-
1
-
-
0023978629
-
On the capacity of channels with block memory
-
Mar.
-
W. E. Stark and R. J. McEliece, "On the capacity of channels with block memory," IEEE Trans. Inf. Theory, vol. 34, no. 3, pp. 322-324, Mar. 1988.
-
(1988)
IEEE Trans. Inf. Theory
, vol.34
, Issue.3
, pp. 322-324
-
-
Stark, W.E.1
McEliece, R.J.2
-
2
-
-
4143137728
-
Capacity of correlated jamming channels
-
M. Medard, "Capacity of correlated jamming channels," in Proc. 35th Allerton Conf., pp. 1043-1052, 1997.
-
(1997)
Proc. 35th Allerton Conf.
, pp. 1043-1052
-
-
Medard, M.1
-
3
-
-
4544354908
-
Correlated jamming on MIMO gaussian fading channels
-
Sep.
-
A. Kashyap, T. Basar, and R. Srikant, "Correlated jamming on MIMO gaussian fading channels," IEEE Trans. Inf. Theory, vol. 50, no. 9, pp. 2119-2123, Sep. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.9
, pp. 2119-2123
-
-
Kashyap, A.1
Basar, T.2
Srikant, R.3
-
4
-
-
0024012644
-
An introduction to contemporary cryptology
-
May
-
J. L. Massey, "An introduction to contemporary cryptology," Proc. IEEE, vol. 76, no. 5, pp. 533-549, May 1988.
-
(1988)
Proc. IEEE
, vol.76
, Issue.5
, pp. 533-549
-
-
Massey, J.L.1
-
5
-
-
0032164539
-
Cryptographic design vulnerabilities
-
Sep.
-
B. Schneier, "Cryptographic design vulnerabilities," IEEE Computer, vol. 31, no. 9, pp. 26-33, Sep. 1998.
-
(1998)
IEEE Computer
, vol.31
, Issue.9
, pp. 26-33
-
-
Schneier, B.1
-
6
-
-
77949415170
-
Vulnerabilities in some recently proposed RFID ownership transfer protocols
-
Mar.
-
G. Kapoor and S. Piramithu, "Vulnerabilities in some recently proposed RFID ownership transfer protocols," IEEE Commun. Lett., vol. 14, no. 3, pp. 260-262, Mar. 2010.
-
(2010)
IEEE Commun. Lett.
, vol.14
, Issue.3
, pp. 260-262
-
-
Kapoor, G.1
Piramithu, S.2
-
7
-
-
84867877630
-
Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures
-
Nov.
-
A. Barenghi, L. Breveglieri, I. Koren, and D. Naccache, "Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures," Proc. IEEE, vol. 100, no. 11, pp. 3056-3076, Nov. 2012.
-
(2012)
Proc. IEEE
, vol.100
, Issue.11
, pp. 3056-3076
-
-
Barenghi, A.1
Breveglieri, L.2
Koren, I.3
Naccache, D.4
-
8
-
-
68349116049
-
-
Now Publishers
-
Y. Liang, H. V. Poor, and S. Shamai, Information Theoretic Security. Foundations and Trends in Communications and Information Theory, vol. 5, nos. 4-5, pp. 355-580, Now Publishers, 2008.
-
(2008)
Information Theoretic Security. Foundations and Trends in Communications and Information Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
9
-
-
84892287919
-
-
Springer, Norwell, MA, USA
-
R. Liu and W. Trappe, Securing Wireless Communications at the Physical Layer. Springer, Norwell, MA, USA, 2009.
-
(2009)
Securing Wireless Communications at the Physical Layer
-
-
Liu, R.1
Trappe, W.2
-
13
-
-
0000478763
-
Cipher printing telegraph systems for secret wire and radio telegraphic communications
-
G. S. Vernam, "Cipher printing telegraph systems for secret wire and radio telegraphic communications," Trans. American Institute Electrical Engineers, vol. XLV, pp. 295-301, 1926.
-
(1926)
Trans. American Institute Electrical Engineers
, vol.45
, pp. 295-301
-
-
Vernam, G.S.1
-
14
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Sys. Tech. J., vol. 28, pp. 656-715, 1949.
-
(1949)
Bell Sys. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
15
-
-
84875486428
-
Secrecy systems approximating perfect and ideal secrecy
-
P. R. Geffe, "Secrecy systems approximating perfect and ideal secrecy," Proc. IEEE, vol. 53, no. 9, pp. 1229-1230, 1965.
-
(1965)
Proc. IEEE
, vol.53
, Issue.9
, pp. 1229-1230
-
-
Geffe, P.R.1
-
16
-
-
0017495002
-
An extension of the Shannon theory approach to cryptography
-
Mar.
-
M. E. Hellman, "An extension of the Shannon theory approach to cryptography," IEEE Trans. Inf. Theory, vol. IT-23, no. 2, pp. 289294, Mar. 1977.
-
(1977)
IEEE Trans. Inf. Theory
, vol.IT-23
, Issue.2
, pp. 289294
-
-
Hellman, M.E.1
-
17
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Sys. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Sys. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
18
-
-
84873885571
-
New results on multipleinput multiple-output broadcast channels with confidential messages
-
Mar.
-
R. Liu, T. Liu, H. V. Poor, and S. Shamai, "New results on multipleinput multiple-output broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 59, no. 3, pp. 1346-1359, Mar. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.3
, pp. 1346-1359
-
-
Liu, R.1
Liu, T.2
Poor, H.V.3
Shamai, S.4
-
19
-
-
39049144353
-
Secrecy capacity of wireless channels
-
Seattle, July
-
J. Barros and M. R. D. Rodrigues, "Secrecy capacity of wireless channels," in Proc. IEEE ISIT, Seattle, July 2006.
-
(2006)
Proc. IEEE ISIT
-
-
Barros, J.1
Rodrigues, M.R.D.2
-
20
-
-
33750056552
-
Almost independence and secrecy capacity
-
Jan.-Mar.
-
I. Csisz̀ar, "Almost independence and secrecy capacity," Prob. Inf. Trans., vol. 32, no. 1, pp. 40-47, Jan.-Mar. 1996.
-
(1996)
Prob. Inf. Trans.
, vol.32
, Issue.1
, pp. 40-47
-
-
Csisz̀ar, I.1
-
21
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
22
-
-
84906653369
-
Nonasymptotic estimates for efficiency of code jamming in a wire-tap channel
-
V. I. Korzhik and V. A. Yakovlev, "Nonasymptotic estimates for efficiency of code jamming in a wire-tap channel," Problemy Peredachi Informatsii (USSR), vol. 17, no. 4, pp. 11-18, 1981.
-
(1981)
Problemy Peredachi Informatsii (USSR)
, vol.17
, Issue.4
, pp. 11-18
-
-
Korzhik, V.I.1
Yakovlev, V.A.2
-
23
-
-
0017495724
-
A note on Wyner's wiretap channel
-
May
-
A. B. Carleial and M. Hellman, "A note on Wyner's wiretap channel," IEEE Trans. Inf. Theory, vol. 23, no. 5, pp. 625-627, May 1977.
-
(1977)
IEEE Trans. Inf. Theory
, vol.23
, Issue.5
, pp. 625-627
-
-
Carleial, A.B.1
Hellman, M.2
-
24
-
-
0017996501
-
The Gaussian wire-tap channel
-
July
-
S. L. Y. Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Cheong, S.L.Y.1
Hellman, M.2
-
25
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csisz̀ar and J. K̈orner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csisz̀ar, I.1
K̈orner, J.2
-
26
-
-
33646073724
-
An achievable region for the Gaussian wiretap channel with side information
-
May
-
C. Mitrpant, A. J. Vinck,and L. Yuan, "An achievable region for the Gaussian wiretap channel with side information," IEEE Trans. Inf. Theory, vol. 52, no. 5, pp. 2181-2190, May 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.5
, pp. 2181-2190
-
-
Mitrpant, C.1
Vinckand, A.J.2
Yuan, L.3
-
27
-
-
85017588958
-
Wire-tap channel II
-
Paris
-
L. H. Ozarow and A. D. Wyner, "Wire-tap channel II," in Proc. Eurocrypt, Workshop on Advances in Cryptology, pp. 33-51, Paris, 1985.
-
(1985)
Proc. Eurocrypt, Workshop on Advances in Cryptology
, pp. 33-51
-
-
Ozarow, L.H.1
Wyner, A.D.2
-
28
-
-
84940653858
-
An opportunistic physical-layer approach to secure wireless communications
-
Monticello Sep.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "An opportunistic physical-layer approach to secure wireless communications," Proc. Allerton Conf., Monticello, Sep. 2006.
-
(2006)
Proc. Allerton Conf.
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
29
-
-
45249085230
-
Secret communication with a fading eavesdropper channel
-
Nice, July
-
Z. Li, R. Yates, and W. Trappe, "Secret communication with a fading eavesdropper channel," in Proc. IEEE ISIT, Nice, July 2007.
-
(2007)
Proc. IEEE ISIT
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
30
-
-
84873166675
-
Gaussian wiretap channel with a batteryless energy harvesting transmitter
-
Lausanne, Switzerland, Sep.
-
O. Ozel, E. Ekrem and S. Ulukus, "Gaussian wiretap channel with a batteryless energy harvesting transmitter," in Proc. IEEE Inf. Theory Workshop, Lausanne, Switzerland, Sep. 2012.
-
(2012)
Proc. IEEE Inf. Theory Workshop
-
-
Ozel, O.1
Ekrem, E.2
Ulukus, S.3
-
31
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels", IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.1
Lai, L.2
El Gamal, H.3
-
32
-
-
73449104694
-
Compound wiretap channels
-
Y. Liang, G. Kramer, H. V. Poor, and S. Shamai, "Compound wiretap channels," EURASIP J. Wireless Commun. Netw., 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw.
-
-
Liang, Y.1
Kramer, G.2
Poor, H.V.3
Shamai, S.4
-
33
-
-
0347337828
-
Secure space-time communication
-
Dec.
-
A. Hero, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero, A.1
-
34
-
-
33749450172
-
Secrecy capacity of SIMO and slow fading channels
-
Adelaide
-
P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE ISIT, Adelaide, 2005.
-
(2005)
Proc. IEEE ISIT
-
-
Parada, P.1
Blahut, R.2
-
35
-
-
44049095075
-
Secret communication via multiantenna transmission
-
Mar.
-
Z. Li, W. Trappe, and R. Yates, "Secret communication via multiantenna transmission," in Proc. CISS, Mar. 2007.
-
(2007)
Proc. CISS
-
-
Li, Z.1
Trappe, W.2
Yates, R.3
-
36
-
-
51649110931
-
Achievable rates in Gaussian MISO channels with secrecy constraints
-
Nice, France, June
-
S. Shafiee and S. Ulukus, "Achievable rates in Gaussian MISO channels with secrecy constraints," in Proc. IEEE ISIT, Nice, France, June 2007.
-
(2007)
Proc. IEEE ISIT
-
-
Shafiee, S.1
Ulukus, S.2
-
37
-
-
69449086815
-
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel
-
Sep.
-
S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4033-4039, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.9
, pp. 4033-4039
-
-
Shafiee, S.1
Liu, N.2
Ulukus, S.3
-
38
-
-
51649117832
-
On the Gaussian MIMO wiretap channel
-
June
-
A. Khisti, G. Wornell, A. Wiesel, and Y. Eldar, "On the Gaussian MIMO wiretap channel," in Proc. IEEE Int. Symp. on Inf. Theory, pp. 2471-2475, June 2007.
-
(2007)
Proc. IEEE Int. Symp. on Inf. Theory
, pp. 2471-2475
-
-
Khisti, A.1
Wornell, G.2
Wiesel, A.3
Eldar, Y.4
-
40
-
-
84931425598
-
Secret communication using artificial noise
-
Dallas Sept.
-
R. Negi and S. Goel, "Secret communication using artificial noise," in Proc. IEEE Veh. Tech. Conf., vol. 3, pp. 1906-1910, Dallas, Sept. 2005.
-
(2005)
Proc. IEEE Veh. Tech. Conf.
, vol.3
, pp. 1906-1910
-
-
Negi, R.1
Goel, S.2
-
41
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
June
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
42
-
-
77953802876
-
Secure transmission with multiple antennas I: The MISOME wiretap channel
-
July
-
A. Khisti and G. Wornell, "Secure transmission with multiple antennas I: the MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, July 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.2
-
43
-
-
77958560746
-
Secure transmission with multiple antennas II: The MIMOME wiretap channel
-
Nov.
-
A. Khisti and G. Wornell, "Secure transmission with multiple antennas II: the MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.2
-
44
-
-
70449597938
-
Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels
-
Perugia June
-
A. Mukherjee and A. L. Swindlehurst, "Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels," in Proc. IEEE SPAWC, pp. 344-348, Perugia, June 2009.
-
(2009)
Proc. IEEE SPAWC
, pp. 344-348
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
45
-
-
84883395475
-
Spatially selective artificial-noise aided transmit optimization for MISO multi-Eves secrecy rate maximization
-
May
-
Q. Li and W.-K. Ma, "Spatially selective artificial-noise aided transmit optimization for MISO multi-Eves secrecy rate maximization," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2704-2717, May 2013.
-
(2013)
IEEE Trans. Signal Process
, vol.61
, Issue.10
, pp. 2704-2717
-
-
Li, Q.1
Ma, W.-K.2
-
46
-
-
84883698532
-
On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels
-
Sep.
-
P.-H. Lin S.-H. Lai, S.-C. Lin, and H.-J. Su, "On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1728-1740, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1728-1740
-
-
Lin, S.-H.1
Lai, P.-H.2
Lin, S.-C.3
Su, H.-J.4
-
47
-
-
66949180834
-
A note on the secrecy capacity of the multipleantenna wiretap channel
-
June
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, June 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
48
-
-
77953222550
-
On the relationship between the multi-antenna secrecy communications and cognitive radio communications
-
June
-
L. Zhang, R. Zhang, Y. Liang, Y. Xin, and S. Cui, "On the relationship between the multi-antenna secrecy communications and cognitive radio communications," IEEE Trans. Commun. vol. 58, no. 6, pp. 1877-1886, June 2010.
