-
1
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
2
-
-
52349104395
-
The secrecy capacity of a class of parallel Gaussian compound wiretap channels
-
Toronto, ON, Canada, Jul.
-
T. Liu, V. Prabhakaran, and S. Vishwanath, "The secrecy capacity of a class of parallel Gaussian compound wiretap channels," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Toronto, ON, Canada, Jul. 2008, pp. 116-120.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 116-120
-
-
Liu, T.1
Prabhakaran, V.2
Vishwanath, S.3
-
3
-
-
44049101918
-
On the achievable secrecy throughput of block fading channels with no channel state information at transmitter
-
Baltimore, MD, USA, Mar.
-
X. Tang, R. Liu, and P. Spasojevic, "On the achievable secrecy throughput of block fading channels with no channel state information at transmitter," in Proc. 41st Annu. Conf. Inf. Sci. Syst. (CISS), Baltimore, MD, USA, Mar. 2007, pp. 917-922.
-
(2007)
Proc. 41st Annu. Conf. Inf. Sci. Syst. (CISS)
, pp. 917-922
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
-
4
-
-
84863913546
-
Physical-layer secrecy for OFDM transmissions over fading channels
-
Aug.
-
F. Renna, N. Laurenti, and H. V. Poor, "Physical-layer secrecy for OFDM transmissions over fading channels," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1354-1367, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.4
, pp. 1354-1367
-
-
Renna, F.1
Laurenti, N.2
Poor, H.V.3
-
5
-
-
78751547576
-
High SNR secrecy rates with OFDM signaling over fading channels
-
Istanbul, Turkey, Sep.
-
F. Renna, N. Laurenti, and H. V. Poor, "High SNR secrecy rates with OFDM signaling over fading channels," in Proc. IEEE Int. Symp. Pers., Indoor Mobile Radio Commun. (PIMRC), Istanbul, Turkey, Sep. 2010, pp. 2692-2697.
-
(2010)
Proc. IEEE Int. Symp. Pers., Indoor Mobile Radio Commun. (PIMRC)
, pp. 2692-2697
-
-
Renna, F.1
Laurenti, N.2
Poor, H.V.3
-
6
-
-
84883698532
-
On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels
-
Sep.
-
P.-H. Lin, S.-H. Lai, S.-C. Lin, and H.-J. Su, "On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1728-1740, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1728-1740
-
-
Lin, P.-H.1
Lai, S.-H.2
Lin, S.-C.3
Su, H.-J.4
-
7
-
-
84872727645
-
On secrecy capacity of fast fading multipleinput wiretap channels with statistical CSIT
-
Feb.
-
S.-C. Lin and P.-H. Lin, "On secrecy capacity of fast fading multipleinput wiretap channels with statistical CSIT," IEEE Trans. Inf. Forensics Security, vol. 8, no. 2, pp. 414-419, Feb. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.2
, pp. 414-419
-
-
Lin, S.-C.1
Lin, P.-H.2
-
8
-
-
80051953037
-
Strong secrecy for erasure wiretap channels
-
Dublin, Ireland, Aug./Sep.
-
A. T. Suresh, A. Subramanian, A. Thangaraj, M. Bloch, and S. W. McLaughlin, "Strong secrecy for erasure wiretap channels," in Proc. IEEE Inf. Theory Workshop (ITW), Dublin, Ireland, Aug./Sep. 2010, pp. 1-5.
-
(2010)
Proc. IEEE Inf. Theory Workshop (ITW)
, pp. 1-5
-
-
Suresh, A.T.1
Subramanian, A.2
Thangaraj, A.3
Bloch, M.4
McLaughlin, S.W.5
-
9
-
-
80053941690
-
Achieving the secrecy capacity of wiretap channels using polar codes
-
Oct.
-
H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6428-6443, Oct. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.10
, pp. 6428-6443
-
-
Mahdavifar, H.1
Vardy, A.2
-
10
-
-
84866288919
-
Polar coding for secure transmission and key agreement
-
Oct.
-
O. O. Koyluoglu and H. El Gamal, "Polar coding for secure transmission and key agreement," IEEE Trans. Inf. Forensics Security, vol. 7, no. 5, pp. 1472-1483, Oct. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.5
, pp. 1472-1483
-
-
Koyluoglu, O.O.1
El Gamal, H.2
-
11
-
-
64549110900
-
On the secrecy capacity of arbitrary wiretap channels
-
Urbana, IL, USA, Sep.
-
M. Bloch and J. N. Laneman, "On the secrecy capacity of arbitrary wiretap channels," in Proc. IEEE Allerton Conf. Commun., Control, Comput., Urbana, IL, USA, Sep. 2008, pp. 818-825.
-
(2008)
Proc. IEEE Allerton Conf. Commun., Control, Comput.
, pp. 818-825
-
-
Bloch, M.1
Laneman, J.N.2
-
12
-
-
80051774472
-
Secret-sharing LDPC codes for the BPSK-constrained Gaussian wiretap channel
-
Sep.
