메뉴 건너뛰기




Volumn 9780521516501, Issue , 2011, Pages 1-329

Physical–layer security: From information theory to security engineering

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION THEORY; NETWORK LAYERS; SECURE COMMUNICATION; STUDENTS;

EID: 84926099526     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1017/CBO9780511977985     Document Type: Book
Times cited : (1261)

References (207)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, “Communication theory of secrecy systems,” Bell System Technical Journal, vol. 28, no. 4, pp. 656-715, April 1949.
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 7
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • nos. 7/10, July/October
    • C. E. Shannon, “A mathematical theory of communication,” Bell System Technical Journal, vol. 27, nos. 7/10, pp. 379-423/623-656, July/October 1948.
    • (1948) Bell System Technical Journal , vol.27
    • Shannon, C.E.1
  • 8
    • 0037272042 scopus 로고    scopus 로고
    • Capacity results for the discrete memoryless networks
    • G. Kramer, “Capacity results for the discrete memoryless networks,” IEEE Transactions on Information Theory, vol. 49, no. 1, pp. 4-21, January 2003.
    • (2003) IEEE Transactions on Information Theory , vol.49 , Issue.1 , pp. 4-21
    • Kramer, G.1
  • 9
    • 0015648934 scopus 로고
    • Noiseless coding of correlated information sources
    • D. Slepian and J. K. Wolf, “Noiseless coding of correlated information sources,” IEEE Transactions on Information Theory, vol. 19, no. 4, pp. 471-480, July 1973.
    • (1973) IEEE Transactions on Information Theory , vol.19 , Issue.4 , pp. 471-480
    • Slepian, D.1    Wolf, J.K.2
  • 10
    • 0020752342 scopus 로고
    • “writing on dirty paper
    • M. H. M. Costa, “Writing on dirty paper,” IEEE Transactions on Information Theory, vol. 29, no. 3, pp. 439-441, May 1983.
    • (1983) IEEE Transactions on Information Theory , vol.29 , Issue.3 , pp. 439-441
    • Costa, M.1
  • 11
    • 0016882596 scopus 로고
    • The rate-distortion function for source coding with side information at the decoder
    • A. Wyner and J. Ziv, “The rate-distortion function for source coding with side information at the decoder,” IEEE Transactions on Information Theory, vol. 22, no. 1, pp. 1-10, January 1976.
    • (1976) IEEE Transactions on Information Theory , vol.22 , Issue.1 , pp. 1-10
    • Wyner, A.1    Ziv, J.2
  • 12
    • 0002195239 scopus 로고
    • Multi-way communication channels
    • Thakadsor, Armenian SSR, USSR, September
    • R. Ahlswede, “Multi-way communication channels,” in Proc. International Symposium on Information Theory, Thakadsor, Armenian SSR, USSR, September 1971, pp. 23-52.
    • (1971) Proc. International Symposium on Information Theory , pp. 23-52
    • Ahlswede, R.1
  • 13
    • 84926117755 scopus 로고
    • “Multiple access channels,” Ph.D. dissertation, University of Hawaii
    • H. Liao, “Multiple access channels,” Ph.D. dissertation, University of Hawaii, 1972.
    • (1972)
    • Liao, H.1
  • 15
    • 0015601146 scopus 로고
    • Random coding theorem for broadcast channels with degraded components
    • March
    • P. Bergmans, “Random coding theorem for broadcast channels with degraded components,” IEEE Transactions on Information Theory, vol. 19, no. 2, pp. 197-207, March 1973.
    • (1973) IEEE Transactions on Information Theory , vol.19 , Issue.2 , pp. 197-207
    • Bergmans, P.1
  • 16
    • 0013082133 scopus 로고
    • Capacity and coding for degraded broadcast channels
    • R. G. Gallager, “Capacity and coding for degraded broadcast channels,” Problemy Peredachi Informatsii, vol. 10, no. 3, pp. 3-14, 1974.
    • (1974) Problemy Peredachi Informatsii , vol.10 , Issue.3 , pp. 3-14
    • Gallager, R.G.1
  • 17
    • 0032184236 scopus 로고    scopus 로고
    • Comments on broadcast channels
    • October
    • T. M. Cover, “Comments on broadcast channels,” IEEE Transactions on Information Theory, vol. 44, no. 6, pp. 2524-2530, October 1998.
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.6 , pp. 2524-2530
    • Cover, T.M.1
  • 18
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszar and J. Körner, “Broadcast channels with confidential messages,” IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Transactions on Information Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszar, I.1    Körner, J.2
  • 19
    • 0000478763 scopus 로고
    • Cipher printing telegraph systems for secret wire and radio telegraphic communications
    • January
    • G. S. Vernam, “Cipher printing telegraph systems for secret wire and radio telegraphic communications,” Transactions of the American Institute of Electrical Engineers, vol. 45, no. 1, pp. 295-301, January 1926.
    • (1926) Transactions of the American Institute of Electrical Engineers , vol.45 , Issue.1 , pp. 295-301
    • Vernam, G.S.1
  • 20
    • 5144231861 scopus 로고    scopus 로고
    • On the role of mmse estimation in approaching the information-theoretic limits of linear gaussian channels: Shannon meets wiener
    • Monticello, IL, USA, October
    • G. D. Fomey Jr., “On the role of MMSE estimation in approaching the information-theoretic limits of linear Gaussian channels: Shannon meets Wiener,” in Proc. 41st Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, October 2003, pp. 430-439.
    • (2003) Proc. 41St Annual Allerton Conference on Communication, Control, and Computing , pp. 430-439
    • Fomey, G.D.1
  • 21
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, “The wire-tap channel,” Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1367, October 1975.
