-
1
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The Wire-Tap Channel, " Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast Channels with Confidential Messages, " IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
3
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Information Theoretic Security, " Foundations and Trends in Communications and Information Theory, vol. 5, no. 4-5, pp. 355-580, 2009.
-
(2009)
Foundations and Trends in Communications and Information Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
6
-
-
0037670845
-
The Capacity of a Class of Channels
-
Dec.
-
D. Blackwell, L. Breiman, and A. J. Thomasian, "The Capacity of a Class of Channels, " Ann. Math. Stat., vol. 30, no. 4, pp. 1229-1241, Dec. 1959.
-
(1959)
Ann. Math. Stat.
, vol.30
, Issue.4
, pp. 1229-1241
-
-
Blackwell, D.1
Breiman, L.2
Thomasian, A.J.3
-
7
-
-
29144441674
-
Simultaneous channels
-
J. Wolfowitz, "Simultaneous Channels, " Arch. Rational Mech. Analysis, vol. 4, no. 4, pp. 371-386, 1960.
-
(1960)
Arch. Rational Mech. Analysis
, vol.4
, Issue.4
, pp. 371-386
-
-
Wolfowitz, J.1
-
8
-
-
73449104694
-
Compound wiretap channels
-
Article ID 142374
-
Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), "Compound Wiretap Channels, " EURASIP J. Wireless Commun. Netw., vol. Article ID 142374, pp. 1-13, 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw.
, pp. 1-13
-
-
Liang, Y.1
Kramer, G.2
Poor, H.V.3
Shamai, S.4
-
9
-
-
84876274641
-
Secrecy results for compound wiretap channels
-
Mar.
-
I. Bjelaković, H. Boche, and J. Sommerfeld, "Secrecy Results for Compound Wiretap Channels, " Probl. Inf. Transmission, vol. 49, no. 1, pp. 73-98, Mar. 2013.
-
(2013)
Probl. Inf. Transmission
, vol.49
, Issue.1
, pp. 73-98
-
-
Bjelaković, I.1
Boche, H.2
Sommerfeld, J.3
-
10
-
-
77953692409
-
On gaussian MIMO compound wiretap channels
-
Baltimore, MD, USA, Mar.
-
E. Ekrem and S. Ulukus, "On Gaussian MIMO Compound Wiretap Channels, " in Proc. Conf. Inf. Sciences and Systems, Baltimore, MD, USA, Mar. 2010, pp. 1-6.
-
(2010)
Proc. Conf. Inf. Sciences and Systems
, pp. 1-6
-
-
Ekrem, E.1
Ulukus, S.2
-
11
-
-
79955497445
-
Interference alignment for the multiantenna compound wiretap channel
-
May
-
A. Khisti, "Interference Alignment for the Multiantenna Compound Wiretap Channel, " IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 2976-2993, May 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.5
, pp. 2976-2993
-
-
Khisti, A.1
-
12
-
-
84893328786
-
The Secrecy Capacity of a Compound MIMO Gaussian Channel
-
R. F. Schaefer and S. Loyka, "The Secrecy Capacity of a Compound MIMO Gaussian Channel, " in Proc. IEEE Inf. Theory Workshop, Seville, Spain, Sep. 2013, pp. 104-108.
-
(2013)
Proc. IEEE Inf. Theory Workshop, Seville, Spain, Sep.
, pp. 104-108
-
-
Schaefer, R.F.1
Loyka, S.2
-
13
-
-
70449513409
-
On the compound MIMO broadcast channels with confidential messages
-
M. Kobayashi, Y. Liang, S. Shamai (Shitz), and M. Debbah, "On the Compound MIMO Broadcast Channels with Confidential Messages, " in Proc. IEEE Int. Symp. Inf. Theory, Seoul, Korea, Jun. 2009, pp. 1283-1287.
-
(2009)
Proc. IEEE Int. Symp. Inf. Theory, Seoul, Korea, Jun.
, pp. 1283-1287
-
-
Kobayashi, M.1
Liang, Y.2
Shamai, S.3
Debbah, M.4
-
14
-
-
84867518740
-
Strong secrecy in compound broadcast channels with confidential messages
-
R. F. Wyrembelski and H. Boche, "Strong Secrecy in Compound Broadcast Channels with Confidential Messages, " in Proc. IEEE Int. Symp. Inf. Theory, Cambridge, MA, USA, Jul. 2012, pp. 76-80.
-
Proc. IEEE Int. Symp. Inf. Theory, Cambridge, MA, USA, Jul.
, vol.2012
, pp. 76-80
-
-
Wyrembelski, R.F.1
Boche, H.2
-
15
-
-
40949147785
-
Multiple-access channels with confidential messages
-
Mar.
-
Y. Liang and H. V. Poor, "Multiple-Access Channels With Confidential Messages, " IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.3
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
16
-
-
46749102916
-
Multiple access channels with generalized feedback and confidential messages
-
X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "Multiple Access Channels with Generalized Feedback and Confidential Messages, " in Proc. IEEE Inf. Theory Workshop, Lake Tahoe, CA, USA, Sep. 2007, pp. 608-613.
-
(2007)
Proc. IEEE Inf. Theory Workshop, Lake Tahoe, CA, USA, Sep.
, pp. 608-613
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.V.4
-
17
-
-
57349093480
-
The gaussian multiple access wire-tap channel
-
Dec.