-
C. W. Wong, T. F. Wong, and J. M. Shea, "Secret-sharing LDPC codes for the BPSK-constrained Gaussian wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 551-564, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 551-564
-
-
Wong, C.W.1
Wong, T.F.2
Shea, J.M.3
-
13
-
-
77951552499
-
LDPC for physical layer security
-
Honolulu, HI, USA, Nov./Dec.
-
D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, and B.-J. Kwak, "LDPC for physical layer security," in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), Honolulu, HI, USA, Nov./Dec. 2009, pp. 1-6.
-
(2009)
Proc. IEEE Global Telecommun. Conf. (GLOBECOM)
, pp. 1-6
-
-
Klinc, D.1
Ha, J.2
McLaughlin, S.W.3
Barros, J.4
Kwak, B.-J.5
-
14
-
-
80051720839
-
LDPC codes for the Gaussian wiretap channel
-
Sep.
-
D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, and B.-J. Kwak, "LDPC codes for the Gaussian wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 532-540, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 532-540
-
-
Klinc, D.1
Ha, J.2
McLaughlin, S.W.3
Barros, J.4
Kwak, B.-J.5
-
15
-
-
80051943355
-
Non-systematic codes for physical layer security
-
Dublin, Ireland, Aug./Sep.
-
M. Baldi, M. Bianchi, and F. Chiaraluce, "Non-systematic codes for physical layer security," in Proc. IEEE Inf. Theory Workshop (ITW), Dublin, Ireland, Aug./Sep. 2010, pp. 1-5.
-
(2010)
Proc. IEEE Inf. Theory Workshop (ITW)
, pp. 1-5
-
-
Baldi, M.1
Bianchi, M.2
Chiaraluce, F.3
-
16
-
-
80051956332
-
Increasing physical layer security through scrambled codes and ARQ
-
Kyoto, Japan, Jun.
-
M. Baldi, M. Bianchi, and F. Chiaraluce, "Increasing physical layer security through scrambled codes and ARQ," in Proc. IEEE Int. Conf. Commun. (ICC), Kyoto, Japan, Jun. 2011, pp. 1-5.
-
(2011)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 1-5
-
-
Baldi, M.1
Bianchi, M.2
Chiaraluce, F.3
-
17
-
-
84861172829
-
Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: A security gap analysis
-
Jun.
-
M. Baldi, M. Bianchi, and F. Chiaraluce, "Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: A security gap analysis," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 883-894, Jun. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.3
, pp. 883-894
-
-
Baldi, M.1
Bianchi, M.2
Chiaraluce, F.3
-
18
-
-
80051727864
-
Coding for cryptographic security enhancement using stopping sets
-
Sep.
-
W. K. Harrison, J. Almeida, S. W. McLaughlin, and J. Barros, "Coding for cryptographic security enhancement using stopping sets," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 575-584, Sep. 2011
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 575-584
-
-
Harrison, W.K.1
Almeida, J.2
McLaughlin, S.W.3
Barros, J.4
-
19
-
-
79952706123
-
Rethinking the secrecy outage formulation: A secure transmission design perspective
-
Mar.
-
X. Zhou, M. R. McKay, B. Maham, and A. Hjørungnes, "Rethinking the secrecy outage formulation: A secure transmission design perspective," IEEE Commun. Lett., vol. 15, no. 3, pp. 302-304, Mar. 2011.
-
(2011)
IEEE Commun. Lett.
, vol.15
, Issue.3
, pp. 302-304
-
-
Zhou, X.1
McKay, M.R.2
Maham, B.3
Hjørungnes, A.4
-
21
-
-
84940654702
-
Secrecy capacity of independent parallel channels
-
Monticello, IL, USA, Sep.
-
Z. Li, R. Yates, and W. Trappe, "Secrecy capacity of independent parallel channels," in Proc. Annu. Allerton Conf. Commun., Control, Comput., Monticello, IL, USA, Sep. 2006, pp. 841-848.
-
(2006)
Proc. Annu. Allerton Conf. Commun., Control, Comput.
, pp. 841-848
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
22
-
-
67650239840
-
Resource allocation for the wire-tap multi-carrier broadcast channel
-
St. Petersburg, Russia, Jun.
-
E. A. Jorswieck and A. Wolf, "Resource allocation for the wire-tap multi-carrier broadcast channel," in Proc. IEEE Int. Conf. Telecommun. (ICT), St. Petersburg, Russia, Jun. 2008, pp. 1-6.
-
(2008)
Proc. IEEE Int. Conf. Telecommun. (ICT)
, pp. 1-6
-
-
Jorswieck, E.A.1
Wolf, A.2
-
24
-
-
85032751057
-
Coding for secrecy: An overview of error-control coding techniques for physical-layer security
-
Sep.