-
(2010)
IEEE Trans. Commun.
, vol.58
, Issue.6
, pp. 1877-1886
-
-
Zhang, L.1
Zhang, R.2
Liang, Y.3
Xin, Y.4
Cui, S.5
-
49
-
-
79951762516
-
Transmitter optimization for achieving secrecy capacity in Gaussian MIMO wiretap channels
-
[Online]. Available
-
J. Li and A. Petropulu, "Transmitter optimization for achieving secrecy capacity in Gaussian MIMO wiretap channels," submitted to IEEE Trans. Inf. Theory, 2010[Online]. Available: http://arxiv.org/abs/0909.2622v1.
-
(2010)
IEEE Trans. Inf. Theory
-
-
Li, J.1
Petropulu, A.2
-
50
-
-
69249208566
-
An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel
-
R. Bustin, R. Liu, H. V. Poor, and S. Shamai, "An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel," EURASIP Journ. Wireless Commun. Network., 2009.
-
(2009)
EURASIP Journ. Wireless Commun. Network.
-
-
Bustin, R.1
Liu, R.2
Poor, H.V.3
Shamai, S.4
-
51
-
-
77955721830
-
Multiple-input multipleoutput Gaussian broadcast channels with confidential messages
-
Sep.
-
R. Liu, T. Liu, H. V. Poor, and S. Shamai, "Multiple-input multipleoutput Gaussian broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4215-4227, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.9
, pp. 4215-4227
-
-
Liu, R.1
Liu, T.2
Poor, H.V.3
Shamai, S.4
-
53
-
-
84877752784
-
Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint
-
May
-
S. A. A. Fakoorian and A. L. Swindlehurst, "Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2620-2631, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2620-2631
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
54
-
-
84867524245
-
On optimal signaling over secure MIMO channels
-
Boston
-
S. Loyka and C. D. Charalambous, "On optimal signaling over secure MIMO channels," in Proc. IEEE ISIT, Boston, 2012.
-
(2012)
Proc. IEEE ISIT
-
-
Loyka, S.1
Charalambous, C.D.2
-
55
-
-
70349223815
-
Fixed SINR solutions for the MIMO wiretap channel
-
Taipei Apr.
-
A. L. Swindlehurst, "Fixed SINR solutions for the MIMO wiretap channel," in Proc. IEEE ICASSP, pp. 2437-2440, Taipei, Apr. 2009.
-
(2009)
Proc. IEEE ICASSP
, pp. 2437-2440
-
-
Swindlehurst, A.L.1
-
56
-
-
85032751776
-
Enhancing physicallayer secrecy in multiantenna wireless systems: An overview of signal processing approaches
-
Sep.
-
Y.-W .P. Hong, L. Pang-Chang, and C.-C. J. Kuo, "Enhancing physicallayer secrecy in multiantenna wireless systems: An overview of signal processing approaches," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 29-40, Sep. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.5
, pp. 29-40
-
-
Hong, P.Y.-W.1
Pang-Chang, L.2
Kuo, C.-C.J.3
-
57
-
-
70649102349
-
Physical layer security with artificial noise: Secrecy capacity and optimal power allocation
-
Omaha, NE Sept.
-
X. Zhou and M. R. McKay, "Physical layer security with artificial noise: Secrecy capacity and optimal power allocation", in Proc. Int. Conf. on Sig. Proc. and Commun. Syst., Omaha, NE, Sept. 2009.
-
(2009)
Proc. Int. Conf. on Sig. Proc. and Commun. Syst.
-
-
Zhou, X.1
McKay, M.R.2
-
58
-
-
84855381750
-
Outage probability based power distribution between data and artificial noise for physical layer security
-
Feb.
-
N. Romero-Zurita, M. Ghogho, and D. McLernon, "Outage probability based power distribution between data and artificial noise for physical layer security," IEEE Signal Process. Lett., vol. 19, no. 2, pp. 71-74, Feb. 2012.
-
(2012)
IEEE Signal Process. Lett.
, vol.19
, Issue.2
, pp. 71-74
-
-
Romero-Zurita, N.1
Ghogho, M.2
McLernon, D.3
-
59
-
-
84875740929
-
PHY layer security based on protected zone and artificial noise
-
May
-
N. Romero-Zurita, D. McLernon, M. Ghogho, and A. Swami, "PHY layer security based on protected zone and artificial noise," IEEE Signal Process. Lett., vol. 20, no. 5, pp. 487-490, May 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.5
, pp. 487-490
-
-
Romero-Zurita, N.1
McLernon, D.2
Ghogho, M.3
Swami, A.4
-
60
-
-
84858390705
-
Secrecy outage in MISO systems with partial channel information
-
Apr.
-
S. Gerbracht, C. Scheunert, and E. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 704-716, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 704-716
-
-
Gerbracht, S.1
Scheunert, C.2
Jorswieck, E.3
-
61
-
-
84867563712
-
Optimal power allocation for GSVD-based beamforming in the MIMO wiretap channel
-
Boston, MA
-
S. A. Fakoorian and A. L. Swindlehurst, "Optimal power allocation for GSVD-based beamforming in the MIMO wiretap channel," in Proc. IEEE ISIT, pp. 2321-2325, Boston, MA, 2012.
-
(2012)
Proc. IEEE ISIT
, pp. 2321-2325
-
-
Fakoorian, S.A.1
Swindlehurst, A.L.2
-
62
-
-
79960399745
-
Robust beamforming for secrecy in MIMO wiretap channels with imperfect CSI
-
Jan.
-
A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for secrecy in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
63
-
-
70449517090
-
On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise
-
Seoul
-
Y.-L. Liang, Y. Wang, T. Chang, Y.-W. P. Hong, and C. Chi, "On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise ," in Proc. IEEE ISIT, pp. 2351-2355, Seoul, 2009.
-
(2009)
Proc. IEEE ISIT
, pp. 2351-2355
-
-
Liang, Y.-L.1
Wang, Y.2
Chang, T.3
Hong, Y.-W.P.4
Chi, C.5
-
64
-
-
84861324114
-
On the ergodic secrecy capacity of the wiretap channel under imperfect main channel estimation
-
Pacific Grove, CA, Nov.
-
Z. Rezki, A. Khisti, and M.-S. Alouini, "On the ergodic secrecy capacity of the wiretap channel under imperfect main channel estimation," in Proc. 45th Asilomar Conf., pp. 952-957, Pacific Grove, CA, Nov. 2011.
-
(2011)
Proc. 45th Asilomar Conf.
, pp. 952-957
-
-
Rezki, Z.1
Khisti, A.2
Alouini, M.-S.3
-
65
-
-
84867536137
-
On the ergodic secret message capacity of the wiretap channel with finite rate feedback
-
Boston
-
-, "On the ergodic secret message capacity of the wiretap channel with finite rate feedback," in Proc. IEEE ISIT, Boston, 2012.
-
(2012)
Proc. IEEE ISIT
-
-
Rezki, Z.1
Khisti, A.2
Alouini, M.-S.3
-
66
-
-
84903554995
-
Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper to appear
-
Available: Early Access
-
K. Cumanan, Z. Ding, B. Sharif, G. Y. Tian, and K. K. Leung, "Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper," to appear, IEEE Trans. Veh. Technol., 2014. Available: Early Access.
-
(2014)
IEEE Trans. Veh. Technol.
-
-
Cumanan, K.1
Ding, Z.2
Sharif, B.3
Tian, G.Y.4
Leung, K.K.5
-
67
-
-
84883175353
-
Twoway training for discriminatory channel estimation in wireless MIMO systems
-
May
-
C.-W. Huang, T.-H. Chang, X. Zhou, and Y.-W. Peter Hong, "Twoway training for discriminatory channel estimation in wireless MIMO systems," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2724-2738, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2724-2738
-
-
Huang, C.-W.1
Chang, T.-H.2
Zhou, X.3
Peter Hong, Y.-W.4
-
68
-
-
84880560795
-
Filter design with secrecy constraints: The MIMO Gaussian wiretap channel
-
Aug.
-
H. Reboredo, J. Xavier, and M. R. D. Rodrigues, "Filter design with secrecy constraints: The MIMO Gaussian wiretap channel," IEEE Trans. Signal Process., vol. 61, no. 15, pp. 3799-3814, Aug. 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.15
, pp. 3799-3814
-
-
Reboredo, H.1
Xavier, J.2
Rodrigues, M.R.D.3
-
69
-
-
84881111045
-
Practical secrecy using artificial noise
-
July
-
S. Liu, Y. Hong, and E. Viterbo, "Practical secrecy using artificial noise," IEEE Commun. Lett., vol. 17, no. 7, pp. 1483-1486, July 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.7
, pp. 1483-1486
-
-
Liu, S.1
Hong, Y.2
Viterbo, E.3
-
71
-
-
69949115171
-
On the secrecy capacity of frequencyselective fading channels: A practical Vandermonde precoding
-
M Kobayashi and M. Debbah, "On the secrecy capacity of frequencyselective fading channels: A practical Vandermonde precoding," in Proc. IEEE 19th PIMRC, 2008.
-
(2008)
Proc. IEEE 19th PIMRC
-
-
Kobayashi, M.1
Debbah, M.2
-
72
-
-
84863913546
-
Physical-layer secrecy for OFDM Transmissions over fading channels
-
Aug.
-
F. Renna, N. Laurenti, and H. V. Poor, "Physical-layer secrecy for OFDM Transmissions over fading channels," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1354-1367, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.4
, pp. 1354-1367
-
-
Renna, F.1
Laurenti, N.2
Poor, H.V.3
-
73
-
-
80051720840
-
Ergodic secrecy rate for multiple-antenna wiretap channels with Rician fading
-
Sep.
-
J. Li and A. Petropulu, "Ergodic secrecy rate for multiple-antenna wiretap channels with Rician fading,"IEEE Trans. Inf Forensics Security, vol. 6, no. 3, Part 1, pp. 861-867, Sep. 2011.
-
(2011)
IEEE Trans. Inf Forensics Security
, vol.6
, Issue.3 PART 1
, pp. 861-867
-
-
Li, J.1
Petropulu, A.2
-
75
-
-
79956205910
-
Maximal ratio diversity combining enhanced security
-
May
-
F. He, H. Man, and W. Wang, "Maximal ratio diversity combining enhanced security," IEEE Commun. Lett., vol. 15, no. 5, pp. 509-511, May 2011.
-
(2011)
IEEE Commun. Lett.
, vol.15
, Issue.5
, pp. 509-511
-
-
He, F.1
Man, H.2
Wang, W.3
-
76
-
-
84873731253
-
Transmit antenna selection for security enhancement in MIMO wiretap channels
-
Jan.
-
N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels," IEEE Trans. Commun., vol. 61, no. 1, pp. 144-154, Jan. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.1
, pp. 144-154
-
-
Yang, N.1
Yeoh, P.L.2
Elkashlan, M.3
Schober, R.4
Collings, I.B.5
-
77
-
-
84860863805
-
Performance of transmit antenna selection physical layer security schemes
-
June
-
H. Alves, R. D. Souza, M. Debbah, and M. Bennis, "Performance of transmit antenna selection physical layer security schemes," IEEE Signal Process. Lett., vol. 19, no. 6, pp. 372-375, June 2012.
-
(2012)
IEEE Signal Process. Lett.
, vol.19
, Issue.6
, pp. 372-375
-
-
Alves, H.1
Souza, R.D.2
Debbah, M.3
Bennis, M.4
-
78
-
-
84878730663
-
Effects of outdated CSI on the secrecy performance of MISO wiretap channels with transmit antenna selection
-
May
-
N. S. Ferdinand, D. B. da Costa, and M. Latva-aho, "Effects of outdated CSI on the secrecy performance of MISO wiretap channels with transmit antenna selection," IEEE Commun. Lett., vol. 17, no. 5, pp. 864-867, May 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.5
, pp. 864-867
-
-
Ferdinand, N.S.1
Da Costa, D.B.2
Latva-Aho, M.3
-
79
-
-
84867619190
-
Detecting passive eavesdroppers in the MIMO wiretap channel
-
Kyoto, Japan, Mar.
-
A. Mukherjee and A. L. Swindlehurst, "Detecting passive eavesdroppers in the MIMO wiretap channel," in Proc. IEEE ICASSP, pp. 2809-2812, Kyoto, Japan, Mar. 2012.
-
(2012)
Proc. IEEE ICASSP
, pp. 2809-2812
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
80
-
-
84861327707
-
A full-duplex active eavesdropper in MIMO wiretap channels: Construction and countermeasures
-
Pacific Grove, CA
-
A. Mukherjee and A. L. Swindlehurst, "A full-duplex active eavesdropper in MIMO wiretap channels: Construction and countermeasures," in Proc. 45th Asilomar Conf., Pacific Grove, CA, 2011.
-
(2011)
Proc. 45th Asilomar Conf.
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
81
-
-
45249119255
-
Secure communication over fading channels
-
June
-
Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
82
-
-
77958520866
-
Multiple-input multiple-output Gaussian broadcast channels with common and confidential messages
-
Nov.
-
H. D. Ly, T. Liu, and Y. Liang, "Multiple-input multiple-output Gaussian broadcast channels with common and confidential messages," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5477-5487, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5477-5487
-
-
Ly, H.D.1
Liu, T.2
Liang, Y.3
-
83
-
-
33748578624
-
The capacity region of the Gaussian multiple-input multiple-output broadcast channel
-
DOI 10.1109/TIT.2006.880064
-
H. Weingarten, Y. Steinberg, and S. Shamai, "The capacity region of the Gaussian multiple-input multiple-output broadcast channel," IEEE Trans. Inf. Theory, vol. 52, no. 9, pp. 3936-3964, Sep. 2006. (Pubitemid 44363826)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.9
, pp. 3936-3964
-
-
Weingarten, H.1
Steinberg, Y.2
Shamai, S.3
-
84
-
-
45249090083
-
Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
-
June
-
R. Liu, I. Maric, P. Spasojevic, and R. D. Yates, "Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2512, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2493-2512
-
-
Liu, R.1
Maric, I.2
Spasojevic, P.3
Yates, R.D.4
-
85
-
-
62749109096
-
Secrecy capacity region of a multiple-antenna Gaussian broadcast channel with confidential messages
-
Mar.