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1367
    • Wyner, A.D.1
  • 22
    • 0017537504 scopus 로고
    • On a special class of wiretap channels
    • September
    • S. Leung-Yan-Cheong, “On a special class of wiretap channels,” IEEE Transactions on Information Theory, vol. 23, no. 5, pp. 625-627, September 1977.
    • (1977) IEEE Transactions on Information Theory , vol.23 , Issue.5 , pp. 625-627
    • Leung-Yan-Cheong, S.1
  • 24
    • 33750056552 scopus 로고    scopus 로고
    • Almost independence and secrecy capacity
    • January-March
    • I. Csiszar, “Almost independence and secrecy capacity,” Problemy Peredachi Informatsii, vol. 32, no. 1, pp. 40-47, January-March 1996.
    • (1996) Problemy Peredachi Informatsii , vol.32 , Issue.1 , pp. 40-47
    • Csiszar, I.1
  • 25
    • 33645727315 scopus 로고    scopus 로고
    • General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channels
    • April
    • M. Hayashi, “General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channels,” IEEE Transactions on Information Theory, vol. 52, no. 4, pp. 1562-1575, April 2006.
    • (2006) IEEE Transactions on Information Theory , vol.52 , Issue.4 , pp. 1562-1575
    • Hayashi, M.1
  • 28
    • 35848968625 scopus 로고
    • Comparison of two noisy channels
    • Keszthely, Hungary
    • J. Körner and K. Marton, “Comparison of two noisy channels,” in Proc. Topics in Information Theory, Keszthely, Hungary, 1977, pp. 411-423.
    • (1977) Proc. Topics in Information Theory , pp. 411-423
    • Körner, J.1    Marton, K.2
  • 29
    • 0031103783 scopus 로고    scopus 로고
    • On a special class of broadcast channels with confidential messages
    • March
    • M. van Dijk, “On a special class of broadcast channels with confidential messages,” IEEE Transactions on Information Theory, vol. 43, no. 2, pp. 712-714, March 1997.
    • (1997) IEEE Transactions on Information Theory , vol.43 , Issue.2 , pp. 712-714
    • Van Dijk, M.1
  • 30
    • 70449488911 scopus 로고    scopus 로고
    • Capacity regions of two new classes of 2-receiver broadcast channels
    • Seoul, South Korea, July
    • C. Nair, “Capacity regions of two new classes of 2-receiver broadcast channels,” in Proc. IEEE International Symposium on Information Theory, Seoul, South Korea, July 2009, pp. 1839-1843.
    • (2009) Proc. IEEE International Symposium on Information Theory , pp. 1839-1843
    • Nair, C.1
  • 31
    • 0031143282 scopus 로고    scopus 로고
    • Rate-distortion theory for the shannon cipher systems
    • May
    • H. Yamamoto, “Rate-distortion theory for the Shannon cipher systems,” IEEE Transactions on Information Theory, vol. 43, no. 3, pp. 827-835, May 1997.
    • (1997) IEEE Transactions on Information Theory , vol.43 , Issue.3 , pp. 827-835
    • Yamamoto, H.1
  • 32
    • 84926104429 scopus 로고
    • “Multi-user and wiretap channels including feedback,” Ph.D. dissertation, Stanford University
    • S. K. Leung-Yan-Cheong, “Multi-user and wiretap channels including feedback,” Ph.D. dissertation, Stanford University, 1976.
    • (1976)
    • Leung-Yan-Cheong, S.K.1
  • 33
    • 84870916633 scopus 로고    scopus 로고
    • Transmission, identification and common randomness capacities for wire-tap channels with secure feedback from the decoder
    • Springer-Verlag
    • R. Ahlswede and N. Cai, “Transmission, identification and common randomness capacities for wire-tap channels with secure feedback from the decoder,” in General Theory of Information Transfer and Combinatorics. Springer-Verlag, 2006, pp. 258-275.
    • (2006) General Theory of Information Transfer and Combinatorics , pp. 258-275
    • Ahlswede, R.1    Cai, N.2
  • 35
    • 0028273691 scopus 로고
    • Relations between entropy and error probability
    • January
    • M. Feder and N. Merhav, “Relations between entropy and error probability,” IEEE Transactions on Information Theory, vol. 40, no. 1, pp. 259-266, January 1994.
    • (1994) IEEE Transactions on Information Theory , vol.40 , Issue.1 , pp. 259-266
    • Feder, M.1    Merhav, N.2
  • 36
    • 51649118624 scopus 로고    scopus 로고
    • An algorithm for computing the secrecy capacity of broadcast channels with confidential messages
    • Nice, France, July
    • K. Yasui, T. Suko, and T. Matsushima, “An algorithm for computing the secrecy capacity of broadcast channels with confidential messages,” in Proc. IEEE International Symposium on Information Theory, Nice, France, July 2007, pp. 936-940.
    • (2007) Proc. IEEE International Symposium on Information Theory , pp. 936-940
    • Yasui, K.1    Suko, T.2    Matsushima, T.3
  • 41
    • 77952412339 scopus 로고    scopus 로고
    • Unbreakable keys from random noise
    • P Tuyls, B. Skoric, and T. Kevenaar, Eds. Springer-Verlag
    • U. Maurer, R. Renner, and S. Wolf, “Unbreakable keys from random noise,” in Security with Noisy Data, P Tuyls, B. Skoric, and T. Kevenaar, Eds. Springer-Verlag, 2007, pp. 21-44.
