-
-
0038236418
-
Capacity limits of MIMO channels
-
June
-
A. Goldsmith, S. A. Jafar, N. Jindal, and S. Vishwanath, "Capacity limits of MIMO channels," IEEE J. Sel. Areas Commun., vol. 21, no. 5, pp. 684-702, June 2003.
-
(2003)
IEEE J. Sel. Areas Commun.
, vol.21
, Issue.5
, pp. 684-702
-
-
Goldsmith, A.1
Jafar, S.A.2
Jindal, N.3
Vishwanath, S.4
-
47
-
-
84866300754
-
-
Ph.D. dissertation, Pennsylvania State University, University Park, PA, USA
-
X. He, "Cooperation and information theoretic security in wireless networks," Ph.D. dissertation, Pennsylvania State University, University Park, PA, USA, 2010.
-
(2010)
Cooperation and Information Theoretic Security in Wireless Networks
-
-
He, X.1
|