-
R. Liu and H. V. Poor, "Secrecy capacity region of a multiple-antenna Gaussian broadcast channel with confidential messages," IEEE Trans. Inf. Theory, vol. 55, no. 3, pp. 1235-1249, Mar. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.3
, pp. 1235-1249
-
-
Liu, R.1
Poor, H.V.2
-
86
-
-
77955683763
-
MIMO Gaussian broadcast channels with confidential and common messages
-
Texas, U.S.A., June
-
R. Liu, T. Liu, H. V. Poor, and S. Shamai, "MIMO Gaussian broadcast channels with confidential and common messages," in Proc. IEEE Int. Symp. Information Theory, Texas, U.S.A., June 2010, pp. 2578-2582.
-
(2010)
Proc. IEEE Int. Symp. Information Theory
, pp. 2578-2582
-
-
Liu, R.1
Liu, T.2
Poor, H.V.3
Shamai, S.4
-
87
-
-
45249092485
-
Secure broadcasting over fading channels
-
June
-
A. Khisti, A. Tchamkerten, and G. Wornell, "Secure broadcasting over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453-2469, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2453-2469
-
-
Khisti, A.1
Tchamkerten, A.2
Wornell, G.3
-
88
-
-
84876775276
-
The secrecy capacity region of the Gaussian MIMO broadcast channel
-
May
-
G. Bagherikaram, A. S. Motahari and A. K. Khandani, "The secrecy capacity region of the Gaussian MIMO broadcast channel," IEEE Trans. Inf. Theory, vol. 59, no. 5, pp. 2673-2682, May 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.5
, pp. 2673-2682
-
-
Bagherikaram, G.1
Motahari, A.S.2
Khandani, A.K.3
-
89
-
-
79952846257
-
The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel
-
Apr.
-
E. Ekrem and S. Ulukus, "The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 2083-2114, Apr. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.4
, pp. 2083-2114
-
-
Ekrem, E.1
Ulukus, S.2
-
90
-
-
77950269477
-
A vector generalization of Costa's entropy-power inequality with applications
-
Apr.
-
R. Liu, T. Liu, H. V. Poor, and S. Shamai, "A vector generalization of Costa's entropy-power inequality with applications," IEEE Trans. Inf. Theory, vol. 56, no. 4, pp. 1865-1879, Apr. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.4
, pp. 1865-1879
-
-
Liu, R.1
Liu, T.2
Poor, H.V.3
Shamai, S.4
-
91
-
-
84860234449
-
Three-receiver broadcast channels with common and confidential messages
-
May
-
Y. K. Chia and A. El Gamal, Three-receiver broadcast channels with common and confidential messages, IEEE Trans. Inf. Theory, vol. 58, no. 5, pp. 2748-2765, May 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.5
, pp. 2748-2765
-
-
Chia, Y.K.1
El Gamal, A.2
-
92
-
-
84879973839
-
One-receiver twoeavesdropper broadcast channel with degraded message sets
-
July
-
S. Salehkalaibar, M. Mirmohseni, and M. R. Aref, "One-receiver twoeavesdropper broadcast channel with degraded message sets," IEEE Trans. Inf. Forensics Security, vol. 8, no. 7, pp. 1162-1172, July 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.7
, pp. 1162-1172
-
-
Salehkalaibar, S.1
Mirmohseni, M.2
Aref, M.R.3
-
93
-
-
77949575243
-
Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels
-
Oct.
-
A. Mukherjee and A. L. Swindlehurst, "Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels," in Proc. of 47th Allerton Conf., Oct. 2009.
-
(2009)
Proc. of 47th Allerton Conf.
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
94
-
-
78049413969
-
Joint transmit beamforming and artificial noise design for QoS discrimination in wireless downlink
-
Dallas, TX, Mar.
-
W. Liao, T. Chang, W. Ma, and C. Chi, "Joint transmit beamforming and artificial noise design for QoS discrimination in wireless downlink," in Proc. IEEE ICASSP, pp. 256-2565, Dallas, TX, Mar. 2010.
-
(2010)
Proc. IEEE ICASSP
, pp. 256-2565
-
-
Liao, W.1
Chang, T.2
Ma, W.3
Chi, C.4
-
95
-
-
84863941590
-
Energy-efficient resource allocation for secure OFDMA systems
-
July
-
D. Ng, E. S. Lo, and R. Schober, "Energy-efficient resource allocation for secure OFDMA systems," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2572-2584, July 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.6
, pp. 2572-2584
-
-
Ng, D.1
Lo, E.S.2
Schober, R.3
-
96
-
-
84883393923
-
On the optimality of linear precoding for secrecy in the MIMO broadcast channel
-
Sep.
-
S. A. A. Fakoorian and A. L. Swindlehurst, "On the optimality of linear precoding for secrecy in the MIMO broadcast channel," IEEE J. Selected Areas Commun., vol. 31, no. 9, pp. 1701-1713, Sep. 2013.
-
(2013)
IEEE J. Selected Areas Commun.
, vol.31
, Issue.9
, pp. 1701-1713
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
97
-
-
84857202295
-
Dirty paper coding versus linear GSVD-based precoding in MIMO broadcast channel with confidential messages
-
S. A. A. Fakoorian and A. L. Swindlehurst, "Dirty paper coding versus linear GSVD-based precoding in MIMO broadcast channel with confidential messages," in Proc. IEEE GLOBECOM, 2011.
-
(2011)
Proc. IEEE GLOBECOM
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
98
-
-
84870563576
-
Secrecy sumrates for multi-user MIMO regularized channel inversion precoding
-
Nov.
-
G. Geraci, M. Egan, J. Yuan, A. Razi, and I. B. Collings, "Secrecy sumrates for multi-user MIMO regularized channel inversion precoding," IEEE Trans. Commun., vol. 60, no. 11, pp. 3472-3482, Nov. 2012.
-
(2012)
IEEE Trans. Commun.
, vol.60
, Issue.11
, pp. 3472-3482
-
-
Geraci, G.1
Egan, M.2
Yuan, J.3
Razi, A.4
Collings, I.B.5
-
99
-
-
84906719602
-
-
[Online].Available
-
G. Geraci, R. Couillet, J. Yuan, M. Debbah, and I. B. Collings, " Large system analysis of linear precoding in MISO broadcast channels with confidential messages," 2013[Online]. Available: http://arxiv.org/abs/1304. 5850
-
(2013)
Large System Analysis of Linear Precoding in MISO Broadcast Channels with Confidential Messages
-
-
Geraci, G.1
Couillet, R.2
Yuan, J.3
Debbah, M.4
Collings, I.B.5
-
100
-
-
84880139479
-
Linear precoding for broadcast channels with confidential messages under transmit-side channel correlation
-
June
-
G. Geraci, A. Y. Al-nahari, J. Yuan, and I. B. Collings, "Linear precoding for broadcast channels with confidential messages under transmit-side channel correlation," IEEE Commun. Lett., vol. 17, no. 6, pp. 1164-1167, June 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.6
, pp. 1164-1167
-
-
Geraci, G.1
Al-Nahari, A.Y.2
Yuan, J.3
Collings, I.B.4
-
101
-
-
84906663333
-
-
[Online].Available
-
G. Geraci, S. Singh, J. G. Andrews, J. Yuan, and I. B. Collings, "Secrecy rates in the broadcast channel with confidential messages and external eavesdroppers," 2013[Online]. Available: http://arxiv.org/abs/ 1306.2101v1
-
(2013)
Secrecy Rates in the Broadcast Channel with Confidential Messages and External Eavesdroppers
-
-
Geraci, G.1
Singh, S.2
Andrews, J.G.3
Yuan, J.4
Collings, I.B.5
-
102
-
-
77953867654
-
User selection in multiuser MIMO systems with secrecy considerations
-
Pacific Grove, CA Nov.
-
A. Mukherjee and A. L. Swindlehurst, "User selection in multiuser MIMO systems with secrecy considerations," in Proc. Asilomar Conf., Pacific Grove, CA, Nov. 2009.
-
(2009)
Proc. Asilomar Conf.
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
104
-
-
78649600738
-
User selection scheme with secrecy capacity between other users in MIMO downlink systems
-
Honolulu, USA, Aug.-Sep.
-
M. Yanase and T. Ohtsuki, "User selection scheme with secrecy capacity between other users in MIMO downlink systems," in Proc. IEEE Int. Conf. Wireless Information Technol.and Syst., Honolulu, USA, Aug.-Sep. 2010.
-
(2010)
Proc. IEEE Int. Conf. Wireless Information Technol.And Syst.
-
-
Yanase, M.1
Ohtsuki, T.2
-
105
-
-
77954973670
-
User selection scheme with secrecy capacity in MIMO downlink systems
-
Elsevier
-
M. Yanase and T. Ohtsuki, "User selection scheme with secrecy capacity in MIMO downlink systems," Procedia Social and Behavioral Sciences, Elsevier, vol. 2, issue 1, pp. 161-170, 2010.
-
(2010)
Procedia Social and Behavioral Sciences
, vol.2
, Issue.1
, pp. 161-170
-
-
Yanase, M.1
Ohtsuki, T.2
-
106
-
-
84872279928
-
Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling
-
Feb.
-
I. Krikidis and B. Ottersten, "Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling," IEEE Signal Process. Lett., vol. 20, no. 2, pp. 141-144, Feb. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.2
, pp. 141-144
-
-
Krikidis, I.1
Ottersten, B.2
-
107
-
-
84893766010
-
On ergodic secrecy rate for MISO wiretap broadcast channels with opportunistic scheduling to appear
-
[Online].Available: Early Access
-
M. Pei, A. L. Swindlehurst, D. Ma, and J.Wei, "On ergodic secrecy rate for MISO wiretap broadcast channels with opportunistic scheduling," to appear, IEEE Commmun. Lett., 2014[Online]. Available: Early Access.
-
(2014)
IEEE Commmun. Lett.
-
-
Pei, M.1
Swindlehurst, A.L.2
Ma, D.3
Wei, J.4
-
108
-
-
39049089566
-
The discrete memoryless multiple access channel with confidential messages
-
Seattle, WA, Jul. 9-14
-
R. Liu, I. Maric, R. D. Yates, and P. Spasojevic, "The discrete memoryless multiple access channel with confidential messages," in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, Jul. 9-14, 2006.
-
(2006)
Proc. IEEE Int. Symp. Inf. Theory
-
-
Liu, R.1
Maric, I.2
Yates, R.D.3
Spasojevic, P.4
-
109
-
-
40949147785
-
Multiple-access channels with confidential messages
-
DOI 10.1109/TIT.2007.915978
-
Y. Liang and H. V. Poor, "Multiple-access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008. (Pubitemid 351410914)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.3
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
110
-
-
57349093480
-
The Gaussian multiple access wire-tap channel
-
Dec.
-
E. Tekin and A. Yener, "The Gaussian multiple access wire-tap channel," IEEE Trans. Inf. Theory, vol. 54, no. 12, pp. 5747-5755, Dec. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.12
, pp. 5747-5755
-
-
Tekin, E.1
Yener, A.2
-
111
-
-
45249101530
-
The general Gaussian multiple access and twoway wire-tap channels: Achievable rates and cooperative jamming
-
June
-
E. Tekin and A. Yener, "The general Gaussian multiple access and twoway wire-tap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
112
-
-
77955729519
-
Correction to: The Gaussian multiple access wire-tap channel and "the general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming
-
Sep.
-
-, "Correction to: The Gaussian multiple access wire-tap channel and "The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming"," IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4762-4763, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.9
, pp. 4762-4763
-
-
Tekin, E.1
Yener, A.2
-
113
-
-
79961002510
-
Fading cognitive multiple-access channels with confidential messages
-
Aug.
-
R. Liu, Y. Liang and H. V. Poor, "Fading cognitive multiple-access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4992-5005, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4992-5005
-
-
Liu, R.1
Liang, Y.2
Poor, H.V.3
-
114
-
-
61349186445
-
Capacity of cognitive interference channels with and without secrecy
-
Feb.
-
Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai, and S. Verdu, "Capacity of cognitive interference channels with and without secrecy," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 604-619, Feb. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.2
, pp. 604-619
-
-
Liang, Y.1
Somekh-Baruch, A.2
Poor, H.V.3
Shamai, S.4
Verdu, S.5
-
115
-
-
77249094590
-
On the location of an eavesdropper in multiterminal networks
-
Mar.
-
S. Anand and R. Chandramouli, "On the location of an eavesdropper in multiterminal networks," IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 148-157, Mar. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.1
, pp. 148-157
-
-
Anand, S.1
Chandramouli, R.2
-
116
-
-
48849113556
-
Interference alignment and degrees of freedom of the K-User interference channel
-
Aug.
-
V. R. Cadambe and S. A. Jafar, "Interference alignment and degrees of freedom of the K-User interference channel," IEEE Trans. Inf. Theory, vol. 54, no. 8, pp. 3425-3441, Aug. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.8
, pp. 3425-3441
-
-
Cadambe, V.R.1
Jafar, S.A.2
-
117
-
-
52349105722
-
On the secure degrees of freedom in the K-user Gaussian interference channel
-
July
-
O. Koyluoglu, H. El Gamal, L. Lai, and H. V. Poor, "On the secure degrees of freedom in the K-user Gaussian interference channel," in Proc. IEEE ISIT, pp. 384-388, July 2008.
