-
1
-
-
0016562514
-
The wire-tap channel
-
Jan
-
A. Wyner, "The wire-tap channel," Bell. Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Jan. 1975.
-
(1975)
Bell. Syst. Tech. J
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
2
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. K̈orner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
K̈orner, J.2
-
3
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
Aug
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Trans. Inf. Theory, vol. 53, pp. 29332945, Aug. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, pp. 29332945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.5
-
4
-
-
80053941690
-
Achieving the secrecy capacity of wiretap channels using polar codes
-
Oct
-
H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, Oct. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.10
-
-
Mahdavifar, H.1
Vardy, A.2
-
6
-
-
67650099990
-
Channel polariazation: A method for constructing capacity acheiving codes for symmetric binaryinput memoryless channels
-
July
-
E. Arikan, "Channel polariazation: a method for constructing capacity acheiving codes for symmetric binaryinput memoryless channels," IEEE Trans. on Information Theory, vol. 55, no. 7, pp. 3051-3073, July 2009.
-
(2009)
IEEE Trans. on Information Theory
, vol.55
, Issue.7
, pp. 3051-3073
-
-
Arikan, E.1
-
8
-
-
77955596749
-
Nested polar codes for wiretap and relay channels
-
Aug
-
M. Andersson, V. Rathi, R. Thobaben, J. Kliewer and M. Skoglund, "Nested Polar Codes for Wiretap and Relay Channels," IEEE Communications Letters, vol. 14, no. 8, Aug. 2010.
-
(2010)
IEEE Communications Letters
, vol.14
, Issue.8
-
-
Andersson, M.1
Rathi, V.2
Thobaben, R.3
Kliewer, J.4
Skoglund, M.5
-
10
-
-
77950200691
-
Polar codes are optimal for lossy source coding
-
S. B. Korada and R. L. Urbanke, "Polar codes are optimal for lossy source coding," IEEE Transactions on Information Theory, vol. 56, no. 4,pp. 1751-1768, 2010.
-
(2010)
IEEE Transactions on Information Theory
, vol.56
, Issue.4
, pp. 1751-1768
-
-
Korada, S.B.1
Urbanke, R.L.2
-
11
-
-
84863887401
-
Polar codes for the m-user multiple access channel
-
August
-
E. Abbe and E. Telatar, "Polar codes for the m-user multiple access channel," IEEE Transactions on Information Theory, vol. 58, pp. 5437-5448, August 2012.
-
(2012)
IEEE Transactions on Information Theory
, vol.58
, pp. 5437-5448
-
-
Abbe, E.1
Telatar, E.2
-
14
-
-
66949180834
-
A note on secrecy capacity of the multi-antenna wiretap channel
-
T. Liu and S. Shamai (Shitz), "A note on secrecy capacity of the multi-antenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
|