    • (2007) Security with Noisy Data , pp. 21-44
    • Maurer, U.1    Renner, R.2    Wolf, S.3
  • 42
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U. Maurer, “Secret key agreement by public discussion from common information,” IEEE Transactions on Information Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 43
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography. I. Secret sharing
    • July
    • R. Ahlswede and I. Csiszar, “Common randomness in information theory and cryptography. I. Secret sharing,”IEEE Transactions on Information Theory, vol. 39, no. 4, pp. 1121-1132, July 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 44
    • 77954600460 scopus 로고    scopus 로고
    • Information-theoretic key agreement of multiple terminals - part i
    • August
    • A. A. Gohari and V. Anantharam, “Information-theoretic key agreement of multiple terminals - part I,” IEEE Transactions on Information Theory, vol. 56, no. 8, pp. 3973-3996, August 2010.
    • (2010) IEEE Transactions on Information Theory , vol.56 , Issue.8 , pp. 3973-3996
    • Gohari, A.A.1    Anantharam, V.2
  • 45
    • 77954570193 scopus 로고    scopus 로고
    • Information-theoretic key agreement of multiple terminals - part ii: Channel models
    • August
    • A. A. Gohari and V. Anatharam, “Information-theoretic key agreement of multiple terminals - part II: Channel models,” IEEE Transactions on Information Theory, vol. 56, no. 8, pp. 3997-4010, August 2010.
    • (2010) IEEE Transactions on Information Theory , vol.56 , Issue.8 , pp. 3997-4010
    • Gohari, A.A.1    Anatharam, V.2
  • 46
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and intrinsic conditional information
    • March
    • U. M. Maurer and S. Wolf, “Unconditionally secure key agreement and intrinsic conditional information,”IEEE Transactions on Information Theory, vol. 45, no. 2, pp. 499-514, March 1999.
    • (1999) IEEE Transactions on Information Theory , vol.45 , Issue.2 , pp. 499-514
    • Maurer, U.M.1    Wolf, S.2
  • 47
    • 85032421159 scopus 로고    scopus 로고
    • “new bounds in secret-key agreement: The gap between formation and secrecy extraction,” in
    • R. Renner and S. Wolf, “New bounds in secret-key agreement: The gap between formation and secrecy extraction,” in Proc. EUROCRYPT, 2003, pp. 652-577.
    • (2003) Proc. EUROCRYPT , pp. 577-652
    • Renner, R.1    Wolf, S.2
  • 48
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • March
    • I. Csiszar and P Narayan, “Common randomness and secret key generation with a helper,”IEEE Transactions on Information Theory, vol. 46, no. 2, pp. 344-366, March 2000.
    • (2000) IEEE Transactions on Information Theory , vol.46 , Issue.2 , pp. 344-366
    • Csiszar, I.1    Narayan, P.2
  • 51
    • 77955682475 scopus 로고    scopus 로고
    • Secret key agreement from vector gaussian sources by rate limited public communications
    • Austin, TX, USA, June, see also arXiv:1001.3705v1
    • S. Watanabe and Y. Oohama, “Secret key agreement from vector Gaussian sources by rate limited public communications,” in Proc. IEEE International Symposium on Information Theory, Austin, TX, USA, June 2010, pp. 2597-2601; see also arXiv:1001.3705v1.
    • (2010) Proc. IEEE International Symposium on Information Theory , pp. 2597-2601
    • Watanabe, S.1    Oohama, Y.2
  • 53
    • 0041426716 scopus 로고    scopus 로고
    • A practical protocol for advantage distillation and information reconciliation
    • August
    • S. Liu, H. C. A. VanTilborg, and M. VanDijk, “A practical protocol for advantage distillation and information reconciliation,” Designs, Codes and Cryptography, vol. 30, no. 1, pp. 3962, August 2003.
    • (2003) Designs, Codes and Cryptography , vol.30 , Issue.1 , pp. 3962
    • Liu, S.1    Van Tilborg, H.C.2    Van Dijk, M.3
  • 56
    • 0001598288 scopus 로고
    • Secret-key reconciliation by public discussion
    • T. Helleseth, Ed. Springer-Verlag, May
    • G. Brassard and L. Salvail, “Secret-key reconciliation by public discussion,” in Proc. Advances in Cryptology - Eurocrypt, T. Helleseth, Ed. Springer-Verlag, May 1993, pp. 411-423.
    • (1993) Proc. Advances in Cryptology - Eurocrypt , pp. 411-423
    • Brassard, G.1    Salvail, L.2
  • 59
    • 1442337635 scopus 로고    scopus 로고
    • Reconciliation of a quantum-distributed gaussian key
    • February
    • G. Van Assche, J. Cardinal, and N. J. Cerf, “Reconciliation of a quantum-distributed Gaussian key,” IEEE Transactions on Information Theory, vol. 50, no. 2, pp. 394-400, February 2004.
    • (2004) IEEE Transactions on Information Theory , vol.50 , Issue.2 , pp. 394-400
    • Van Assche, G.1    Cardinal, J.2    Cerf, N.J.3
  • 61
    • 33751025487 scopus 로고    scopus 로고
    • Ldpc-based gaussian key reconciliation
    • Punta del Este, Uruguay, March, extended report
    • M. Bloch, A. Thangaraj, S. W. McLaughlin, and J.-M. Merolla, “LDPC-based Gaussian key reconciliation,” in Proc. IEEE Information Theory Workshop, Punta del Este, Uruguay, March 2006, pp. 116-120; extended report available at arXiv:cs.IT/0509041.
    • (2006) Proc. IEEE Information Theory Workshop , pp. 116-120
    • Bloch, M.1    Thangaraj, A.2    Mc Laughlin, S.W.3    Merolla, J.-M.4
  • 66
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • June
    • M. N. Wegman and J. Carter, “New hash functions and their use in authentication and set equality,” Journal of Computer Sciences and Systems, vol. 22, no. 3, pp. 265-279, June 1981.