-
(2008)
Proc. IEEE ISIT
, pp. 384-388
-
-
Koyluoglu, O.1
El Gamal, H.2
Lai, L.3
Poor, H.V.4
-
118
-
-
79957667257
-
Interference alignment for secrecy
-
O. O. Koyluoglu, H. El Gamal, L. Lai, and H. V. Poor, "Interference alignment for secrecy," IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. 3323-3332, 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.6
, pp. 3323-3332
-
-
Koyluoglu, O.O.1
El Gamal, H.2
Lai, L.3
Poor, H.V.4
-
119
-
-
77950684549
-
K-user interference channels: Achievable secrecy rate and degrees of freedom
-
Greece June
-
X. He and A. Yener, "K-user interference channels: Achievable secrecy rate and degrees of freedom," in Proc. ITW, Greece, June 2009.
-
(2009)
Proc. ITW
-
-
He, X.1
Yener, A.2
-
120
-
-
84890353615
-
Secure degrees of freedom of the Gaussian multiple access wiretap channel
-
Istanbul, Turkey
-
J. Xie and S. Ulukus, "Secure degrees of freedom of the Gaussian multiple access wiretap channel," in Proc. IEEE ISIT, pp. 1337-1341, Istanbul, Turkey, 2013.
-
(2013)
Proc. IEEE ISIT
, pp. 1337-1341
-
-
Xie, J.1
Ulukus, S.2
-
121
-
-
84881483763
-
Secure degrees of freedom of the Gaussian wiretap channel with helpers and no eavesdropper CSI: Blind cooperative jamming
-
Baltimore MD
-
J. Xie and S. Ulukus, "Secure degrees of freedom of the Gaussian wiretap channel with helpers and no eavesdropper CSI: Blind cooperative jamming," in Proc. 47th CISS, Baltimore, MD, 2013.
-
(2013)
Proc. 47th CISS
-
-
Xie, J.1
Ulukus, S.2
-
122
-
-
64549088012
-
On the secure degrees of freedom of wireless X networks
-
Monticello IL
-
T. Gou and S. A. Jafar, "On the secure degrees of freedom of wireless X networks," in Proc. Allerton Conf., Monticello, IL, 2008.
-
(2008)
Proc. Allerton Conf.
-
-
Gou, T.1
Jafar, S.A.2
-
123
-
-
84978483855
-
Secrecy rate region of MISO interference channel: Pareto boundary and non-cooperative games
-
E. A. Jorswieck and R. Mochaourab, "Secrecy rate region of MISO interference channel: Pareto boundary and non-cooperative games," in Proc. WSA, 2009.
-
(2009)
Proc. WSA
-
-
Jorswieck, E.A.1
Mochaourab, R.2
-
125
-
-
80051719720
-
MIMO interference channel with confidential messages: Achievable secrecy rates and beamforming design
-
Sep.
-
-, "MIMO interference channel with confidential messages: achievable secrecy rates and beamforming design," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 640-649, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 640-649
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
126
-
-
84897691707
-
Competing for secrecy in the MISO interference channel
-
Jan.
-
-, "Competing for secrecy in the MISO interference channel," IEEE Trans. Signal. Process., vol. 61, no. 1, pp. 170-181, Jan. 2013.
-
(2013)
IEEE Trans. Signal. Process.
, vol.61
, Issue.1
, pp. 170-181
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
127
-
-
85032751357
-
Cooperative security at the physical layer: A summary of recent advances
-
Sep.
-
R. Bassily, E. Ekrem, H. Xiang, E. Tekin, X. Jianwei, M. Bloch, S. Ulukus, and A. Yener, "Cooperative security at the physical layer: A summary of recent advances," IEEE Signal Process. Mag., vol. 30, no. 5, pp.16-28, Sep. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.5
, pp. 16-28
-
-
Bassily, R.1
Ekrem, E.2
Xiang, H.3
Tekin, E.4
Jianwei, X.5
Bloch, M.6
Ulukus, S.7
Yener, A.8
-
128
-
-
51649095674
-
Capacity theorems for relay channels with confidential messages
-
Jun.
-
Y. Oohama, "Capacity theorems for relay channels with confidential messages," in Proc. IEEE ISIT, pp. 926-930, Jun. 2007.
-
(2007)
Proc. IEEE ISIT
, pp. 926-930
-
-
Oohama, Y.1
-
129
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Aug.
-
X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
130
-
-
76649123145
-
Two-hop secure communication using an untrusted relay
-
Nov.
-
-, "Two-hop secure communication using an untrusted relay," EURASIP J. Wireless Commun. and Netw., vol. 2009, pp. 1-13, Nov. 2009.
-
(2009)
EURASIP J. Wireless Commun. and Netw.
, vol.2009
, pp. 1-13
-
-
He, X.1
Yener, A.2
-
131
-
-
52349100899
-
The role of an untrusted relay in secret communication
-
Jul.
-
-, "The role of an untrusted relay in secret communication," in Proc. IEEE ISIT, pp. 2212-2216, Jul. 2008.
-
(2008)
Proc. IEEE ISIT
, pp. 2212-2216
-
-
He, X.1
Yener, A.2
-
132
-
-
52349113391
-
Secrecy in cooperative relay broadcast channels
-
Jul.
-
E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," in Proc. IEEE ISIT, pp. 2217-2221, Jul. 2008.
-
(2008)
Proc. IEEE ISIT
, pp. 2217-2221
-
-
Ekrem, E.1
Ulukus, S.2
-
133
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
-
Jan.
-
C. Jeong, I.-M. Kim, and D. I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.I.3
-
134
-
-
84881572098
-
Secure beamforming for MIMO two-way transmission with an untrusted relay
-
Shanghai, China, Apr.
-
J. Mo, M. Tao, Y. Liu, B. Xia, and X. Ma, "Secure beamforming for MIMO two-way transmission with an untrusted relay," in Proc. IEEE WCNC, Shanghai, China, Apr. 2013.
-
(2013)
Proc. IEEE WCNC
-
-
Mo, J.1
Tao, M.2
Liu, Y.3
Xia, B.4
Ma, X.5
-
135
-
-
84901257838
-
Joint transmit design and node selection for one-way and two-way untrusted relay channels
-
Pacific Grove, CA, Nov.
-
J. Huang and A. L. Swindlehurst, "Joint transmit design and node selection for one-way and two-way untrusted relay channels," in Proc. 47th Asilomar Conf., Pacific Grove, CA, Nov. 2013.
-
(2013)
Proc. 47th Asilomar Conf.
-
-
Huang, J.1
Swindlehurst, A.L.2
-
136
-
-
84877718412
-
Secure communication via an untrusted non-regenerative relay in fading channels
-
May
-
J. Huang, A. Mukherjee, and A. L. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536-2550, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2536-2550
-
-
Huang, J.1
Mukherjee, A.2
Swindlehurst, A.L.3
-
137
-
-
84867800602
-
Performance study of twohop amplify-and-forward systems with untrustworthy relay nodes
-
Oct.
-
L. Sun, T. Zhang, Y. Li and H. Niu, "Performance study of twohop amplify-and-forward systems with untrustworthy relay nodes," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3801-3807, Oct. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3801-3807
-
-
Sun, L.1
Zhang, T.2
Li, Y.3
Niu, H.4
-
138
-
-
84881089174
-
Imbalanced beamforming by a multi-antenna source for secure utilization of an untrusted relay
-
July
-
A. Mukherjee, "Imbalanced beamforming by a multi-antenna source for secure utilization of an untrusted relay," IEEE Commun. Lett., vol. 17, no. 7, pp. 1309-1312, July 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.7
, pp. 1309-1312
-
-
Mukherjee, A.1
-
139
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L. Lai and H El Gamal, "The relay-eavesdropper channel: cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
140
-
-
84874906565
-
Deaf cooperation and relay selection strategies for secure communication in multiple relay networks
-
Mar.
-
R. Bassily and S. Ulukus, "Deaf cooperation and relay selection strategies for secure communication in multiple relay networks," IEEE Trans. Signal Process., vol. 61, no. 6, pp. 1544-1554, Mar. 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.6
, pp. 1544-1554
-
-
Bassily, R.1
Ulukus, S.2
-
141
-
-
84870266491
-
Deaf cooperation for secrecy with multiple antennas at the helper
-
Dec.
-
R. Bassily and S. Ulukus, "Deaf cooperation for secrecy with multiple antennas at the helper," IEEE Trans. Inf. Forensics Security, vol. 7, no. 6, pp. 1855-1863, Dec. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.6
, pp. 1855-1863
-
-
Bassily, R.1
Ulukus, S.2
-
142
-
-
84875715464
-
Secure degrees of freedom of the Gaussian wiretap channel with helpers
-
Monticello, IL, Oct.
-
J. Xie and S. Ulukus, "Secure degrees of freedom of the Gaussian wiretap channel with helpers," in Proc. 50th Annu. Allerton Conf. on Commun., Control and Computing, Monticello, IL, Oct. 2012.
-
(2012)
Proc. 50th Annu. Allerton Conf. on Commun., Control and Computing
-
-
Xie, J.1
Ulukus, S.2
-
143
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
144
-
-
80052870842
-
Optimal cooperative relaying schemes for improving wireless physical layer security
-
Oct.
-
J. Li, A. P. Petropulu, and S. Weber, "Optimal cooperative relaying schemes for improving wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
145
-
-
82055177123
-
Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks
-
Dec.
-
D. Goeckel, S. Vasudevan, D. Towsley, S. Adams, Z. Ding, and K. Leung, "Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks," IEEE J. Selected Areas Commun., vol. 29, no. 10, pp. 2067-2078, Dec. 2011.
-
(2011)
IEEE J. Selected Areas Commun.
, vol.29
, Issue.10
, pp. 2067-2078
-
-
Goeckel, D.1
Vasudevan, S.2
Towsley, D.3
Adams, S.4
Ding, Z.5
Leung, K.6
-
146
-
-
84870554789
-
Cooperative secure beamforming for AF relay networks with multiple eavesdroppers
-
Jan.
-
Y. Yang, Q. Li, W.-K. Ma, J. Ge, and P. C. Ching, "Cooperative secure beamforming for AF relay networks with multiple eavesdroppers," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 35-38, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.1
, pp. 35-38
-
-
Yang, Y.1
Li, Q.2
Ma, W.-K.3
Ge, J.4
Ching, P.C.5
-
147
-
-
84862571591
-
Relay placement for physical layer security: A secure connection perspective
-
June
-
J. Mo, M. Tao, and Y. Liu, "Relay placement for physical layer security: A secure connection perspective," IEEE Commun. Lett., vol. 16, no. 6, pp. 878-881, June 2012.
-
(2012)
IEEE Commun. Lett.
, vol.16
, Issue.6
, pp. 878-881
-
-
Mo, J.1
Tao, M.2
Liu, Y.3
-
148
-
-
84870499401
-
A general relaying transmission protocol for MIMO secrecy communications
-
Nov.
-
Z. Ding, M. Peng and H. H. Chen, "A general relaying transmission protocol for MIMO secrecy communications," IEEE Trans. Commun., vol. 60, no. 11, pp. 3461-3471, Nov. 2012.
-
(2012)
IEEE Trans. Commun.
, vol.60
, Issue.11
, pp. 3461-3471
-
-
Ding, Z.1
Peng, M.2
Chen, H.H.3
-
149
-
-
84879149313
-
Secure relay beamforming with imperfect channel side information
-
June
-
X. Wang, K. Wang, and X. Zhang, "Secure relay beamforming with imperfect channel side information," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2140-2155, June 2013.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, Issue.5
, pp. 2140-2155
-
-
Wang, X.1
Wang, K.2
Zhang, X.3
-
150
-
-
84905228698
-
Joint SVD-GSVD precoding technique and secrecy capacity lower bound for the MIMO relay wire-tap channel
-
M. Jilani and T. Ohtsuki, "Joint SVD-GSVD precoding technique and secrecy capacity lower bound for the MIMO relay wire-tap channel," EURASIP Journ. Wireless Commun. Networking, 2012, 2012:361.
-
(2012)
EURASIP Journ. Wireless Commun. Networking
, pp. 361
-
-
Jilani, M.1
Ohtsuki, T.2
-
151
-
-
80855123713
-
Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks
-
Oct.
-
K. Ng and R. Schober, "Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3528-3540, Oct. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.10
, pp. 3528-3540
-
-
Ng, K.1
Schober, R.2
-
152
-
-
84858392930
-
Secure communication over parallel relay channel
-
Apr.
-
Z. Awan, A. Zaidi, and L. Vandendorpe, "Secure communication over parallel relay channel," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 359-371, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 359-371
-
-
Awan, Z.1
Zaidi, A.2
Vandendorpe, L.3
-
153
-
-
84891354137
-
Amplify-and-forward relay beamforming for secrecy with cooperative jamming and imperfect CSI
-
Budapest, Hungary
-
S. Vishwakarma and A. Chockalingam, "Amplify-and-forward relay beamforming for secrecy with cooperative jamming and imperfect CSI," in Proc. IEEE ICC, Budapest, Hungary, 2013.
-
(2013)
Proc. IEEE ICC
-
-
Vishwakarma, S.1
Chockalingam, A.2
-
154
-
-
84891356286
-
Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack
-
Budapest, Hungary
-
Y. Zou, X. Wang, and W. Shen, "Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack," in Proc. IEEE ICC, Budapest, Hungary, 2013.
-
(2013)
Proc. IEEE ICC
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
155
-
-
84904614329
-
Security versus reliability analysis of opportunistic relaying to appear
-
[Online].Available: Early Access
-
Y. Zou, X. Wang, W. Shen, and L. Hanzo, "Security versus reliability analysis of opportunistic relaying," to appear, IEEE Trans. Veh. Technol., 2014[Online]. Available: Early Access.
-
(2014)
IEEE Trans. Veh. Technol.
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
Hanzo, L.4
-
156
-
-
84884537599
-
Optimal relay selection for physicallayer security in cooperative wireless networks
-
Oct.