-
W. K. Harrison, J. Almeida, M. R. Bloch, S. W. McLaughlin, and J. Barros, "Coding for secrecy: An overview of error-control coding techniques for physical-layer security," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 41-50, Sep. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.5
, pp. 41-50
-
-
Harrison, W.K.1
Almeida, J.2
Bloch, M.R.3
McLaughlin, S.W.4
Barros, J.5
-
25
-
-
0035333909
-
Computing the free distance of turbo codes and serially concatenated codes with interleavers: Algorithms and applications
-
May
-
R. Garello, P. Pierleoni, and S. Benedetto, "Computing the free distance of turbo codes and serially concatenated codes with interleavers: Algorithms and applications," IEEE J. Sel. Areas Commun., vol. 19, no. 5, pp. 800-812, May 2001.
-
(2001)
IEEE J. Sel. Areas Commun.
, vol.19
, Issue.5
, pp. 800-812
-
-
Garello, R.1
Pierleoni, P.2
Benedetto, S.3
-
26
-
-
10644271782
-
Sphere-packing bounds revisited for moderate block lengths
-
Dec.
-
A. Valembois and M. P. C. Fossorier, "Sphere-packing bounds revisited for moderate block lengths," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 2998-3014, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 2998-3014
-
-
Valembois, A.1
Fossorier, M.P.C.2
-
27
-
-
33746660309
-
Iterative soft-input soft-output decoding of Reed-Solomon codes by adapting the parity-check matrix
-
Aug.
-
J. Jiang and K. R. Narayanan, "Iterative soft-input soft-output decoding of Reed-Solomon codes by adapting the parity-check matrix," IEEE Trans. Inf. Theory, vol. 52, no. 8, pp. 3746-3756, Aug. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.8
, pp. 3746-3756
-
-
Jiang, J.1
Narayanan, K.R.2
-
29
-
-
0035681297
-
Progressive edgegrowth Tanner graphs
-
San Antonio, TX, USA, Nov.
-
X.-Y. Hu, E. Eleftheriou, and D.-M. Arnold, "Progressive edgegrowth Tanner graphs," in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), San Antonio, TX, USA, Nov. 2001, pp. 995-1001.
-
(2001)
Proc. IEEE Global Telecommun. Conf. (GLOBECOM)
, pp. 995-1001
-
-
Hu, X.-Y.1
Eleftheriou, E.2
Arnold, D.-M.3
-
30
-
-
0030110651
-
Iterative decoding of binary block and convolutional codes
-
Mar.
-
J. Hagenauer, E. Offer, and L. Papke, "Iterative decoding of binary block and convolutional codes," IEEE Trans. Inf. Theory, vol. 42, no. 2, pp. 429-445, Mar. 1996.
-
(1996)
IEEE Trans. Inf. Theory
, vol.42
, Issue.2
, pp. 429-445
-
-
Hagenauer, J.1
Offer, E.2
Papke, L.3
-
31
-
-
50949118926
-
Error rate analysis for coded multicarrier systems over quasi-static fading channels
-
San Francisco, CA, USA, Nov./Dec.
-
C. Snow, L. Lampe, and R. Schober, "Error rate analysis for coded multicarrier systems over quasi-static fading channels," in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), San Francisco, CA, USA, Nov./Dec. 2006, pp. 1-5.
-
(2006)
Proc. IEEE Global Telecommun. Conf. (GLOBECOM)
, pp. 1-5
-
-
Snow, C.1
Lampe, L.2
Schober, R.3
-
32
-
-
76349105285
-
Product of shifted exponential variates and outage capacity of multicarrier systems
-
Aalborg, Denmark, May
-
F. Yilmaz and M.-S. Alouini, "Product of shifted exponential variates and outage capacity of multicarrier systems," in Proc. Eur. Wireless Conf., Aalborg, Denmark, May 2009, pp. 282-286.
-
(2009)
Proc. Eur. Wireless Conf.
, pp. 282-286
-
-
Yilmaz, F.1
Alouini, M.-S.2
-
33
-
-
84907557409
-
Minimum-weight codewords in the (128,64) BCH code
-
Washington, DC, USA, Tech. Rep. Dec.
-
L. D. Baumert and L. R. Welch, "Minimum-weight codewords in the (128,64) BCH code," NASA, Washington, DC, USA, Tech. Rep. 42-42, Dec. 1977.
-
(1977)
NASA
, pp. 42-42
-
-
Baumert, L.D.1
Welch, L.R.2
-
34
-
-
84907062399
-
Probability of error for optimal codes in a Gaussian channel
-
May
-
C. E. Shannon, "Probability of error for optimal codes in a Gaussian channel," Bell Syst. Tech. J., vol. 38, no. 3, pp. 611-656, May 1959.
-
(1959)
Bell Syst. Tech. J.
, vol.38
, Issue.3
, pp. 611-656
-
-
Shannon, C.E.1
-
35
-
-
43749116220
-
An improved sphere-packing bound for finite-length codes over symmetric memoryless channels
-
May
-
G. Wiechman and I. Sason, "An improved sphere-packing bound for finite-length codes over symmetric memoryless channels," IEEE Trans. Inf. Theory, vol. 54, no. 5, pp. 1962-1990, May 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.5
, pp. 1962-1990
-
-
Wiechman, G.1
Sason, I.2
|