    • (1981) Journal of Computer Sciences and Systems , vol.22 , Issue.3 , pp. 265-279
    • Wegman, M.N.1    Carter, J.2
  • 67
    • 0000410707 scopus 로고
    • “universal hashing and authentication codes
    • October
    • D. R. Stinson, “Universal hashing and authentication codes,” Designs, Codes and Cryptography, vol. 4, no. 4, pp. 369-380, October 1994.
    • (1994) Designs, Codes and Cryptography , vol.4 , Issue.4 , pp. 369-380
    • Stinson, D.R.1
  • 68
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • B. Preneel, Ed. SpringerVerlag
    • U. M. Maurer and S. Wolf, “Information-theoretic key agreement: From weak to strong secrecy for free,” in Advances in Cryptology - Eurocrypt 2000, B. Preneel, Ed. SpringerVerlag, 2000, p. 351.
    • (2000) Advances in Cryptology - Eurocrypt , vol.2000 , pp. 351
    • Maurer, U.M.1    Wolf, S.2
  • 69
    • 84926074182 scopus 로고    scopus 로고
    • “Extracting all the randomness from a weakly random source,” Massachusetts Institute of Technology, Cambridge, MA, USA, Technical Report
    • S. Vadhan, “Extracting all the randomness from a weakly random source,” Massachusetts Institute of Technology, Cambridge, MA, USA, Technical Report, 1998.
    • (1998)
    • Vadhan, S.1
  • 70
    • 84926109194 scopus 로고    scopus 로고
    • “Entropy measures and unconditional security in cryptography.” Ph.D. dissertation, ETH Zürich, Zurich, Switzerland
    • C. Cachin, “Entropy measures and unconditional security in cryptography.” Ph.D. dissertation, ETH Zürich, Zurich, Switzerland, 1997.
    • (1997)
    • Cachin, C.1
  • 71
    • 0001777508 scopus 로고    scopus 로고
    • Linking information reconciliation and privacy amplification
    • March
    • C. Cachin and U. M. Maurer, “Linking information reconciliation and privacy amplification,” Journal of Cryptology, vol. 10, no. 2, pp. 97-110, March 1997.
    • (1997) Journal of Cryptology , vol.10 , Issue.2 , pp. 97-110
    • Cachin, C.1    Maurer, U.M.2
  • 74
    • 0037396695 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels-part i. Definitions and a completeness result
    • April
    • U. Maurer and S. Wolf, “Secret-key agreement over unauthenticated public channels-part I. Definitions and a completeness result,” IEEE Transactions on Information Theory, vol. 49, no. 4, pp. 822-831, April 2003.
    • (2003) IEEE Transactions on Information Theory , vol.49 , Issue.4 , pp. 822-831
    • Maurer, U.1    Wolf, S.2
  • 75
    • 0037399113 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels -part ii. The simulatability condition
    • April
    • U. Maurer and S. Wolf, “Secret-key agreement over unauthenticated public channels -part II. The simulatability condition,” IEEE Transactions on Information Theory, vol. 49, no. 4, pp. 832-838, April 2003.
    • (2003) IEEE Transactions on Information Theory , vol.49 , Issue.4 , pp. 832-838
    • Maurer, U.1    Wolf, S.2
  • 76
    • 0037396951 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels -part iii. Privacy amplification
    • April
    • U. Maurer and S. Wolf, “Secret-key agreement over unauthenticated public channels -part III. Privacy amplification,” IEEE Transactions on Information Theory, vol. 49, no. 4, pp. 839-851, April 2003.
    • (2003) IEEE Transactions on Information Theory , vol.49 , Issue.4 , pp. 839-851
    • Maurer, U.1    Wolf, S.2
  • 77
    • 38549116073 scopus 로고    scopus 로고
    • On the possibility of key agreement using variable directional antenna
    • Seoul, South Korea, September
    • H. Imai, K. Kobara, and K. Morozov, “On the possibility of key agreement using variable directional antenna,” in Proc. 1st Joint Workshop on Information Security, Seoul, South Korea, September 2006, pp. 153-167.
    • (2006) Proc. 1St Joint Workshop on Information Security , pp. 153-167
    • Imai, H.1    Kobara, K.2    Morozov, K.3
  • 79
    • 84860686731 scopus 로고    scopus 로고
    • Secret key establishment using temporally and spatially correlated wireless channel coefficients
    • February
    • C. Chen and M. A. Jensen, “Secret key establishment using temporally and spatially correlated wireless channel coefficients,” IEEE Transactions on Mobile Computing, vol. 10, no. 2, pp. 205-215, February 2011.
    • (2011) IEEE Transactions on Mobile Computing , vol.10 , Issue.2 , pp. 205-215
    • Chen, C.1    Jensen, M.A.2
  • 80
    • 0037448569 scopus 로고    scopus 로고
    • Quantum key distribution using gaussian-modulated coherent states
    • January
    • F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P Grangier, “Quantum key distribution using Gaussian-modulated coherent states,” Letters to Nature, vol. 421, no. 6920, pp. 238-241, January 2003.
    • (2003) Letters to Nature , vol.421 , Issue.6920 , pp. 238-241
    • Grosshans, F.1    Van Assche, G.2    Wenger, J.3    Brouri, R.4    Cerf, N.J.5    Grangier, P.6
  • 82
    • 33746644820 scopus 로고    scopus 로고
    • Noisy cryptographic protocols for low-cost rfid tags
    • August
    • H. Chabanne and G. Fumaroli, “Noisy cryptographic protocols for low-cost RFID tags,” IEEE Transactions on Information Theory, vol. 52, no. 8, pp. 3562-3566, August 2006.