-
Y. Zou, X. Wang, and W. Shen, "Optimal relay selection for physicallayer security in cooperative wireless networks," IEEE J. Selected Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
-
(2013)
IEEE J. Selected Areas Commun.
, vol.31
, Issue.10
, pp. 2099-2111
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
157
-
-
84901255051
-
Wireless physical layer security enhancement with buffer-aided relaying
-
Pacific Grove, CA, Nov.
-
J. Huang and A. L. Swindlehurst, "Wireless physical layer security enhancement with buffer-aided relaying," in Proc. 47th Asilomar Conf., Pacific Grove, CA, Nov. 2013.
-
(2013)
Proc. 47th Asilomar Conf.
-
-
Huang, J.1
Swindlehurst, A.L.2
-
158
-
-
51849144195
-
Interference-assisted secret communication
-
May
-
X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "Interference- assisted secret communication," in Proc. IEEE ITW, pp. 164-168, May 2008.
-
(2008)
Proc. IEEE ITW
, pp. 164-168
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.V.4
-
159
-
-
84891354153
-
Power allocation strategies for OFDM gaussian wiretap channels with a friendly jammer: The degraded case
-
Budapest, Hungary
-
M. Ara, H. Reboredo, F. Renna, and M. Rodrigues, "Power allocation strategies for OFDM gaussian wiretap channels with a friendly jammer: The degraded case," in Proc. IEEE ICC, Budapest, Hungary, 2013.
-
(2013)
Proc. IEEE ICC
-
-
Ara, M.1
Reboredo, H.2
Renna, F.3
Rodrigues, M.4
-
160
-
-
84890525375
-
Mobile jammers for secrecy rate maximization in cooperative networks
-
Vancouver, Canada, May
-
D. S. Kalogerias, N. Chatzipanagiotis, M. M. Zavlanos, and A. P. Petropulu, "Mobile jammers for secrecy rate maximization in cooperative networks," in Proc. IEEE ICASSP, Vancouver, Canada, May 2013.
-
(2013)
Proc. IEEE ICASSP
-
-
Kalogerias, D.S.1
Chatzipanagiotis, N.2
Zavlanos, M.M.3
Petropulu, A.P.4
-
161
-
-
84883300441
-
Effect of feedback delay on secure cooperative networks with joint relay and jammer selection
-
Aug.
-
N. Wu and H. Li, "Effect of feedback delay on secure cooperative networks with joint relay and jammer selection," IEEE Wireless Commun. Lett., vol. 2, no. 4, pp. 415-418, Aug. 2013.
-
(2013)
IEEE Wireless Commun. Lett.
, vol.2
, Issue.4
, pp. 415-418
-
-
Wu, N.1
Li, H.2
-
162
-
-
84893431203
-
Adaptive limited feedback for MISO wiretap channels with cooperative jamming to appear
-
[Online].Available: Early Access
-
M. Pei, A. L. Swindlehurst, D. Ma, and J. Wei, "Adaptive limited feedback for MISO wiretap channels with cooperative jamming," to appear, IEEE Trans. Signal Process., 2014[Online]. Available: Early Access.
-
(2014)
IEEE Trans. Signal Process.
-
-
Pei, M.1
Swindlehurst, A.L.2
Ma, D.3
Wei, J.4
-
163
-
-
80052913251
-
Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer
-
Oct.
-
S. A. A. Fakoorian and A. L. Swindlehurst, "Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 5013-5022, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 5013-5022
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
164
-
-
84906679485
-
Deploying energy-harvesting cooperative jammers for security in the MIMO wiretap channel
-
Pacific Grove, CA, Nov.
-
A. Mukherjee and J. Huang, "Deploying energy-harvesting cooperative jammers for security in the MIMO wiretap channel," in Proc. ASILOMAR Conf., Pacific Grove, CA, Nov. 2012.
-
(2012)
Proc. ASILOMAR Conf.
-
-
Mukherjee, A.1
Huang, J.2
-
165
-
-
77953826156
-
Cooperative jamming in MIMO adhoc networks
-
Nov.
-
J. Wang and A. L. Swindlehurst, "Cooperative jamming in MIMO adhoc networks," in Proc. 43rd Asilomar Conf., pp. 1719-1723, Nov. 2009.
-
(2009)
Proc. 43rd Asilomar Conf.
, pp. 1719-1723
-
-
Wang, J.1
Swindlehurst, A.L.2
-
166
-
-
84863359764
-
Robust secure transmission in MISO channels based on worst-case optimization
-
Apr.
-
J. Huang and A. L. Swindlehurst, "Robust secure transmission in MISO channels based on worst-case optimization," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1696-1707, Apr. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.4
, pp. 1696-1707
-
-
Huang, J.1
Swindlehurst, A.L.2
-
167
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang and A. Lee Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Lee Swindlehurst, A.2
-
168
-
-
84876796391
-
Destination assisted cooperative jamming for wireless physical-layer security
-
Apr.
-
Y. Liu, J. Li, and A. P. Petropulu, "Destination assisted cooperative jamming for wireless physical-layer security," IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 682-694, Apr. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.4
, pp. 682-694
-
-
Liu, Y.1
Li, J.2
Petropulu, A.P.3
-
169
-
-
84867873837
-
Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis
-
Oct.
-
W. Li, M. Ghogho, B. Chen, and C. Xiong, "Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis," IEEE Commun. Lett., vol. 16, no. 10, pp. 1628-1631, Oct. 2012.
-
(2012)
IEEE Commun. Lett.
, vol.16
, Issue.10
, pp. 1628-1631
-
-
Li, W.1
Ghogho, M.2
Chen, B.3
Xiong, C.4
-
170
-
-
84883785476
-
Improving physical layer secrecy using full-duplex jamming receivers
-
Oct.
-
G. Zheng, I. Krikidis, L. Jiangyuan, A. P. Petropulu, and B. Ottersten, "Improving physical layer secrecy using full-duplex jamming receivers," IEEE Trans. Signal Process., vol. 61, no. 20, pp. 4962-4974 , Oct. 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.20
, pp. 4962-4974
-
-
Zheng, G.1
Krikidis, I.2
Jiangyuan, L.3
Petropulu, A.P.4
Ottersten, B.5
-
172
-
-
78751521977
-
Securing multi-antenna twoway relay channels with analog network coding against eavesdroppers
-
Jun.
-
A. Mukherjee and A. L. Swindlehurst, "Securing multi-antenna twoway relay channels with analog network coding against eavesdroppers," in Proc. 11th IEEE SPAWC, Jun. 2010.
-
(2010)
Proc. 11th IEEE SPAWC
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
173
-
-
80052177936
-
Anti-eavesdropping spacetime network coding for cooperative communications
-
Nov.
-
Z. Z. Gao, Y. H. Yang, and K. J. R. Liu, "Anti-eavesdropping spacetime network coding for cooperative communications," IEEE Trans. Wireless Commun., vol. 10, no. 11, pp. 3898-3908, Nov. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.11
, pp. 3898-3908
-
-
Gao, Z.Z.1
Yang, Y.H.2
Liu, K.J.R.3
-
174
-
-
79957975387
-
Secrecy in Gaussian MIMO bidirectional broadcast wiretap channels: Transmit strategies
-
Pacific Grove, CA, Nov.
-
S. Al-Sayed and A. Sezgin, "Secrecy in Gaussian MIMO bidirectional broadcast wiretap channels: Transmit strategies," in Proc. 44th Asilomar Conf., Pacific Grove, CA, Nov. 2010.
-
(2010)
Proc. 44th Asilomar Conf.
-
-
Al-Sayed, S.1
Sezgin, A.2
-
175
-
-
79551634548
-
Physical layer security for two way relay communications with friendly jammers
-
Miami, FL
-
R. Zhang, L. Song, Z. Han, B. Jiaa, and M. Debbah, "Physical layer security for two way relay communications with friendly jammers," in Proc. IEEE GLOBE COM, Miami, FL, 2010.
-
(2010)
Proc. IEEE GLOBE COM
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Jiaa, B.4
Debbah, M.5
-
176
-
-
0027629488
-
Common randomness in information theory and cryptography-part I: Secret sharing
-
July
-
R. Ahlswede and I. Csisźar, "Common randomness in information theory and cryptography-part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csisźar, I.2
-
177
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
DOI 10.1109/18.825796
-
I. Csisźar and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, no. 3, pp. 344-366, Mar. 2000. (Pubitemid 30582727)
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.2
, pp. 344-366
-
-
Csiszar, I.1
Narayan, P.2
-
178
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec.
-
I. Csisźar and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csisźar, I.1
Narayan, P.2
-
179
-
-
0037396695
-
Secret key agreement over a nonauthenticated channel-Part I: Definitions and bounds
-
Apr.
-
U. M. Maurer and S. Wolf, "Secret key agreement over a nonauthenticated channel-Part I: Definitions and bounds," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822-831, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 822-831
-
-
Maurer, U.M.1
Wolf, S.2
-
180
-
-
0037399113
-
Secret key agreement over a nonauthenticated channel-Part II: The simulatability condition
-
Apr.
-
U. M. Maurer and S. Wolf, "Secret key agreement over a nonauthenticated channel-Part II: The simulatability condition," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 832-838, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 832-838
-
-
Maurer, U.M.1
Wolf, S.2
-
181
-
-
0037396951
-
Secret key agreement over a nonauthenticated channel-Part III: Privacy amplification
-
Apr.
-
U. M. Maurer and S. Wolf, "Secret key agreement over a nonauthenticated channel-Part III: Privacy amplification," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 839-851, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 839-851
-
-
Maurer, U.M.1
Wolf, S.2
-
182
-
-
45249100625
-
Key distribution protocols based on noisy channels in presence of an active adversary: Conventional and new versions with parameter optimization
-
June
-
V. Yakovlev, V. Korzhik, and G. Morales-Luna, "Key distribution protocols based on noisy channels in presence of an active adversary: Conventional and new versions with parameter optimization," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2535-2549, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2535-2549
-
-
Yakovlev, V.1
Korzhik, V.2
Morales-Luna, G.3
-
183
-
-
84906663259
-
Secret key agreement over an interference channel using noiseless feedback
-
S. Salimi, E. Jorswieck, and M. Skoglund, "Secret key agreement over an interference channel using noiseless feedback," in Proc. IEEE ISIT, 2013.
-
(2013)
Proc. IEEE ISIT
-
-
Salimi, S.1
Jorswieck, E.2
Skoglund, M.3
-
184
-
-
80051740021
-
Key agreement over multiple access channel
-
Sep.
-
S. Salimi, M. Salmasizadeh, M. R. Aref, and J. Golic, "Key Agreement over Multiple Access Channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 775-790, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 775-790
-
-
Salimi, S.1
Salmasizadeh, M.2
Aref, M.R.3
Golic, J.4
-
185
-
-
0033881606
-
Secure information transmission for mobile radio
-
DOI 10.1109/4234.824754
-
H. Koorapaty, A. A. Hassan, and S. Chennakeshu, "Secure information transmission for mobile radio," IEEE Commun. Lett., vol. 4, pp. 52-55, Feb. 2000. (Pubitemid 30564390)
-
(2000)
IEEE Communications Letters
, vol.4
, Issue.2
, pp. 52-55
-
-
Koorapaty, H.1
Hassan, A.A.2
Chennakeshu, S.3
-
186
-
-
47649111825
-
On the secrecy capabilities of ITU channels
-
Baltimore, MD Oct.
-
C. Ye, A. Reznik, G. Sternberg, and Y. Shah, "On the secrecy capabilities of ITU channels," in Proc. IEEE 66th Veh. Tech. Conf., pp. 2030-2034, Baltimore, MD, Oct. 2007.
-
(2007)
Proc. IEEE 66th Veh. Tech. Conf.
, pp. 2030-2034
-
-
Ye, C.1
Reznik, A.2
Sternberg, G.3
Shah, Y.4
-
187
-
-
51449114762
-
Secure wireless communications: Secret keys through multipath
-
Las Vegas Apr.
-
A. Sayeed and A. Perrig, "Secure wireless communications: Secret keys through multipath," in Proc. IEEE ICASSP, Las Vegas, pp. 3013-3016, Apr. 2008.
-
(2008)
Proc. IEEE ICASSP
, pp. 3013-3016
-
-
Sayeed, A.1
Perrig, A.2
-
188
-
-
39049156464
-
Extracting secrecy from jointly Gaussian random variables
-
DOI 10.1109/ISIT.2006.262101, 4036441, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
-
C. Ye, A. Reznik, and Y. Shah, "Extracting secrecy from jointly Gaussian random variables," in Proc. IEEE ISIT, pp. 2593-2597, Seattle, July 2006. (Pubitemid 351244572)
-
(2006)
IEEE International Symposium on Information Theory - Proceedings
, pp. 2593-2597
-
-
Ye, C.1
Reznik, A.2
Shah, Y.3
-
189
-
-
45249104850
-
Wireless information-theoretic security
-
June
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
190
-
-
77952604175
-
Information-theoretically secret key generation for fading wireless channels
-
June
-
Y. Chunxuan, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N.B. Mandayam, "Information-theoretically secret key generation for fading wireless channels," IEEE Trans. Inf. Forensics Security, vol.5, no.2, pp. 240-254, June 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 240-254
-
-
Chunxuan, Y.1
Mathur, S.2
Reznik, A.3
Shah, Y.4
Trappe, W.5
Mandayam, N.B.6
-
191
-
-
28644438588
-
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
-
DOI 10.1109/TAP.2005.858853
-
T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," IEEE Trans. Antennas Propag. vol. 53, no. 11, pp. 3776-3784, Nov. 2005. (Pubitemid 41748822)
-
(2005)
IEEE Transactions on Antennas and Propagation
, vol.53
, Issue.11
, pp. 3776-3784
-
-
Aono, T.1
Higuchi, K.2
Ohira, T.3
Komiyama, B.4
Sasaoka, H.5
-
192
-
-
77955038275
-
Reliability-based sliced error correction in secret key agreement from fading channel
-
T. Shimizu, H. Iwai, and H. Sasaoka, "Reliability-based sliced error correction in secret key agreement from fading channel," in Proc. IEEE WCNC, 2010.
