메뉴 건너뛰기




Volumn , Issue , 2013, Pages 2089-2093

On the optimality of polar codes for the deterministic wiretap channel

Author keywords

Channel Polarization; Deterministic Channel; Physical Layer Security; Polar Codes; Secrecy Capacity; Wiretap Channel

Indexed keywords

CODES (SYMBOLS); NETWORK LAYERS; TRANSMITTERS;

EID: 84901260362     PISSN: 10586393     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSSC.2013.6810675     Document Type: Conference Paper
Times cited : (6)

References (15)
  • 1
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Jan
    • A. Wyner, "The wire-tap channel," Bell. Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Jan. 1975.
    • (1975) Bell. Syst. Tech. J , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.1
  • 2
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszar and J. K̈orner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszar, I.1    K̈orner, J.2
  • 4
    • 80053941690 scopus 로고    scopus 로고
    • Achieving the secrecy capacity of wiretap channels using polar codes
    • Oct
    • H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, Oct. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.10
    • Mahdavifar, H.1    Vardy, A.2
  • 6
    • 67650099990 scopus 로고    scopus 로고
    • Channel polariazation: A method for constructing capacity acheiving codes for symmetric binaryinput memoryless channels
    • July
    • E. Arikan, "Channel polariazation: a method for constructing capacity acheiving codes for symmetric binaryinput memoryless channels," IEEE Trans. on Information Theory, vol. 55, no. 7, pp. 3051-3073, July 2009.
    • (2009) IEEE Trans. on Information Theory , vol.55 , Issue.7 , pp. 3051-3073
    • Arikan, E.1
  • 10
    • 77950200691 scopus 로고    scopus 로고
    • Polar codes are optimal for lossy source coding
    • S. B. Korada and R. L. Urbanke, "Polar codes are optimal for lossy source coding," IEEE Transactions on Information Theory, vol. 56, no. 4,pp. 1751-1768, 2010.
    • (2010) IEEE Transactions on Information Theory , vol.56 , Issue.4 , pp. 1751-1768
    • Korada, S.B.1    Urbanke, R.L.2
  • 11
    • 84863887401 scopus 로고    scopus 로고
    • Polar codes for the m-user multiple access channel
    • August
    • E. Abbe and E. Telatar, "Polar codes for the m-user multiple access channel," IEEE Transactions on Information Theory, vol. 58, pp. 5437-5448, August 2012.
    • (2012) IEEE Transactions on Information Theory , vol.58 , pp. 5437-5448
    • Abbe, E.1    Telatar, E.2
  • 14
    • 66949180834 scopus 로고    scopus 로고
    • A note on secrecy capacity of the multi-antenna wiretap channel
    • T. Liu and S. Shamai (Shitz), "A note on secrecy capacity of the multi-antenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.6 , pp. 2547-2553
    • Liu, T.1    Shamai, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.