    • (2006) IEEE Transactions on Information Theory , vol.52 , Issue.8 , pp. 3562-3566
    • Chabanne, H.1    Fumaroli, G.2
  • 84
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas - ii: The mimome wiretap channels
    • November
    • A. Khisti and G. Wornell, “Secure transmission with multiple antennas - II: The MIMOME wiretap channels,” IEEE Transactions on Information Theory, vol. 56, no. 11, pp. 5515-5532, November 2010.
    • (2010) IEEE Transactions on Information Theory , vol.56 , Issue.11 , pp. 5515-5532
    • Khisti, A.1    Wornell, G.2
  • 86
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • October
    • P. K. Gopala, L. Lai, and H. El Gamal, “On the secrecy capacity of fading channels,” IEEE Transactions on Information Theory, vol. 54, no. 10, pp. 4687-4698, October 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    El Gamal, H.3
  • 90
    • 66949180834 scopus 로고    scopus 로고
    • A note on the secrecy capacity of the multiple-antenna wiretap channel
    • June
    • T. Liu and S. Shamai, “A note on the secrecy capacity of the multiple-antenna wiretap channel,” IEEE Transactions on Information Theory, vol. 55, no. 6, pp. 2547-2553, June 2009.
    • (2009) IEEE Transactions on Information Theory , vol.55 , Issue.6 , pp. 2547-2553
    • Liu, T.1    Shamai, S.2
  • 91
    • 69449086815 scopus 로고    scopus 로고
    • Towards the secrecy capacity of the gaussian mimo wire-tap channel: The 2-2-1 channels
    • September
    • S. Shafiee, N. Liu, and S. Ulukus, “Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channels,” IEEE Transactions on Information Theory, vol. 55, no. 9, pp. 4033-4039, September 2009.
    • (2009) IEEE Transactions on Information Theory , vol.55 , Issue.9 , pp. 4033-4039
    • Shafiee, S.1    Liu, N.2    Ulukus, S.3
  • 92
    • 70449487065 scopus 로고    scopus 로고
    • Secure communication in the low-snr regime: A characterization of the energy-secrecy tradeoff
    • Seoul, South Korea, July
    • M. Gursoy, “Secure communication in the low-SNR regime: A characterization of the energy-secrecy tradeoff,” in Proc. IEEE International Symposium on Information Theory, Seoul, South Korea, July 2009, pp. 2291-2295.
    • (2009) Proc. IEEE International Symposium on Information Theory , pp. 2291-2295
    • Gursoy, M.1
  • 93
    • 84931425598 scopus 로고    scopus 로고
    • Secret communication using artificial noise
    • Dallas, TX, USA, September
    • R. Negi and S. Goel, “Secret communication using artificial noise,” in 62nd Vehicular Technology Conference (VTC), vol. 3, Dallas, TX, USA, September 2005, pp. 1906-1910.
    • (2005) 62Nd Vehicular Technology Conference (VTC) , vol.3 , pp. 1906-1910
    • Negi, R.1    Goel, S.2
  • 94
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • June
    • S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180-2189, June 2008.
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 98
    • 62349095351 scopus 로고    scopus 로고
    • Secrecy capacity over correlated ergodic fading channels
    • San Diego, CA, USA, November
    • H. Jeon, N. Kim, M. Kim, H. Lee, and J. Ha, “Secrecy capacity over correlated ergodic fading channels,” in Proc. IEEE Military Communications Conference, San Diego, CA, USA, November 2008, pp. 1-7.
    • (2008) Proc. IEEE Military Communications Conference , pp. 1-7
    • Jeon, H.1    Kim, N.2    Kim, M.3    Lee, H.4    Ha, J.5
  • 101
    • 70349297353 scopus 로고    scopus 로고
    • Information-spectrum methods for information-theoretic security
    • San Diego, CA, USA, February
    • M. Bloch and J. N. Laneman, “Information-spectrum methods for information-theoretic security,” in Proc. Information Theory and Applications Workshop, San Diego, CA, USA, February 2009, pp. 23-28.
    • (2009) Proc. Information Theory and Applications Workshop , pp. 23-28
    • Bloch, M.1    Laneman, J.N.2
  • 102
    • 64249156371 scopus 로고    scopus 로고
    • On the throughput of secure hybrid-arq protocols for gaussian block-fading channels
    • April
    • X. Tang, R. Liu, P Spasojevic, and H. V Poor, “On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels,” IEEE Transactions on Information Theory, vol. 55, no. 4, pp. 1575-1591, April 2009.
    • (2009) IEEE Transactions on Information Theory , vol.55 , Issue.4 , pp. 1575-1591
    • Tang, X.1    Liu, R.2    Spasojevic, P.3    Poor, H.V.4
  • 104
    • 76249121155 scopus 로고    scopus 로고
    • The broadcast approach over fading gaussian wiretap channels
    • Taormina, Italy, October
    • Y. Liang, L. Lai, H. Poor, and S. Shamai, “The broadcast approach over fading Gaussian wiretap channels,” in Proc. Information Theory Workshop, Taormina, Italy, October 2009, pp.1-5.
    • (2009) Proc. Information Theory Workshop , pp. 1-5
    • Liang, Y.1    Lai, L.2    Poor, H.3    Shamai, S.4
  • 107
    • 34548060655 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in ultrawideband channels
    • September
    • R. Wilson, D. Tse, and R. A. Scholtz, “Channel identification: Secret sharing using reciprocity in ultrawideband channels,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 364-375, September 2007.