-
(2010)
Proc. IEEE WCNC
-
-
Shimizu, T.1
Iwai, H.2
Sasaoka, H.3
-
193
-
-
80051755314
-
Keys through ARQ: Theory and practice
-
Sep.
-
Y. Abdallah, M. A. Latif, M. Youssef, A. Sultan, and H. El Gamal, "Keys through ARQ: Theory and practice," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 737-751, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 737-751
-
-
Abdallah, Y.1
Latif, M.A.2
Youssef, M.3
Sultan, A.4
El Gamal, H.5
-
194
-
-
84883325225
-
Intrinsic information of wideband channels
-
Sep.
-
Y. Shen and M. Z. Win, "Intrinsic information of wideband channels," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1875-1888, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1875-1888
-
-
Shen, Y.1
Win, M.Z.2
-
195
-
-
84874952710
-
Semi blind key agreement over MIMO fading channels
-
Feb.
-
F. Renna, M. R. Bloch, and N. Laurenti, "Semi blind key agreement over MIMO fading channels," IEEE Trans. Commun., vol. 61, no. 2, pp. 620-627, Feb. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.2
, pp. 620-627
-
-
Renna, F.1
Bloch, M.R.2
Laurenti, N.3
-
196
-
-
33847366177
-
MIMO transmissions with informationtheoretic secrecy for secret-key agreement in wireless networks
-
Atlantic City, NJ
-
X. Li and E. P. Ratazzi, "MIMO transmissions with informationtheoretic secrecy for secret-key agreement in wireless networks," in Proc. IEEE MILCOM, Atlantic City, NJ, 2005.
-
(2005)
Proc. IEEE MILCOM
-
-
Li, X.1
Ratazzi, E.P.2
-
197
-
-
84878738900
-
Achieving secure transmission with equivalent multiplicative noise in MISO wiretap channels
-
May
-
Q. Li, H. Song, and K. Huang, "Achieving secure transmission with equivalent multiplicative noise in MISO wiretap channels," IEEE Commun. Lett., vol. 17, no. 5, pp. 892-895, May 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.5
, pp. 892-895
-
-
Li, Q.1
Song, H.2
Huang, K.3
-
198
-
-
77951552840
-
Secrecy extraction from increased randomness in a time-varying MIMO channel
-
Honolulu, Dec.
-
C. Chen and M. A. Jensen, "Secrecy extraction from increased randomness in a time-varying MIMO channel," in Proc. IEEE GLOBECOM, Honolulu, Dec. 2009.
-
(2009)
Proc. IEEE GLOBECOM
-
-
Chen, C.1
Jensen, M.A.2
-
199
-
-
84860686731
-
Secret key establishment using temporally and spatially correlated wireless channel coefficients
-
Feb.
-
C. Chen and M. A. Jensen, "Secret key establishment using temporally and spatially correlated wireless channel coefficients," IEEE Trans. Mobile Comput., vol. 10, no. 2, pp. 205-215, Feb. 2011.
-
(2011)
IEEE Trans. Mobile Comput.
, vol.10
, Issue.2
, pp. 205-215
-
-
Chen, C.1
Jensen, M.A.2
-
200
-
-
72249083097
-
High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
-
Jan.
-
N. Patwari, J. Croft, S. Jana, and S. K. Kasera, "High-rate uncorrelated bit extraction for shared secret key generation from channel measurements," IEEE Trans. Mobile Comput., vol. 9, no. 1, pp. 17-30, Jan. 2010.
-
(2010)
IEEE Trans. Mobile Comput.
, vol.9
, Issue.1
, pp. 17-30
-
-
Patwari, N.1
Croft, J.2
Jana, S.3
Kasera, S.K.4
-
201
-
-
77955667690
-
Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis
-
Sep.
-
J. W. Wallace and R. K. Sharma, "Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 381-392, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.3
, pp. 381-392
-
-
Wallace, J.W.1
Sharma, R.K.2
-
202
-
-
80051727482
-
Strongly secure communications over the two-way wiretap channel
-
Sep.
-
A. J. Pierrot and M. R. Bloch, "Strongly secure communications over the two-way wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 595-605, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 595-605
-
-
Pierrot, A.J.1
Bloch, M.R.2
-
203
-
-
80051749392
-
Physical-layer secret key agreement in two-way wireless relaying systems
-
Sep.
-
T. Shimizu, H. Iwai, and H. Sasaoka, "Physical-layer secret key agreement in two-way wireless relaying systems," IEEE Trans. Inf. Forensics Security vol. 6, no. 3, pp. 650-660, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 650-660
-
-
Shimizu, T.1
Iwai, H.2
Sasaoka, H.3
-
204
-
-
84906696248
-
Key generation under active attacks
-
Pacific Grove, CA
-
H. Zhou, L. Hui, and L. Lai, "Key generation under active attacks," in Proc. 47th Asilomar Conf., Pacific Grove, CA, 2013.
-
(2013)
Proc. 47th Asilomar Conf.
-
-
Zhou, H.1
Hui, L.2
Lai, L.3
-
205
-
-
55349095058
-
The wiretap channel with feedback: Encryption over the channel
-
Nov.
-
L. Lai, H. El Gamal, and H. V. Poor, "The wiretap channel with feedback: Encryption over the channel," IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 5059-5067, Nov. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.11
, pp. 5059-5067
-
-
Lai, L.1
El Gamal, H.2
Poor, H.V.3
-
206
-
-
77955641859
-
Wiretap channel with secure rate-limited feedback
-
Dec.
-
E. Ardestanizadeh, M. Franceschetti, T. Javidi, and Y. Kim, "Wiretap channel with secure rate-limited feedback," IEEE Trans. Inf. Theory, vol. 55, no. 12, pp. 5353-5361, Dec. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.12
, pp. 5353-5361
-
-
Ardestanizadeh, E.1
Franceschetti, M.2
Javidi, T.3
Kim, Y.4
-
207
-
-
0002448405
-
A public-key cryptosystem based on algebraic coding theory
-
R. J. McEliece, "A public-key cryptosystem based on algebraic coding theory," DSN Progress Report, pp. 114-116, 1978.
-
(1978)
DSN Progress Report
, pp. 114-116
-
-
McEliece, R.J.1
-
208
-
-
0034448183
-
Using low density parity check codes in the McEliece cryptosystem
-
C. Monico, J. Rosenthal, and A. Shokrollahi, "Using low density parity check codes in the McEliece cryptosystem," in Proc. IEEE ISIT, p. 215, Sorrento, Italy, June 2000. (Pubitemid 32393608)
-
(2000)
IEEE International Symposium on Information Theory - Proceedings
, pp. 215
-
-
Monico, C.1
Rosenthal, J.2
Shokrollahi, A.3
-
209
-
-
85032751057
-
Coding for secrecy: An overview of error-control coding techniques for physical-layer security
-
Sep.
-
W. K. Harrison, J. Almeida, M. R. Bloch, S. W. McLaughlin, and J. Barros, "Coding for secrecy: An overview of error-control coding techniques for physical-layer security," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 41-50, Sep. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.5
, pp. 41-50
-
-
Harrison, W.K.1
Almeida, J.2
Bloch, M.R.3
McLaughlin, S.W.4
Barros, J.5
-
210
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
DOI 10.1109/TIT.2007.901143
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007. (Pubitemid 47249863)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
211
-
-
80051720839
-
LDPC codes for the Gaussian wiretap channel
-
Sep.
-
D. Klinc, J. Ha, S. McLaughlin, J. Barros, and B.-J. Kwak, "LDPC codes for the Gaussian wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 532-540, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 532-540
-
-
Klinc, D.1
Ha, J.2
McLaughlin, S.3
Barros, J.4
Kwak, B.-J.5
-
212
-
-
33644994972
-
Adaptive secure channel coding based on punctured turbo codes
-
Apr.
-
A. Payandeh, M. Ahmadian, and M. Reza Aref, "Adaptive secure channel coding based on punctured turbo codes," IEE Proc.-Commun., vol. 153, no. 2, pp. 313-316, Apr. 2006.
-
(2006)
IEE Proc.-Commun.
, vol.153
, Issue.2
, pp. 313-316
-
-
Payandeh, A.1
Ahmadian, M.2
Reza Aref, M.3
-
214
-
-
79951955741
-
Providing secrecy with structured codes: Tools and applications to Gaussian two-user channels
-
[Online].Available
-
X. He and A. Yener, "Providing secrecy with structured codes: Tools and applications to Gaussian two-user channels," submitted to IEEE Trans. Inf. Theory, 2009[Online]. Available: http://arxiv.org/abs/0907.5388.
-
(2009)
IEEE Trans. Inf. Theory
-
-
He, X.1
Yener, A.2
-
215
-
-
69949173993
-
Nested codes for secure transmission
-
Sep.
-
R. Liu, H. V. Poor, P. Spasojevic, and Y. Liang, "Nested codes for secure transmission," in Proc. IEEE PIMRC, pp. 15, Sep. 2008.
-
(2008)
Proc. IEEE PIMRC
, pp. 15
-
-
Liu, R.1
Poor, H.V.2
Spasojevic, P.3
Liang, Y.4
-
216
-
-
70549101452
-
Dialog codes for secure wireless communications
-
A. Arora and L. Sang, "Dialog codes for secure wireless communications," in Proc. IPSN, 2009.
-
(2009)
Proc. IPSN
-
-
Arora, A.1
Sang, L.2
-
217
-
-
80053941690
-
Achieving the secrecy capacity of wiretap channels using polar codes
-
H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6428-6443, 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.10
, pp. 6428-6443
-
-
Mahdavifar, H.1
Vardy, A.2
-
218
-
-
84901260362
-
On the optimality of polar codes for the deterministic wiretap channel
-
Pacific Grove, CA
-
S. A. A. Fakoorian and A. L. Swindlehurst, "On the optimality of polar codes for the deterministic wiretap channel," in Proc. 47th Asilomar Conf., Pacific Grove, CA, 2013.
-
(2013)
Proc. 47th Asilomar Conf.
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
220
-
-
77955726417
-
Network coding for distributed storage systems
-
Sep.
-
A. G. Dimakis, P. B. Godfrey, Y. Wu, M. Wainwright, and K. Ramchandran, "Network coding for distributed storage systems," IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4539-4551, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.9
, pp. 4539-4551
-
-
Dimakis, A.G.1
Godfrey, P.B.2
Wu, Y.3
Wainwright, M.4
Ramchandran, K.5
-
222
-
-
80053951920
-
Securing dynamic distributed storage systems against eavesdropping and adversarial attacks
-
Oct.
-
S. Pawar, S. El Rouayheb, and K. Ramchandran, "Securing dynamic distributed storage systems against eavesdropping and adversarial attacks," IEEE Tran. Inf. Theory, vol. 57, no. 10, pp. 6734-6753, Oct. 2011.
-
(2011)
IEEE Tran. Inf. Theory
, vol.57
, Issue.10
, pp. 6734-6753
-
-
Pawar, S.1
El Rouayheb, S.2
Ramchandran, K.3
-
223
-
-
84857198054
-
Information-theoretically secure regenerating codes for distributed storage
-
Houston, TX, Dec.
-
N. B. Shah, K. V. Rashmi, and P. V. Kumar, "Information- theoretically secure regenerating codes for distributed storage," in Proc. IEEE GLOBECOM, Houston, TX, Dec. 2011.
-
(2011)
Proc. IEEE GLOBECOM
-
-
Shah, N.B.1
Rashmi, K.V.2
Kumar, P.V.3
-
224
-
-
77955682500
-
Security in distributed storage systems by communicating a logarithmic number of bits
-
Austin, TX
-
T. K. Dikaliotis, A. G. Dimakis, and T. Ho, "Security in distributed storage systems by communicating a logarithmic number of bits," in Proc. IEEE ISIT, Austin, TX, 2010.
-
(2010)
Proc. IEEE ISIT
-
-
Dikaliotis, T.K.1
Dimakis, A.G.2
Ho, T.3
-
225
-
-
84883442288
-
Data secrecy in distributed storage systems under exact repair
-
Calgary, Canada, Jun.
-
S. Goparaju, S. E. Rouayheb, R. Calderbank, and H. V. Poor, "Data secrecy in distributed storage systems under exact repair," in Proc. IEEE NETCOD, Calgary, Canada, Jun. 2013.
-
(2013)
Proc. IEEE NETCOD
-
-
Goparaju, S.1
Rouayheb, S.E.2
Calderbank, R.3
Poor, H.V.4
-
227
-
-
84890407484
-
Capacity and security of heterogeneous distributed storage systems
-
Istanbul, Turkey
-
T. Ernvall, S. E. Rouayheb, C. Hollanti, and H. V. Poor, "Capacity and security of heterogeneous distributed storage systems," in Proc. IEEE ISIT, pp. 1247-1251, Istanbul, Turkey, 2013.
-
(2013)
Proc. IEEE ISIT
, pp. 1247-1251
-
-
Ernvall, T.1
Rouayheb, S.E.2
Hollanti, C.3
Poor, H.V.4
-
229
-
-
78650893906
-
Secure network coding on a wiretap network
-
Jan.
-
N. Cai and R. W. Yeung, "Secure network coding on a wiretap network," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 424-435, Jan. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.1
, pp. 424-435
-
-
Cai, N.1
Yeung, R.W.2
-
230
-
-
33750025166
-
On the capacity of secure network coding
-
Sept.
-
J. Feldman, T. Malkin, R. Servedio, and C. Stein, "On the capacity of secure network coding," in Proc. Allerton Conf., Sept. 2004.
-
(2004)
Proc. Allerton Conf.
