-
2
-
-
84863913546
-
Physical-layer secrecy for OFDM transmissions over fading channels
-
Aug.
-
F. Renna, N. Laurenti, and H. V. Poor, "Physical-layer secrecy for OFDM transmissions over fading channels," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1354-1367, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.4
, pp. 1354-1367
-
-
Renna, F.1
Laurenti, N.2
Poor, H.V.3
-
3
-
-
84902977530
-
Resource allocation for secret transmissions over MIMOME fading channels
-
Atlanta, GA, USA Dec.
-
S. Tomasin, "Resource allocation for secret transmissions over MIMOME fading channels," in Proc. IEEE Global Conf. Commun. (GLOBECOM), Atlanta, GA, USA, Dec. 2013, pp. 1264-1269.
-
(2013)
Proc. IEEE Global Conf. Commun. (GLOBECOM)
, pp. 1264-1269
-
-
Tomasin, S.1
-
4
-
-
0034228863
-
Authentication theory and hypothesis testing
-
Jul.
-
U. M. Maurer, "Authentication theory and hypothesis testing," IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1350-1356, Jul. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.4
, pp. 1350-1356
-
-
Maurer, U.M.1
-
5
-
-
61349140043
-
Authentication over noisy channels
-
Feb.
-
L. Lai, H. El Gamal, and H. V. Poor, "Authentication over noisy channels," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 906-916, Feb. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.2
, pp. 906-916
-
-
Lai, L.1
El Gamal, H.2
Poor, H.V.3
-
6
-
-
33847300575
-
Short paper: A signal fingerprinting paradigm for general physical layer and sensor network security and assurance
-
Athens, Greece Sep.
-
T. Daniels, M. Mina, and S. F. Russell, "Short paper: A signal fingerprinting paradigm for general physical layer and sensor network security and assurance," in Proc. IEEE 1st Int. Conf. SecureComm, Athens, Greece, Sep. 2005, pp. 219-221.
-
(2005)
Proc. IEEE 1st Int. Conf. SecureComm
, pp. 219-221
-
-
Daniels, T.1
Mina, M.2
Russell, S.F.3
-
7
-
-
34247324807
-
Detecting identity-based attacks in wireless networks using signalprints
-
Los Angeles, CA, USA Sep.
-
D. B. Faria and D. R. Cheriton, "Detecting identity-based attacks in wireless networks using signalprints," in Proc. 5th ACM WiSe, Los Angeles, CA, USA, Sep. 2006, pp. 43-52.
-
(2006)
Proc. 5th ACM WiSe
, pp. 43-52
-
-
Faria, D.B.1
Cheriton, D.R.2
-
8
-
-
73049092718
-
Channel-based spoofing detection in frequency-selective Rayleigh channels
-
Dec.
-
L. Xiao, L. J. Greenstein, L. Fellow, N. B. Mandayam, and W. Trappe, "Channel-based spoofing detection in frequency-selective Rayleigh channels," IEEE Trans. Wireless Commun., vol. 8, no. 12, pp. 5948-5956, Dec. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.12
, pp. 5948-5956
-
-
Xiao, L.1
Greenstein, L.J.2
Fellow, L.3
Mandayam, N.B.4
Trappe, W.5
-
9
-
-
84864117726
-
Physical layer authentication over MIMO fading wiretap channels
-
Jul.
-
P. Baracca, N. Laurenti, and S. Tomasin, "Physical layer authentication over MIMO fading wiretap channels," IEEE Trans. Wireless Commun., vol. 11, no. 7, pp. 2564-2573, Jul. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.7
, pp. 2564-2573
-
-
Baracca, P.1
Laurenti, N.2
Tomasin, S.3
-
10
-
-
84906698210
-
Principles of physical layer security in multiuser wireless networks: A survey
-
Jan.
-
A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey," IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550-1573, Jan. 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.3
, pp. 1550-1573
-
-
Mukherjee, A.1
Fakoorian, S.A.A.2
Huang, J.3
Swindlehurst, A.L.4
-
11
-
-
84957868624
-
An information-theoretic model for steganography
-
Portland, OR, USA Apr.
-
C. Cachin, "An information-theoretic model for steganography," in Proc. 2nd Int. Workshop Inf. Hiding (IH), vol. LNCS-1525. Portland, OR, USA, Apr. 1998, pp. 306-318.
-
(1998)
Proc. 2nd Int. Workshop Inf. Hiding (IH)
, vol.LNCS-1525
, pp. 306-318
-
-
Cachin, C.1
-
12
-
-
84873669138
-
The source identification game: An informationtheoretic perspective
-
Mar.
-
M. Barni and B. Tondi, "The source identification game: An informationtheoretic perspective," IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 450-463, Mar. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.3
, pp. 450-463
-
-
Barni, M.1
Tondi, B.2
-
15
-
-
0001568882
-
Gaussian Markov distributions over finite graphs
-
Mar.
-
T. P. Speed and H. T. Kiiveri, "Gaussian Markov distributions over finite graphs," Ann. Statist., vol. 14, no. 1, pp. 138-150, Mar. 1986.
-
(1986)
Ann. Statist.
, vol.14
, Issue.1
, pp. 138-150
-
-
Speed, T.P.1
Kiiveri, H.T.2
-
16
-
-
0001038826
-
Covariance selection
-
A. P. Dempster, "Covariance selection," Biometrics, vol. 28, no. 1, pp. 157-175, 1972.
-
(1972)
Biometrics
, vol.28
, Issue.1
, pp. 157-175
-
-
Dempster, A.P.1
-
17
-
-
79957652216
-
Matrix completion à la Dempster by the principle of parsimony
-
Jun.
-
A. Ferrante and M. Pavon, "Matrix completion ? la Dempster by the principle of parsimony," IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. 3925-3931, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.6
, pp. 3925-3931
-
-
Ferrante, A.1
Pavon, M.2
-
18
-
-
84856487307
-
A maximum entropy solution of the covariance extension problem for reciprocal processes
-
Sep.
-
F. P. Carli, A. Ferrante, M. Pavon, and G. Picci, "A maximum entropy solution of the covariance extension problem for reciprocal processes," IEEE Trans. Autom. Control, vol. 56, no. 9, pp. 1999-2012, Sep. 2011.
-
(2011)
IEEE Trans. Autom. Control
, vol.56
, Issue.9
, pp. 1999-2012
-
-
Carli, F.P.1
Ferrante, A.2
Pavon, M.3
Picci, G.4
-
19
-
-
0027634633
-
Proper complex random processes with applications to information theory
-
Jul.
-
F. D. Neeser and J. L. Massey, "Proper complex random processes with applications to information theory," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1293-1302, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1293-1302
-
-
Neeser, F.D.1
Massey, J.L.2
|