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2 , Issue.3 , pp. 364-375
    • Wilson, R.1    Tse, D.2    Scholtz, R.A.3
  • 109
  • 110
    • 84926103897 scopus 로고
    • “Low density parity check codes,” Ph.D. dissertation, Massachusetts Institute of Technology, Cambridge, MA, USA
    • R. G. Gallager, “Low density parity check codes,” Ph.D. dissertation, Massachusetts Institute of Technology, Cambridge, MA, USA, 1963.
    • (1963)
    • Gallager, R.G.1
  • 111
    • 0035246307 scopus 로고    scopus 로고
    • The capacity of low-density parity-check codes under message-passing decoding
    • February
    • T. J. Richardson and R. L. Urbanke, “The capacity of low-density parity-check codes under message-passing decoding,” IEEE Transactions on Information Theory, vol. 47, no. 2, pp. 599-618, February 2001.
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.2 , pp. 599-618
    • Richardson, T.J.1    Urbanke, R.L.2
  • 112
    • 0035246128 scopus 로고    scopus 로고
    • Analysis of sum-product decoding of low-density parity-check codes using a gaussian approximation
    • February
    • S. -Y. Chung, T. J. Richardson, and R. L. Urbanke, “Analysis of sum-product decoding of low-density parity-check codes using a Gaussian approximation,” IEEE Transactions on Information Theory, vol. 47, no. 2, pp. 657-670, February 2001.
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.2 , pp. 657-670
    • Chung, S.-Y.1    Richardson, T.J.2    Urbanke, R.L.3
  • 113
    • 0035248618 scopus 로고    scopus 로고
    • On the design of low-density parity-check codes within 0.0045 db of the shannon limit
    • February
    • S. -Y. Chung, J. G. D. Forney, T. J. Richardson, and R. Urbanke, “On the design of low-density parity-check codes within 0.0045 dB of the Shannon limit,” IEEE Communications Letters, vol. 5, no. 2, pp. 58-60, February 2001.
    • (2001) IEEE Communications Letters , vol.5 , Issue.2 , pp. 58-60
    • Chung, S.-Y.1    Forney, J.G.2    Richardson, T.J.3    Urbanke, R.4
  • 114
    • 0035246127 scopus 로고    scopus 로고
    • Design of capacity-approaching irregular low-density parity-check codes
    • February
    • T. J. Richardson, M. A. Shokrollahi, and R. L. Urbanke, “Design of capacity-approaching irregular low-density parity-check codes,” IEEE Transactions on Information Theory, vol. 47, no. 2, pp. 619-637, February 2001.
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.2 , pp. 619-637
    • Richardson, T.J.1    Shokrollahi, M.A.2    Urbanke, R.L.3
  • 121
    • 48649107830 scopus 로고    scopus 로고
    • Syndrome-coding for the wiretap channel revisited
    • Chengdu, China, October
    • G. Cohen and G. Zemor, “Syndrome-coding for the wiretap channel revisited,” in Proc. IEEE Information Theory Workshop, Chengdu, China, October 2006, pp. 33-36.
    • (2006) Proc. IEEE Information Theory Workshop , pp. 33-36
    • Cohen, G.1    Zemor, G.2
  • 122
  • 123
    • 0018441323 scopus 로고
    • Convolutional encoding for wyners wiretap channels
    • March
    • E. Verriest and M. Hellman, “Convolutional encoding for Wyner’s wiretap channels,” IEEE Transactions on Information Theory, vol. 25, no. 2, pp. 234-236, March 1979.
    • (1979) IEEE Transactions on Information Theory , vol.25 , Issue.2 , pp. 234-236
    • Verriest, E.1    Hellman, M.2
  • 124
    • 0026219389 scopus 로고
    • Generalized hamming weights for linear codes
    • September
    • V. Wei, “Generalized Hamming weights for linear codes,” IEEE Transactions on Information Theory, vol. 37, no. 5, pp. 1412-1418, September 1991.
    • (1991) IEEE Transactions on Information Theory , vol.37 , Issue.5 , pp. 1412-1418
    • Wei, V.1
  • 125
    • 77955673446 scopus 로고    scopus 로고
    • Achieving the secrecy capacity of wiretap channels using polar codes
    • Austin, TX, USA, June, Available online
    • H. Mahdavifar and A. Vardy, “Achieving the secrecy capacity of wiretap channels using polar codes,” in Proc. IEEE International Symposium on Information Theory, Austin, TX, USA, June 2010, pp. 913-917. Available online: arXiv:1001.0210v1.
    • (2010) Proc. IEEE International Symposium on Information Theory , pp. 913-917
    • Mahdavifar, H.1    Vardy, A.2
  • 128
    • 84926094930 scopus 로고    scopus 로고
    • Secrecy-achieving polar-coding for binary-input memoryless symmetric wire-tap channels
    • Dublin, Ireland
    • E. Hof and S. Shamai, “Secrecy-achieving polar-coding for binary-input memoryless symmetric wire-tap channels,” in Proc. IEEE Information Theory Workshop, Dublin, Ireland, 2010, pp. 1-5.
    • (2010) Proc. IEEE Information Theory Workshop , pp. 1-5
    • Hof, E.1    Shamai, S.2
  • 130
    • 80051940473 scopus 로고    scopus 로고
    • Unimodular lattices for the gaussian wiretap channels
    • Dublin, Ireland, September
    • J.-C. Belfiore and P Sole, “Unimodular lattices for the Gaussian wiretap channels,” in Proc. IEEE Information Theory Workshop, Dublin, Ireland, September 2010, pp 1-5.
    • (2010) Proc. IEEE Information Theory Workshop , pp. 1-5
    • Belfiore, J.-C.1    Sole, P.2
  • 132
    • 0015992185 scopus 로고
    • Recent results in the shannon theory
    • January
    • A. Wyner, “Recent results in the Shannon theory,” IEEE Transactions on Information Theory, vol. 20, no. 1, pp. 2-10, January 1974.