-
-
Feldman, J.1
Malkin, T.2
Servedio, R.3
Stein, C.4
-
231
-
-
52349119694
-
Security for wiretap networks via rank-metric codes
-
Toronto
-
D. Silva and F. R. Kschischang, "Security for wiretap networks via rank-metric codes," in Proc. IEEE ISIT, Toronto, 2008.
-
(2008)
Proc. IEEE ISIT
-
-
Silva, D.1
Kschischang, F.R.2
-
232
-
-
70449516333
-
On the security performance of physical-layer network coding
-
Dresden, Germany, June
-
K. Lu, S. Fu, Y. Qian, Y., and T. Zhang, "On the security performance of physical-layer network coding," in Proc. IEEE ICC, Dresden, Germany, June 2009.
-
(2009)
Proc. IEEE ICC
-
-
Lu, K.1
Fu, S.2
Qian, Y.Y.3
Zhang, T.4
-
233
-
-
84885890147
-
An eavesdropping game with SINR as an objective function
-
A. Garnaev and W. Trappe, "An eavesdropping game with SINR as an objective function," in Proc. SECURE COMM, pp.142-162, 2009.
-
(2009)
Proc. SECURE COMM
, pp. 142-162
-
-
Garnaev, A.1
Trappe, W.2
-
234
-
-
80051713767
-
A secure communication game with a relay helping the eavesdropper
-
Sep.
-
M. Yuksel, X. Liu, and E. Erkip, "A secure communication game with a relay helping the eavesdropper," in IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 818-830, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 818-830
-
-
Yuksel, M.1
Liu, X.2
Erkip, E.3
-
235
-
-
77955364512
-
Equilibrium outcomes of dynamic games in MIMO channels with active eavesdroppers
-
Cape Town, South Africa, May
-
A. Mukherjee and A. L. Swindlehurst, "Equilibrium outcomes of dynamic games in MIMO channels with active eavesdroppers," in Proc. IEEE ICC, Cape Town, South Africa, May 2010.
-
(2010)
Proc. IEEE ICC
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
236
-
-
84897584002
-
Jamming games in the MIMO wiretap channel with an active eavesdropper
-
Jan.
-
A. Mukherjee and A. L. Swindlehurst, "Jamming games in the MIMO wiretap channel with an active eavesdropper," IEEE Trans. Signal Process., vol. 61, no. 1, pg. 82-91, Jan. 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.1
, pp. 82-91
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
237
-
-
80054826542
-
Secrecy games on the one-sided interference channel
-
July
-
J. Xie and S. Ulukus, "Secrecy games on the one-sided interference channel," in Proc. IEEE ISIT, July 2011.
-
(2011)
Proc. IEEE ISIT
-
-
Xie, J.1
Ulukus, S.2
-
238
-
-
84873546762
-
A zero-sum power allocation game in the parallel Gaussian wiretap channel with an unfriendly jammer
-
Singapore, Nov.
-
M. Ara, H. Reboredo, S. Ghanem and M. R. D. Rodrigues, "A zero-sum power allocation game in the parallel Gaussian wiretap channel with an unfriendly jammer," in Proc. IEEE ICCS, Singapore, Nov. 2012.
-
(2012)
Proc. IEEE ICCS
-
-
Ara, M.1
Reboredo, H.2
Ghanem, S.3
Rodrigues, M.R.D.4
-
239
-
-
84906696246
-
Physical layer security: Coalitional games for distributed cooperation
-
W. Saad, Z. Han, M. Debbah, A. Hjørungnes, and T. Basa̧r, "Physical layer security: Coalitional games for distributed cooperation," in Proc. 7th WiOpt, 2009.
-
(2009)
Proc. 7th WiOpt
-
-
Saad, W.1
Han, Z.2
Debbah, M.3
Hjørungnes, A.4
Basa̧r, T.5
-
240
-
-
84870524343
-
Tree formation with physical layer security considerations in wireless multihop networks
-
Nov.
-
W. Saad, X. Zhou, B. Maham, T. Basa̧r, and H. V. Poor, "Tree formation with physical layer security considerations in wireless multihop networks," IEEE Trans. Wireless Commun., vol. 11, no. 11, pp. 3980-3991, Nov. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.11
, pp. 3980-3991
-
-
Saad, W.1
Zhou, X.2
Maham, B.3
Basa̧r, T.4
Poor, H.V.5
-
241
-
-
76649135514
-
Physical layer security game: Interaction between source, eavesdropper and friendly jammer
-
Z. Han, N. Marina, M. Debbah, and A. Hjørungnes, "Physical layer security game: Interaction between source, eavesdropper and friendly jammer", Eurasip J. Wireless Commun. and Network., 2009.
-
(2009)
Eurasip J. Wireless Commun. and Network.
-
-
Han, Z.1
Marina, N.2
Debbah, M.3
Hjørungnes, A.4
-
242
-
-
84906663256
-
Improved wireless secrecy capacity using distributed auction theory
-
China
-
Z. Han, N. Marina, M. Debbah, and A. Hjørungnes, "Improved wireless secrecy capacity using distributed auction theory", in Proc. 5th ICMAS, China, 2009.
-
(2009)
Proc. 5th ICMAS
-
-
Han, Z.1
Marina, N.2
Debbah, M.3
Hjørungnes, A.4
-
244
-
-
80051625959
-
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
-
J. Cho, Y.-W. P. Hong, and C.-C. J. Kuo, "A game theoretic approach to eavesdropper cooperation in MISO wireless networks," in Proc. IEEE ICASSP, 2011.
-
(2011)
Proc. IEEE ICASSP
-
-
Cho, J.1
Hong, Y.-W.P.2
Kuo, C.-C.J.3
-
245
-
-
0002406496
-
Cognitive radio for flexible mobile multimedia communications
-
Nov.
-
J. Mitola, "Cognitive radio for flexible mobile multimedia communications," in Proc. IEEE Int Mobile Multimedia Commun. Work., pp. 3-10, Nov. 1999.
-
(1999)
Proc. IEEE Int Mobile Multimedia Commun. Work.
, pp. 3-10
-
-
Mitola, J.1
-
246
-
-
77950149514
-
Security in cognitive radio networks: Threats and mitigation
-
May
-
T. C. Clancy and N. Goergen, "Security in cognitive radio networks: Threats and mitigation," in Proc. Crown Com, pp. 1-8, May 2008.
-
(2008)
Proc. Crown Com
, pp. 1-8
-
-
Clancy, T.C.1
Goergen, N.2
-
247
-
-
84873711287
-
A survey on security threats and detection techniques in cognitive radio networks
-
A. Fragkiadakis, E. Tragos, and I. Askoxylakis, "A survey on security threats and detection techniques in cognitive radio networks," IEEE Commun. Surveys Tutorials, vol. 15, no. 1, pp. 428-445, 2013.
-
(2013)
IEEE Commun. Surveys Tutorials
, vol.15
, Issue.1
, pp. 428-445
-
-
Fragkiadakis, A.1
Tragos, E.2
Askoxylakis, I.3
-
248
-
-
51349141382
-
Potential cognitive radio denial-of-service vulnerailities and protection countermeasures: A multi-dimensional analysis and assessment
-
Aug.
-
T. X. Brown and A. Sethi, "Potential cognitive radio denial-of-service vulnerailities and protection countermeasures: a multi-dimensional analysis and assessment," in Proc. IEEE Crown Com, pp. 456-464, Aug. 2007.
-
(2007)
Proc. IEEE Crown Com
, pp. 456-464
-
-
Brown, T.X.1
Sethi, A.2
-
249
-
-
84906696247
-
On the secrecy capacity of fading cognitive wireless networks
-
May
-
S. Anand and R. Chandramouli, "On the secrecy capacity of fading cognitive wireless networks," in Proc. IEEE Crown Com, May 2008.
-
(2008)
Proc. IEEE Crown Com
-
-
Anand, S.1
Chandramouli, R.2
-
250
-
-
77951274829
-
Secure communication over MISO cognitive radio channels
-
Apr.
-
Y. Pei, Y. Liang, L. Zhang, K. C. Teh, and K. H. Li, "Secure communication over MISO cognitive radio channels," IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1494-1592 , Apr. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.4
, pp. 1494-1592
-
-
Pei, Y.1
Liang, Y.2
Zhang, L.3
Teh, K.C.4
Li, K.H.5
-
251
-
-
80051757604
-
An information secrecy game in cognitive radio networks
-
Sep.
-
Y. Wu and K. Liu, "An information secrecy game in cognitive radio networks," IEEE Trans. Inf. Forens. Security, vol. 6, no. 3, pp. 831-842, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forens. Security
, vol.6
, Issue.3
, pp. 831-842
-
-
Wu, Y.1
Liu, K.2
-
252
-
-
84873097542
-
Improving secrecy rate via spectrum leasing for friendly jamming
-
Jan.
-
I. Stanojev and A. Yener, "Improving secrecy rate via spectrum leasing for friendly jamming," IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 134-145, Jan. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.1
, pp. 134-145
-
-
Stanojev, I.1
Yener, A.2
-
253
-
-
84891365081
-
A game-theoretic view on the physical layer security of cognitive radio networks
-
Budapest, Hungary, June
-
A. Hojeij, W. Saad, and T. Basa̧r, "A game-theoretic view on the physical layer security of cognitive radio networks," in Proc. IEEE ICC, Budapest, Hungary, June 2013.
-
(2013)
Proc. IEEE ICC
-
-
Hojeij, A.1
Saad, W.2
Basa̧r, T.3
-
254
-
-
38149046958
-
Defense against primary user emulation attacks in cognitive radio networks
-
Jan.
-
R. Chen, J.-M. Park, and J. H. Reed, "Defense against primary user emulation attacks in cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 25-37, Jan. 2008.
-
(2008)
IEEE J. Sel. Areas Commun.
, vol.26
, Issue.1
, pp. 25-37
-
-
Chen, R.1
Park, J.-M.2
Reed, J.H.3
-
255
-
-
77953712316
-
On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks
-
Mar.
-
H. Wang, L. Lightfoot, and T. Li, "On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks," in Proc. CISS, pp. 1-6, Mar. 2010.
-
(2010)
Proc. CISS
, pp. 1-6
-
-
Wang, H.1
Lightfoot, L.2
Li, T.3
-
256
-
-
27744501279
-
Array-transmission based physical-layer security techniques for wireless sensor networks
-
IEEE International Conference on Mechatronics and Automation, ICMA 2005
-
X. Li, M. Chen, and E. P. Ratazzi, "Array-transmission based physicallayer security techniques for wireless sensor networks," in Proc. IEEE ICMA, pp. 1618-1623, 2005. (Pubitemid 41585647)
-
(2005)
IEEE International Conference on Mechatronics and Automation, ICMA 2005
, pp. 1618-1623
-
-
Li, X.1
Chen, M.2
Ratazzi, E.P.3
-
257
-
-
70349581451
-
Quantifying eavesdropping vulnerability in sensor networks
-
Aug.
-
M. Anand, Z. Ives, and I. Lee, "Quantifying eavesdropping vulnerability in sensor networks," in Proc. 2nd Int. Workshop on Data Management For Sensor Networks, pp. 3-9, Aug. 2005.
-
(2005)
Proc. 2nd Int. Workshop on Data Management for Sensor Networks
, pp. 3-9
-
-
Anand, M.1
Ives, Z.2
Lee, I.3
-
258
-
-
84863928823
-
Scalable PHY-layer security for distributed detection in wireless sensor networks
-
Aug.
-
R. Soosahabi and M. Naraghi-Pour, "Scalable PHY-layer security for distributed detection in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1118-1126, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.4
, pp. 1118-1126
-
-
Soosahabi, R.1
Naraghi-Pour, M.2
-
259
-
-
65649139984
-
Distributed detection with censoring sensors under physical layer secrecy
-
S. Marano, V. Matta, and P. K. Willett, "Distributed detection with censoring sensors under physical layer secrecy," IEEE Trans. Signal Process., vol. 57, no. 5, pp. 1976-1986, 2009.
-
(2009)
IEEE Trans. Signal Process.
, vol.57
, Issue.5
, pp. 1976-1986
-
-
Marano, S.1
Matta, V.2
Willett, P.K.3
-
260
-
-
64549108398
-
Security and privacy for distributed multimedia sensor networks
-
Jan.
-
D. Kundur, W. Luh, U. N. Okorafor, and T. Zourntos, "Security and privacy for distributed multimedia sensor networks," Proc. of the IEEE, vol. 96, no. 1, pp. 112-130, Jan. 2008.
-
(2008)
Proc. of the IEEE
, vol.96
, Issue.1
, pp. 112-130
-
-
Kundur, D.1
Luh, W.2
Okorafor, U.N.3
Zourntos, T.4
-
261
-
-
0032120966
-
Eavesdropper performance in cellular CDMA
-
July-Aug.
-
A. McKellips and S. Verd́u, "Eavesdropper performance in cellular CDMA," European Trans. Telecommun., vol. 9, no. 4, pp. 379-390, July-Aug. 1998.
-
(1998)
European Trans. Telecommun.
, vol.9
, Issue.4
, pp. 379-390
-
-
McKellips, A.1
Verd́u, S.2
-
262
-
-
52349086199
-
The secrecy graph and some of its properties
-
Toronto, Canada July
-
M. Haenggi, "The secrecy graph and some of its properties, in Proc. IEEE ISIT, Toronto, Canada, July 2008, pp. 539-543.
-
(2008)
Proc. IEEE ISIT
, pp. 539-543
-
-
Haenggi, M.1
-
264
-
-
84855923041
-
Secure communication in stochastic wireless networks Part I: Connectivity
-
Feb.
-
P. C. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks Part I: Connectivity," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 125-138, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 125-138
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
265
-
-
77955697302
-
Modeling location uncertainty for eavesdroppers: A secrecy graph approach
-
Austin, USA, June
-
S. Goel, V. Aggarwal, A. Yener, and A. R. Calderbank, "Modeling location uncertainty for eavesdroppers: A secrecy graph approach," in Proc. IEEE ISIT, Austin, USA, June 2010, pp. 2627-2631.