-
E. Tekin and A. Yener, "The Gaussian Multiple Access Wire-Tap Channel, " IEEE Trans. Inf. Theory, vol. 54, no. 12, pp. 5747-5755, Dec. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.12
, pp. 5747-5755
-
-
Tekin, E.1
Yener, A.2
-
18
-
-
45249101530
-
The general gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
-
Jun.
-
-, "The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
19
-
-
64549142381
-
On the secrecy of multiple access wiretap channel
-
Urbana-Champaign, IL, USA, Sep.
-
E. Ekrem and S. Ulukus, "On the Secrecy of Multiple Access Wiretap Channel, " in Proc. 46th Annual Allerton Conf. Commun., Control, Computing, Urbana-Champaign, IL, USA, Sep. 2008, pp. 1014-1021.
-
(2008)
Proc. 46th Annual Allerton Conf. Commun., Control, Computing
, pp. 1014-1021
-
-
Ekrem, E.1
Ulukus, S.2
-
20
-
-
80051928178
-
Multiple access wiretap channels with strong secrecy
-
M. H. Yassaee and M. R. Aref, "Multiple Access Wiretap Channels with Strong Secrecy, " in Proc. IEEE Inf. Theory Workshop, Dublin, Ireland, Aug. 2010, pp. 1-5.
-
Proc. IEEE Inf. Theory Workshop, Dublin, Ireland, Aug.
, vol.2010
, pp. 1-5
-
-
Yassaee, M.H.1
Aref, M.R.2
-
21
-
-
84901432018
-
-
Springer, 2013, ch. Strong Secrecy for Multiple Access Channels
-
M. Wiese and H. Boche, Information Theory, Combinatorics, and Search Theory. Springer, 2013, ch. Strong Secrecy for Multiple Access Channels, pp. 71-122.
-
Information Theory Combinatorics and Search Theory
, pp. 71-122
-
-
Wiese, M.1
Boche, H.2
-
22
-
-
84880521772
-
MIMO multiple access channel with an arbitrarily varying eavesdropper: Secrecy degrees of freedom
-
Aug.
-
X. He, A. Khisti, and A. Yener, "MIMO Multiple Access Channel With an Arbitrarily Varying Eavesdropper: Secrecy Degrees of Freedom, " IEEE Trans. Inf. Theory, vol. 59, no. 8, pp. 4733-4745, Aug. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.8
, pp. 4733-4745
-
-
He, X.1
Khisti, A.2
Yener, A.3
-
23
-
-
0029706655
-
Almost independence and secrecy capacity
-
I. Csiszár, "Almost Independence and Secrecy Capacity, " Probl. Pered. Inform., vol. 32, no. 1, pp. 48-57, 1996.
-
(1996)
Probl. Pered. Inform.
, vol.32
, Issue.1
, pp. 48-57
-
-
Csiszár, I.1
-
24
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Springer-Verlag, May
-
U. M. Maurer and S. Wolf, "Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free, " in EUROCRYPT 2000, Lecture Notes in Computer Science. Springer-Verlag, May 2000, vol. 1807, pp. 351-368.
-
(2000)
EUROCRYPT 2000, Lecture Notes in Computer Science
, vol.1807
, pp. 351-368
-
-
Maurer, U.M.1
Wolf, S.2
-
25
-
-
84880866367
-
Wiretap channels with side information-strong secrecy capacity and optimal transceiver design
-
Aug.
-
H. Boche and R. F. Schaefer, "Wiretap Channels with Side Information-Strong Secrecy Capacity and Optimal Transceiver Design, " IEEE Trans. Inf. Forensics Security, vol. 8, no. 8, pp. 1397-1408, Aug. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.8
, pp. 1397-1408
-
-
Boche, H.1
Schaefer, R.F.2
-
26
-
-
84905280852
-
Strong secrecy and decoding performance analysis for robust broadcasting under channel uncertainty
-
May
-
R. F. Schaefer and H. Boche, "Strong Secrecy and Decoding Performance Analysis for Robust Broadcasting under Channel Uncertainty, " in Proc. IEEE Int. Conf. Acoustics, Speech, Signal Process., Florence, Italy, May 2014.
-
(2014)
Proc. IEEE Int. Conf. Acoustics, Speech, Signal Process., Florence, Italy
-
-
Schaefer, R.F.1
Boche, H.2
-
28
-
-
0000456843
-
The capacity region of a channel with two senders and two receivers
-
Oct.
-
R. Ahlswede, "The Capacity Region of a Channel with Two Senders and Two Receivers, " Ann. Prob., vol. 2, no. 5, pp. 805-814, Oct. 1974.
-
(1974)
Ann. Prob.
, vol.2
, Issue.5
, pp. 805-814
-
-
Ahlswede, R.1
-
29
-
-
0032201905
-
An information-spectrum approach to capacity theorems for the general multiple-access channel
-
Nov.
-
T. S. Han, "An Information-Spectrum Approach to Capacity Theorems for the General Multiple-Access Channel, " IEEE Trans. Inf. Theory, vol. 44, no. 7, pp. 2773-2795, Nov. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.7
, pp. 2773-2795
-
-
Han, T.S.1
-
30
-
-
33646320755
-
Über die Verteilung von Wurzeln bei gewissen alge-braischen Gleichungen mit ganzzahligen Koeffizienten
-
M. Fekete, "Ü ber die Verteilung von Wurzeln bei gewissen alge-braischen Gleichungen mit ganzzahligen Koeffizienten, " Mathematische Zeitschrift, vol. 17, no. 1, pp. 228-249, 1923.
-
(1923)
Mathematische Zeitschrift
, vol.17
, Issue.1
, pp. 228-249
-
-
Fekete, M.1
|