    • (1974) IEEE Transactions on Information Theory , vol.20 , Issue.1 , pp. 2-10
    • Wyner, A.1
  • 133
    • 0036810616 scopus 로고    scopus 로고
    • Compression of binary sources with side information at the decoder using ldpc codes
    • October
    • A. D. Liveris, Z. Xiong, and C. N. Georghiades, “Compression of binary sources with side information at the decoder using LDPC codes,” IEEE Communications Letters, vol. 6, no. 10, pp. 440-442, October 2002.
    • (2002) IEEE Communications Letters , vol.6 , Issue.10 , pp. 440-442
    • Liveris, A.D.1    Xiong, Z.2    Georghiades, C.N.3
  • 135
    • 43049105016 scopus 로고    scopus 로고
    • Multidimensional reconciliation for a continuous-variable quantum key distribution
    • April
    • A. Leverrier, R. Alleaume, J. Boutros, G. Zemor, and P Grangier, “Multidimensional reconciliation for a continuous-variable quantum key distribution,” Physical Review A, vol. 77, no. 4, p. 42325, April 2008.
    • (2008) Physical Review A , vol.77 , Issue.4 , pp. 42325
    • Leverrier, A.1    Alleaume, R.2    Boutros, J.3    Zemor, G.4    Grangier, P.5
  • 136
    • 0032680475 scopus 로고    scopus 로고
    • Multilevel codes: Theoretical concepts and practical design rules
    • July
    • U. Wachsmann, R. F. H. Fischer, and J. B. Huber, “Multilevel codes: Theoretical concepts and practical design rules,” IEEE Transactions on Information Theory, vol. 45, no. 5, pp. 1361-1391, July 1999.
    • (1999) IEEE Transactions on Information Theory , vol.45 , Issue.5 , pp. 1361-1391
    • Wachsmann, U.1    Fischer, R.F.2    Huber, J.B.3
  • 138
    • 0041779659 scopus 로고    scopus 로고
    • Capacity-approaching bandwidth-efficient coded modulation schemes based on low-density parity-check codes
    • September
    • J. Hou, P. H. Siegel, L. B. Milstein, and H. D. Pfister, “Capacity-approaching bandwidth-efficient coded modulation schemes based on low-density parity-check codes,” IEEE Transactions on Information Theory, vol. 49, no. 9, pp. 2141-2155, September 2003.
    • (2003) IEEE Transactions on Information Theory , vol.49 , Issue.9 , pp. 2141-2155
    • Hou, J.1    Siegel, P.H.2    Milstein, L.B.3    Pfister, H.D.4
  • 140
  • 141
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • February
    • R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120-126, February 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 144
    • 0031143862 scopus 로고    scopus 로고
    • Security issues in all-optical networks
    • May-June
    • M. Medard, D. Marquis, R. Barry, and S. Finn, “Security issues in all-optical networks,” IEEE Network, vol. 11, no. 3, pp. 42-48, May-June 1997.
    • (1997) IEEE Network , vol.11 , Issue.3 , pp. 42-48
    • Medard, M.1    Marquis, D.2    Barry, R.3    Finn, S.4
  • 145
    • 0034228863 scopus 로고    scopus 로고
    • Authentication theory and hypothesis testing
    • July
    • U. M. Maurer, “Authentication theory and hypothesis testing,” IEEE Transactions on Information Theory, vol. 46, no. 4, pp. 1350-1356, July 2000.
    • (2000) IEEE Transactions on Information Theory , vol.46 , Issue.4 , pp. 1350-1356
    • Maurer, U.M.1
  • 146
    • 34247339387 scopus 로고    scopus 로고
    • Securing wireless systems via lower layer enforcements
    • Los Angeles, CA, USA, September
    • Z. Li, W. Xu, R. Miller, and W. Trappe, “Securing wireless systems via lower layer enforcements,” in Proc. 5th ACM Workshop on Wireless Security, Los Angeles, CA, USA, September 2006, pp. 33-42.
    • (2006) Proc. 5Th ACM Workshop on Wireless Security , pp. 33-42
    • Li, Z.1    Xu, W.2    Miller, R.3    Trappe, W.4
  • 149
    • 45249101530 scopus 로고    scopus 로고
    • The general gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
    • June
    • E. Tekin and A. Yener, “The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming,” IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2735-2751, June 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 150
    • 70349678716 scopus 로고    scopus 로고
    • On the role of feedback in two-way secure communications
    • Pacific Grove, CA, USA, October
    • X. He and A. Yener, “On the role of feedback in two-way secure communications,” in Proc. 42nd Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, October 2008, pp. 1093-1097.
    • (2008) Proc. 42nd Asilomar Conference on Signals, Systems and Computers , pp. 1093-1097
    • He, X.1    Yener, A.2
  • 156
    • 77951565555 scopus 로고    scopus 로고
    • Secure degrees of freedom for gaussian channels with interference: Structured codes outperform gaussian signaling
    • Honolulu, HI, USA, December
    • X. He and A. Yener, “Secure degrees of freedom for Gaussian channels with interference: Structured codes outperform Gaussian signaling,” in Proc. IEEE Global Telecommunications Conference, Honolulu, HI, USA, December 2009, pp. 1-6.
    • (2009) Proc. IEEE Global Telecommunications Conference , pp. 1-6
    • He, X.1    Yener, A.2
  • 158
    • 51849134999 scopus 로고    scopus 로고
    • Confidential messages to a cooperative relay
    • Porto, Portugal, May
    • M. Bloch and A. Thangaraj, “Confidential messages to a cooperative relay,” in Proc. IEEE Information Theory Workshop, Porto, Portugal, May 2008, pp. 154-158.