-
(2010)
Proc. IEEE ISIT
, pp. 2627-2631
-
-
Goel, S.1
Aggarwal, V.2
Yener, A.3
Calderbank, A.R.4
-
266
-
-
84855911932
-
Secure communication in stochastic wireless networks-Part II: Maximum rate and collusion
-
Feb.
-
P. C. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks-Part II: Maximum rate and collusion," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 139-147, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 139-147
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
267
-
-
84860255627
-
On secrecy capacity scaling in wireless networks
-
May
-
O. O. Koyluoglu, C. E. Koksal, and H. E. Gamal, "On secrecy capacity scaling in wireless networks," IEEE Trans. Inf. Theory, vol. 58, no. 5, pp. 3000-3015, May 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.5
, pp. 3000-3015
-
-
Koyluoglu, O.O.1
Koksal, C.E.2
Gamal, H.E.3
-
268
-
-
70449514137
-
Secrecy throughput of MANETs with malicious nodes
-
Seoul, Korea June
-
Y. Liang, H. Poor, and L. Ying, "Secrecy throughput of MANETs with malicious nodes," in Proc. IEEE ISIT, pp. 1189-1193, Seoul, Korea, June 2009.
-
(2009)
Proc. IEEE ISIT
, pp. 1189-1193
-
-
Liang, Y.1
Poor, H.2
Ying, L.3
-
269
-
-
84861618493
-
Secret communication in large wireless networks without eavesdropper location information
-
Orlando, USA, Mar.
-
C. Capar, D. Goeckel, B. Liu, and D. Towsley, "Secret communication in large wireless networks without eavesdropper location information," in Proc. IEEE INFOCOM, Orlando, USA, Mar. 2012, pp. 1152-1160.
-
(2012)
Proc. IEEE INFOCOM
, pp. 1152-1160
-
-
Capar, C.1
Goeckel, D.2
Liu, B.3
Towsley, D.4
-
270
-
-
84860402665
-
On the throughput cost of physical layer security in decentralized wireless networks
-
Aug.
-
X. Zhou, R. K. Ganti, J. G. Andrews, and A. Hjørungnes, "On the throughput cost of physical layer security in decentralized wireless networks," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2764-2775, Aug. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.8
, pp. 2764-2775
-
-
Zhou, X.1
Ganti, R.K.2
Andrews, J.G.3
Hjørungnes, A.4
-
271
-
-
84880159277
-
Physical layer security in cellular networks: A stochastic geometry approach
-
June
-
H. Wang, X. Zhou, and M. C. Reed, "Physical layer security in cellular networks: A stochastic geometry approach," IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2776-2787, June 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.6
, pp. 2776-2787
-
-
Wang, H.1
Zhou, X.2
Reed, M.C.3
-
272
-
-
84901273276
-
Secrecy transmission capacity of random networks
-
Pacific Grove, CA
-
S. Vuppala and G. Abreu, "Secrecy transmission capacity of random networks," in Proc. 47th Asilomar Conf., Pacific Grove, CA, 2013.
-
(2013)
Proc. 47th Asilomar Conf.
-
-
Vuppala, S.1
Abreu, G.2
-
273
-
-
79951681560
-
Secure wireless network connectivity with multi-antenna transmission
-
Feb.
-
X. Zhou, R. Ganti, and J. Andrews, "Secure wireless network connectivity with multi-antenna transmission," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 425-430, Feb. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.2
, pp. 425-430
-
-
Zhou, X.1
Ganti, R.2
Andrews, J.3
-
274
-
-
84881086388
-
Secure connectivity using randomize-and-forward strategy in cooperative wireless networks
-
July
-
C. Cai, Y. Cai, W. Yang, and W. Yang, "Secure connectivity using randomize-and-forward strategy in cooperative wireless networks," IEEE Commun. Lett., vol. 17, no. 7, pp. 1340-1343, July 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.7
, pp. 1340-1343
-
-
Cai, C.1
Cai, Y.2
Yang, W.3
Yang, W.4
-
275
-
-
84883430599
-
Distributed network secrecy
-
Sep.
-
J. Lee, A. Conti, A. Rabbachin, and M. Z. Win, "Distributed network secrecy," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1889-1900, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1889-1900
-
-
Lee, J.1
Conti, A.2
Rabbachin, A.3
Win, M.Z.4
-
276
-
-
0034228863
-
Authentication theory and hypothesis testing
-
July
-
U. M. Maurer, "Authentication theory and hypothesis testing," IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1350-1356, July 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.4
, pp. 1350-1356
-
-
Maurer, U.M.1
-
277
-
-
23744510451
-
Authentication with distortion criteria
-
DOI 10.1109/TIT.2005.850123
-
E. Martinian, G. W. Wornell, and B. Chen, "Authentication with distortion criteria," IEEE Trans. Inf. Theory, vol. 51, no. 7, pp. 2523-2542, July 2005. (Pubitemid 41136406)
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.7
, pp. 2523-2542
-
-
Martinian, E.1
Wornell, G.W.2
Chen, B.3
-
278
-
-
61349140043
-
Authentication over noisy channels
-
Feb.
-
L. Lai, H. El Gamal, and H. V. Poor, "Authentication over noisy channels," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 906-916, Feb. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.2
, pp. 906-916
-
-
Lai, L.1
El Gamal, H.2
Poor, H.V.3
-
279
-
-
39449137863
-
Physical-layer authentication
-
DOI 10.1109/TIFS.2007.916273
-
P. L. Yu, J. Baras, and B. Sadler, "Physical-layer authentication," IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 38-51, Mar. 2008. (Pubitemid 351270071)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.1
, pp. 38-51
-
-
Yu, P.L.1
Baras, J.S.2
Sadler, B.M.3
-
280
-
-
67650676864
-
Power allocation tradeoffs in multicarrier authentication systems
-
P. L. Yu, J. Baras, and B. Sadler, "Power allocation tradeoffs in multicarrier authentication systems, in Proc. IEEE Sarnoff Symp., 2009.
-
(2009)
Proc. IEEE Sarnoff Symp.
-
-
Yu, P.L.1
Baras, J.2
Sadler, B.3
-
281
-
-
33847300575
-
Short paper: A signal fingerprinting paradigm for general physical layer and sensor network security and assurance
-
T. Daniels, M. Mina, and S. F. Russell, "Short paper: a signal fingerprinting paradigm for general physical layer and sensor network security and assurance," in Proc. IEEE 1st Int. Conf. on Security and Privacy for Emerging Areas in Commun. Networks, pp. 219-221, 2005.
-
(2005)
Proc. IEEE 1st Int. Conf. on Security and Privacy for Emerging Areas in Commun. Networks
, pp. 219-221
-
-
Daniels, T.1
Mina, M.2
Russell, S.F.3
-
282
-
-
34247324807
-
Detecting identity-based attacks in wireless networks using signalprints
-
DOI 10.1145/1161289.1161298, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
-
D. B. Faria and D. R. Cheriton, "Detecting identity-based attacks in wireless networks using signalprints," in Proc. ACM Workshop on Wireless Security, pp. 43-52, 2006. (Pubitemid 46634301)
-
(2006)
WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
, vol.2006
, pp. 43-52
-
-
Faria, D.B.1
Cheriton, D.R.2
-
284
-
-
48049094399
-
Detecting and localizing wireless spoofing attacks
-
Y. Chen, W. Trappe, and R. P. Martin, "Detecting and localizing wireless spoofing attacks," in Proc. IEEE Conf. on Sensor, Mesh and Ad Hoc Commun. and Networks, 2007.
-
(2007)
Proc. IEEE Conf. on Sensor, Mesh and Ad Hoc Commun. and Networks
-
-
Chen, Y.1
Trappe, W.2
Martin, R.P.3
-
285
-
-
38549124508
-
Fingerprints in the ether: Using the physical layer for wireless authentication
-
L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Fingerprints in the ether: using the physical layer for wireless authentication," in Proc. IEEE ICC, 2007.
-
(2007)
Proc. IEEE ICC
-
-
Xiao, L.1
Greenstein, L.J.2
Mandayam, N.B.3
Trappe, W.4
-
286
-
-
51249120889
-
A physical layer technique to enhance authentication for mobile terminals
-
L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "A physical layer technique to enhance authentication for mobile terminals," in Proc. IEEE ICC, 2008.
-
(2008)
Proc. IEEE ICC
-
-
Xiao, L.1
Greenstein, L.J.2
Mandayam, N.B.3
Trappe, W.4
-
287
-
-
73049092718
-
Channelbased spoofing detection in frequency-selective Rayleigh channels
-
Dec.
-
L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Channelbased spoofing detection in frequency-selective Rayleigh channels," IEEE Trans. Wireless Commun., vol. 8, no. 12, pp. 5948-5956, Dec. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.12
, pp. 5948-5956
-
-
Xiao, L.1
Greenstein, L.J.2
Mandayam, N.B.3
Trappe, W.4
-
288
-
-
79551640226
-
PHY-authentication protocol for spoofing detection in wireless networks
-
L. Xiao, A. Reznik, W. Trappe, C. Ye, Y. Shah, L. J. Greenstein, and N. B. Mandayam, "PHY-authentication protocol for spoofing detection in wireless networks," in Proc. IEEE GLOBECOM, 2010.
-
(2010)
Proc. IEEE GLOBECOM
-
-
Xiao, L.1
Reznik, A.2
Trappe, W.3
Ye, C.4
Shah, Y.5
Greenstein, L.J.6
Mandayam, N.B.7
-
289
-
-
84883373500
-
Wireless user authentication via comparison of power spectral densities
-
Sep.
-
J. K. Tugnait, "Wireless user authentication via comparison of power spectral densities," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1791-1802, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1791-1802
-
-
Tugnait, J.K.1
-
290
-
-
77958096949
-
Non-cryptographic authentication and identification in wireless networks
-
Oct.
-
K. Zeng, K. Govindan, and P. Mohapatra, "Non-cryptographic authentication and identification in wireless networks," IEEE Wireless Commun., vol. 17, no. 5, pp. 56-62, Oct. 2010.
-
(2010)
IEEE Wireless Commun
, vol.17
, Issue.5
, pp. 56-62
-
-
Zeng, K.1
Govindan, K.2
Mohapatra, P.3
-
291
-
-
84864117726
-
Physical layer authentication over MIMO fading wiretap channels
-
July
-
P. Baracca, N. Laurenti, and S. Tomasin, "Physical layer authentication over MIMO fading wiretap channels," IEEE Trans. Wireless Commun., vol. 11, no. 7, pp. 2564-2573, July 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.7
, pp. 2564-2573
-
-
Baracca, P.1
Laurenti, N.2
Tomasin, S.3
-
292
-
-
84883369844
-
Practical physical layer security schemes for MIMO-OFDM systems using precoding matrix indices
-
Sep.
-
C.-Y. Wu, P.-C. Lan, P.-C. Yeh, C.-H. Lee, and C.-M. Cheng, "Practical physical layer security schemes for MIMO-OFDM systems using precoding matrix indices," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1687-1700, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1687-1700
-
-
Wu, C.-Y.1
Lan, P.-C.2
Yeh, P.-C.3
Lee, C.-H.4
Cheng, C.-M.5
-
293
-
-
84906713135
-
A survey on security aspects for LTE and LTE-A networks
-
Available on Early Access
-
J. Cao, M. Ma, H. Li, Y. Zhang, and Z. Luo, "A survey on security aspects for LTE and LTE-A networks," to appear, IEEE Commun. Surveys and Tutorials. Available on Early Access.
-
IEEE Commun. Surveys and Tutorials
-
-
Cao, J.1
Ma, M.2
Li, H.3
Zhang, Y.4
Luo, Z.5
-
294
-
-
84864883415
-
Physical layer security in wireless smart grid
-
Aug.
-
L. Eun-Kyu, M. Gerla, and S. Y. Oh, "Physical layer security in wireless smart grid," IEEE Commun. Mag., vol. 50, no. 8, pp. 46-52, Aug. 2012.
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.8
, pp. 46-52
-
-
Eun-Kyu, L.1
Gerla, M.2
Oh, S.Y.3
-
296
-
-
84891357173
-
Secrecy capacity optimization in coordinated multi-point processing
-
Budapest, Hungary
-
M. Zhang, R. Xue, H. Yu, H. Luo, and W. Chen, "Secrecy capacity optimization in coordinated multi-point processing," in Proc. IEEE ICC, Budapest, Hungary, 2013.
-
(2013)
Proc. IEEE ICC
-
-
Zhang, M.1
Xue, R.2
Yu, H.3
Luo, H.4
Chen, W.5
-
297
-
-
84861906601
-
Spatial data encryption using phase conjugating lenses
-
June
-
O. Malyuskin and V. Fusco, "Spatial data encryption using phase conjugating lenses," IEEE Trans. Antennas Propag., vol. 60, no. 6, pp. 2913-2920, June 2012.
-
(2012)
IEEE Trans. Antennas Propag.
, vol.60
, Issue.6
, pp. 2913-2920
-
-
Malyuskin, O.1
Fusco, V.2
-
298
-
-
80051779980
-
Secure communications over wireless broadcast networks: Stability and utility maximization
-
Sep.
-
Y. Liang, H. V. Poor, and L. Ying, "Secure communications over wireless broadcast networks: Stability and utility maximization," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 682-782, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 682-782
-
-
Liang, Y.1
Poor, H.V.2
Ying, L.3
-
299
-
-
84883421953
-
Achieving full secrecy rate with low packet delays: An optimal control approach
-
Sep.
-
Z. Mao, C. E. Koksal, and N. B. Shroff, "Achieving full secrecy rate with low packet delays: An optimal control approach," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1944-1956, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1944-1956
-
-
Mao, Z.1
Koksal, C.E.2
Shroff, N.B.3
|