-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656–715 (1949)
-
(1949)
Bell Syst. Tech. J
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
Wyner, A.D.: The wire-tap channel. Bell Syst. Tech. J. 54, 1355–1387 (1975)
-
(1975)
Bell Syst. Tech. J
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
Csiszar, I., Korner, J.: Broadcast channels with confidential messages. IEEE Trans. Inform. Theory 24, 339–348 (1978)
-
(1978)
IEEE Trans. Inform. Theory
, vol.24
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
4
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
In: Preneel, B. (ed.), Springer, Heidelberg
-
Maurer, U.M., Wolf, S.: Information-theoretic key agreement: From weak to strong secrecy for free. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 351–368. Springer, Heidelberg (2000)
-
(2000)
EUROCRYPT 2000. LNCS
, vol.1807
, pp. 351-368
-
-
Maurer, U.M.1
Wolf, S.2
-
5
-
-
76249114101
-
-
Now Publishers, MA
-
Liang, Y., Poor, H.V., Shamai, S.: Information Theoretic Security. Now Publishers, MA (2009)
-
(2009)
Information Theoretic Security
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
7
-
-
79957667257
-
Interference alignment for secrecy
-
Koyluoglu, O.O., El Gamal, H., Lai, L., Poor, H.V.: Interference alignment for secrecy. IEEE Trans. Inform. Theory 57, 3323–3332 (2011)
-
(2011)
IEEE Trans. Inform. Theory
, vol.57
, pp. 3323-3332
-
-
Koyluoglu, O.O.1
El Gamal, H.2
Lai, L.3
Poor, H.V.4
-
8
-
-
84890343749
-
Secrecy capacity of independent parallel channels
-
Springer
-
Li, Z., Yates, R., Trappe, W.: Secrecy capacity of independent parallel channels. In: Securing Wireless Communications at the Physical Layer, pp. 1–18. Springer (2010)
-
(2010)
Securing Wireless Communications at the Physical Layer
, pp. 1-18
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
10
-
-
79951614632
-
Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels
-
Mukherjee, A., Swindlehurst, A.L.: Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels. In: Proceedings of MILCOM 2010, pp. 1695–1700 (2010)
-
(2010)
Proceedings of MILCOM 2010
, pp. 1695-1700
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
11
-
-
84856969548
-
Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach
-
Zhu, Q., Saad, W., Han, Z., Poor, H.V., Basar, T.: Eavesdropping and jamming in next-generation wireless networks: a game-theoretic approach. In: Proceedings of MILCOM 2011, pp. 119–124 (2011)
-
(2011)
Proceedings of MILCOM 2011
, pp. 119-124
-
-
Zhu, Q.1
Saad, W.2
Han, Z.3
Poor, H.V.4
Basar, T.5
-
13
-
-
84943235784
-
To eavesdrop or jam, that is the question
-
In: Sherif, M.H., et al. (eds.), Springer, Heidelberg
-
Garnaev, A., Trappe, W.: To eavesdrop or jam, that is the question. In: Sherif, M.H., et al. (eds.) ADHOCNETS 2013. LNICST, vol. 129, pp. 146–161. Springer, Heidelberg (2014)
-
(2014)
ADHOCNETS 2013. LNICST
, vol.129
, pp. 146-161
-
-
Garnaev, A.1
Trappe, W.2
-
14
-
-
62949246622
-
Generalized α-fair resource allocation in wireless networks
-
Altman, E., Avrachenkov, K., Garnaev, A.: Generalized α-fair resource allocation in wireless networks. In: Proceedings of 47th IEEE Conference on Decision and Control (CDC 2008), pp. 2414–2419 (2008)
-
(2008)
Proceedings of 47Th IEEE Conference on Decision and Control (CDC 2008)
, pp. 2414-2419
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
15
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Gopala, P.K., Lai, L., El Gamal, H.: On the secrecy capacity of fading channels. IEEE Trans. Inform. Theory 54, 4687–4698 (2008)
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
16
-
-
60649107168
-
A Bayesian game approach for intrusion detection in wireless ad hoc networks
-
Liu, Y., Comaniciu, C., Mani, H.: A Bayesian game approach for intrusion detection in wireless ad hoc networks. In: Proceedings of Valuetools 2006 (2006)
-
(2006)
Proceedings of Valuetools 2006
-
-
Liu, Y.1
Comaniciu, C.2
Mani, H.3
-
17
-
-
84921478261
-
A Bayesian game approach for intrusion detection in wireless Ad Hoc networks
-
Agah, A., Das, S.K., Basu, K., Asadi, M.: A Bayesian game approach for intrusion detection in wireless Ad Hoc networks. In: Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA), pp. 243–346 (2004)
-
(2004)
Proceedings of the 3Rd IEEE International Symposium on Network Computing and Applications (NCA)
, pp. 243-346
-
-
Agah, A.1
Das, S.K.2
Basu, K.3
Asadi, M.4
-
18
-
-
84877655292
-
Dependence of optimal monitoring strategy on the application to be protected
-
Garnaev, A., Trappe, W., Kung, C.-T.: Dependence of optimal monitoring strategy on the application to be protected. In: Proceedings of 2012 IEEE Global Communications Conference (GLOBECOM), pp. 1054–1059 (2012)
-