    • (2008) Proc. IEEE Information Theory Workshop , pp. 154-158
    • Bloch, M.1    Thangaraj, A.2
  • 162
    • 33646073724 scopus 로고    scopus 로고
    • An achievable region for the gaussian wiretap channel with side information
    • May
    • C. Mitrpant, A. J. H. Vinck, and Y. Luo, “An achievable region for the Gaussian wiretap channel with side information,” IEEE Transactions on Information Theory, vol. 52, no. 5, pp. 2181-2190, May 2006.
    • (2006) IEEE Transactions on Information Theory , vol.52 , Issue.5 , pp. 2181-2190
    • Mitrpant, C.1    Vinck, A.J.2    Luo, Y.3
  • 164
    • 55349095058 scopus 로고    scopus 로고
    • The wiretap channel with feedback: Encryption over the channel
    • November
    • L. Lai, H. El Gamal, and H. V Poor, “The wiretap channel with feedback: Encryption over the channel,” IEEE Transactions on Information Theory, vol. 54, no. 11, pp. 5059-5067, November 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.11 , pp. 5059-5067
    • Lai, L.1    El Gamal, H.2    Poor, H.V.3
  • 167
    • 77955354714 scopus 로고    scopus 로고
    • A new outer bound for the secrecy capacity region of the gaussian two-way wiretap channels
    • Cape Town, South Africa, May
    • X. He and A. Yener, “A new outer bound for the secrecy capacity region of the Gaussian two-way wiretap channels,” in Proc. IEEE International Conference on Communications, Cape Town, South Africa, May 2010, pp. 1-5.
    • (2010) Proc. IEEE International Conference on Communications , pp. 1-5
    • He, X.1    Yener, A.2
  • 168
    • 84938932265 scopus 로고    scopus 로고
    • Coding for relay channels with confidential messages
    • Cairns, Australia, September
    • Y. Oohama, “Coding for relay channels with confidential messages,” in Proc. IEEE Information Theory Workshop, Cairns, Australia, September 2001, pp. 87-89.
    • (2001) Proc. IEEE Information Theory Workshop , pp. 87-89
    • Oohama, Y.1
  • 169
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • September
    • L. Lai and H. El Gamal, “The relay-eavesdropper channel: Cooperation for secrecy,” IEEE Transactions on Information Theory, vol. 54, no. 9, pp. 4005-4019, September 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    El Gamal, H.2
  • 170
    • 45249083184 scopus 로고    scopus 로고
    • Secure communication with a relay helping the wire-tapper
    • Lake Tahoe, CA, USA, September
    • M. Yuksel and E. Erkip, “Secure communication with a relay helping the wire-tapper,” in Proc. IEEE Information Theory Workshop, Lake Tahoe, CA, USA, September 2007, pp. 595-600.
    • (2007) Proc. IEEE Information Theory Workshop , pp. 595-600
    • Yuksel, M.1    Erkip, E.2
  • 173
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • August
    • X. He and A. Yener, “Cooperation with an untrusted relay: A secrecy perspective,” IEEE Transactions on Information Theory, vol. 56, no. 8, pp. 3807-3827, August 2010.
    • (2010) IEEE Transactions on Information Theory , vol.56 , Issue.8 , pp. 3807-3827
    • He, X.1    Yener, A.2
  • 176
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • December
    • I. Csiszâr and P. Narayan, “Secrecy capacities for multiple terminals,” IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3047-3061, December 2004.
    • (2004) IEEE Transactions on Information Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszâr, I.1    Narayan, P.2
  • 177
    • 45249104852 scopus 로고    scopus 로고
    • Secrecy capacities for multiterminal channel models
    • June
    • I. Csiszar and P Narayan, “Secrecy capacities for multiterminal channel models,” IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2437-2452, June 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.6 , pp. 2437-2452
    • Csiszar, I.1    Narayan, P.2
  • 178
    • 70449515425 scopus 로고    scopus 로고
    • Secrecy generation for multiple input multiple output channel models
    • Seoul, South Korea, July
    • I. Csiszar and P Narayan, “Secrecy generation for multiple input multiple output channel models,” in Proc. IEEE International Symosium on Information Theory, Seoul, South Korea, July 2009, pp. 2447-2451.
    • (2009) Proc. IEEE International Symosium on Information Theory , pp. 2447-2451
    • Csiszar, I.1    Narayan, P.2
  • 183
  • 186
    • 0242334165 scopus 로고    scopus 로고
    • An algebraic approach to network coding
    • October
    • R. Koetter and M. Medard, “An algebraic approach to network coding,” IEEE/ACM Transactions on Networking, vol. 11, no. 5, pp. 782-795, October 2003.
    • (2003) IEEE/ACM Transactions on Networking , vol.11 , Issue.5 , pp. 782-795
    • Koetter, R.1    Medard, M.2
  • 199
    • 39049090594 scopus 로고    scopus 로고
    • Cooperative security for network coding file distribution
    • Barcelona, Spain, April
    • C. Gkantsidis and P. Rodriguez, “Cooperative security for network coding file distribution,” in IEEE INFOCOM, Barcelona, Spain, April 2006.
    • (2006) IEEE INFOCOM
    • Gkantsidis, C.1    Rodriguez, P.2
  • 201
    • 48849089497 scopus 로고    scopus 로고
    • Coding for errors and erasures in random network coding
    • August
    • R. Koetter and F. Kschischang, “Coding for errors and erasures in random network coding,” IEEE Transactions on Information Theory, vol. 54, no. 8, pp. 3579-3591, August 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.8 , pp. 3579-3591
    • Koetter, R.1    Kschischang, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.