(2012)
Proceedings of 2012 IEEE Global Communications Conference (GLOBECOM)
, pp. 1054-1059
-
-
Garnaev, A.1
Trappe, W.2
Kung, C.-T.3
-
19
-
-
84904708169
-
Incorporating attack-type uncertainty into network protection
-
Garnaev, A., Baykal-Gursoy, M., Poor, H.V.: Incorporating attack-type uncertainty into network protection. IEEE Transactions on Information Forensics and Security 9, 1278–1287 (2014), doi:10.1109/TIFS.2014.2329241
-
(2014)
IEEE Transactions on Information Forensics and Security
, vol.9
, pp. 1278-1287
-
-
Garnaev, A.1
Baykal-Gursoy, M.2
Poor, H.V.3
-
20
-
-
76649135514
-
Physical layer security game: Interaction between source, eavesdropper, and friendly jammer
-
Article ID 452907
-
Han, Z., Marina, N., Debbah, M., Hjrungnes, A.: Physical layer security game: Interaction between source, eavesdropper, and friendly jammer. EURASIP Journal on Wireless Communications and Networking (2009), Article ID 452907
-
(2009)
EURASIP Journal on Wireless Communications and Networking
-
-
Han, Z.1
Marina, N.2
Debbah, M.3
Hjrungnes, A.4
-
21
-
-
77349115760
-
Fair resource allocation in wireless networks in the presence of a jammer
-
Altman, E., Avrachenkov, K., Garnaev, A.: Fair resource allocation in wireless networks in the presence of a jammer. Performance Evaluation 67, 338–349 (2010)
-
(2010)
Performance Evaluation
, vol.67
, pp. 338-349
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
22
-
-
77951118429
-
Altman, E.: κ-player Bayesian waterfilling game for fading multiple access channels
-
He, G., Debbah, M., Altman, E.: κ-player Bayesian waterfilling game for fading multiple access channels. In: Proceedings of the 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP), pp. 17–20 (2009)
-
(2009)
Proceedings of the 3Rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP)
, pp. 17-20
-
-
He, G.1
Debbah, M.2
-
24
-
-
17144404897
-
Bayesian game-theoretic modeling of transmit power determination in a self-organizing CDMA wireless network
-
Jean, S., Jabbari, B.: Bayesian game-theoretic modeling of transmit power determination in a self-organizing CDMA wireless network. In: Proceedings of 60th IEEE Vehicular Technology Conference (VTC), vol. 5, pp. 3496–3500 (2004)
-
(2004)
Proceedings of 60Th IEEE Vehicular Technology Conference (VTC)
, vol.5
, pp. 3496-3500
-
-
Jean, S.1
Jabbari, B.2
-
26
-
-
84866940712
-
A Bayesian jamming game in an OFDM wireless network
-
Garnaev, A., Hayel, Y., Altman, E.: A Bayesian jamming game in an OFDM wireless network. In: Proceedings of 2012 10th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WIOPT), pp. 41–48 (2012)
-
(2012)
Proceedings of 2012 10Th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WIOPT)
, pp. 41-48
-
-
Garnaev, A.1
Hayel, Y.2
Altman, E.3
-
27
-
-
34047222940
-
Combined power control and transmission rate selection in cellular networks
-
Kim, S.L., Rosberg, Z., Zander, J.: Combined power control and transmission rate selection in cellular networks. In: Proceedings of IEEE VTC 1999, vol. 3, pp. 1653–1657 (1999)
-
(1999)
Proceedings of IEEE VTC 1999
, vol.3
, pp. 1653-1657
-
-
Kim, S.L.1
Rosberg, Z.2
Zander, J.3
-
28
-
-
0032658512
-
Analysis of erlang capacity for the multimedia DS-CDMA systems
-
Koo, I., Ahn, J., Lee, H.A., Kim, K.: Analysis of erlang capacity for the multimedia DS-CDMA systems. IEICE Trans. Fundamentals E82-A, 849–855 (1999)
-
(1999)
IEICE Trans. Fundamentals E82-A
, pp. 849-855
-
-
Koo, I.1
Ahn, J.2
Lee, H.A.3
Kim, K.4
-
29
-
-
63449130855
-
Transmission power control game with SINR as objective function
-
In: Altman, E., Chaintreau, A. (eds.), Springer, Heidelberg
-
Altman, E., Avrachenkov, K., Garnaev, A.: Transmission power control game with SINR as objective function. In: Altman, E., Chaintreau, A. (eds.) NET-COOP 2008. LNCS, vol. 5425, pp. 112–120. Springer, Heidelberg (2009)
-
(2009)
NET-COOP 2008. LNCS
, vol.5425
, pp. 112-120
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
30
-
-
84877683652
-
Optimal transmission power control in the presence of a smart jammer
-
Yang, D., Zhang, J., Fang, X., Xue, G.: Optimal transmission power control in the presence of a smart jammer. In: Proceedings of IEEE Global Communications Conference (GLOBECOM), pp. 5506–5511 (2012)
-
(2012)
Proceedings of IEEE Global Communications Conference (GLOBECOM)
, pp. 5506-5511
-
-
Yang, D.1
Zhang, J.2
Fang, X.3
Xue, G.4
-
31
-
-
79956100559
-
Jamming in wireless networks under uncertainty
-
Altman, E., Avrachenkov, K., Garnaev, A.: Jamming in wireless networks under uncertainty. Mobile Networks and Applications 16, 246–254 (2011)
-
(2011)
Mobile Networks and Applications
, vol.16
, pp. 246-254
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
|