-
1
-
-
0017930809
-
A method for obtaining signatures and public-key cryptosystems
-
Feb.
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
2
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
3
-
-
84862323270
-
-
[Online]
-
"RSA factoring challenge." [Online]. Available: http://en.wikipedia.org/wiki/RSA-Factoring-Challenge
-
RSA Factoring Challenge
-
-
-
4
-
-
77956987902
-
Factorization of a 768-Bit RSA modulus
-
Berlin, Germany: Springer
-
T. Kleinjung et al., "Factorization of a 768-Bit RSA modulus," in Advances in CryptologyVCRYPTO 2010, ser. Lecture Notes in Computer Science, Berlin, Germany: Springer, 2010, pp. 333-350.
-
(2010)
Advances in CryptologyVCRYPTO 2010, Ser. Lecture Notes in Computer Science
, pp. 333-350
-
-
Kleinjung, T.1
-
7
-
-
0016562514
-
The wire-tap channel
-
Jan.
-
A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Jan. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
8
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
9
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Germany: Springer-Verlag
-
U. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Advances in CryptologyVEUROCRYPT 2000. Berlin, Germany: Springer-Verlag, 2000, pp. 351-368.
-
(2000)
Advances in CryptologyVEUROCRYPT 2000. Berlin
, pp. 351-368
-
-
Maurer, U.1
Wolf, S.2
-
10
-
-
54249103656
-
Strong secrecy for wireless channels
-
Berlin, Germany: Springer
-
J. Barros and M. Bloch, "Strong secrecy for wireless channels," in Information-Theoretic Security, ser. Lecture Notes in Computer Science, vol. 5155. Berlin, Germany: Springer, 2008, pp. 40-53.
-
(2008)
Information-Theoretic Security, Ser. Lecture Notes in Computer Science
, vol.5155
, pp. 40-53
-
-
Barros, J.1
Bloch, M.2
-
11
-
-
84871819283
-
Strong secrecy and reliable byzantine detection in the presence of an untrusted relay
-
X. He and A. Yener, "Strong secrecy and reliable byzantine detection in the presence of an untrusted relay," IEEE Trans. Inf. Theory, vol. 59, no. 1, pp. 177-192, 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.1
, pp. 177-192
-
-
He, X.1
Yener, A.2
-
12
-
-
84865478919
-
Semantic security for the wiretap channel
-
Berlin, Germany: Springer
-
M. Bellare, S. Tessaro, and A. Vardy, "Semantic security for the wiretap channel," in Advances in CryptologyVCRYPTO 2012, ser. Lecture Notes in Computer Science, vol. 7417. Berlin, Germany: Springer, 2012, pp. 294-311.
-
(2012)
Advances in CryptologyVCRYPTO 2012, Ser. Lecture Notes in Computer Science
, vol.7417
, pp. 294-311
-
-
Bellare, M.1
Tessaro, S.2
Vardy, A.3
-
13
-
-
33645727315
-
General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel
-
Apr.
-
M. Hayashi, "General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel," IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1562-1575, Apr. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.4
, pp. 1562-1575
-
-
Hayashi, M.1
-
14
-
-
84889587094
-
Strong secrecy from channel resolvability
-
Dec.
-
M. Bloch and J. Laneman, "Strong secrecy from channel resolvability," IEEE Trans. Inf. Theory, vol. 59, no. 12, pp. 8077-8098, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.12
, pp. 8077-8098
-
-
Bloch, M.1
Laneman, J.2
-
15
-
-
80051727482
-
Strongly secure communications over the two-way wiretap channel
-
Sep.
-
A. Pierrot and M. Bloch, "Strongly secure communications over the two-way wiretap channel," IEEE Trans. Inf. Foren. Security, vol. 6, no. 3, pp. 595-605, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Foren. Security
, vol.6
, Issue.3
, pp. 595-605
-
-
Pierrot, A.1
Bloch, M.2
-
18
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul.
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
19
-
-
33847609636
-
On secure signaling for the Gaussian multiple access wire-tap channel
-
Nov.
-
E. Tekin, S. Serbetli, and A. Yener, "On secure signaling for the Gaussian multiple access wire-tap channel," in Proc. 39th Asilomar Conf. Signals, Syst. Comput., Nov. 2005.
-
(2005)
Proc. 39th Asilomar Conf. Signals, Syst. Comput.
-
-
Tekin, E.1
Serbetli, S.2
Yener, A.3
-
20
-
-
45249119255
-
Secure communication over fading channels
-
Jun.
-
Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
21
-
-
45249085230
-
Secret communication with a fading eavesdropper channel
-
Jun.
-
Z. Li, R. Yates, and W. Trappe, "Secret communication with a fading eavesdropper channel," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2007, pp. 1296-1300.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1296-1300
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
22
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.1
Lai, L.2
Gamal, H.E.3
-
23
-
-
45249092485
-
Secure broadcasting over fading channels
-
Jun.
-
A. Khisti, A. Tchamkerten, and G. W. Wornell, "Secure broadcasting over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453-2469, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2453-2469
-
-
Khisti, A.1
Tchamkerten, A.2
Wornell, G.W.3
-
24
-
-
45249104850
-
Wireless information-theoretic secrecy
-
Jun.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
25
-
-
73449104694
-
Compound wiretap channels
-
Oct.
-
Y. Liang, G. Kramer, H. Poor, and S. Shamai, "Compound wiretap channels," EURASIP J. Wireless Commun. Netw., Oct. 2009, Art. ID. 142374.
-
(2009)
EURASIP J. Wireless Commun. Netw.
-
-
Liang, Y.1
Kramer, G.2
Poor, H.3
Shamai, S.4
-
26
-
-
77956908999
-
Achieving secret communication for fast rayleigh fading channels
-
Sep.
-
Z. Li, R. Yates, and W. Trappe, "Achieving secret communication for fast rayleigh fading channels," IEEE Trans. Wireless Commun., vol. 9, no. 9, pp. 2792-2799, Sep. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.9
, pp. 2792-2799
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
27
-
-
84908291362
-
On the secrecy capacity of the wiretap channel with imperfect main channel estimation
-
Oct.
-
Z. Rezki, A. Khisti, andM.-S. Alouini, "On the secrecy capacity of the wiretap channel with imperfect main channel estimation," IEEE Trans. Commun., vol. 62, no. 10, pp. 3652-3664, Oct. 2014.
-
(2014)
IEEE Trans. Commun.
, vol.62
, Issue.10
, pp. 3652-3664
-
-
Rezki, Z.1
Khisti, A.2
Alouini, M.-S.3
-
29
-
-
77958560746
-
Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel
-
A. Khisti and G. Wornell, "Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.2
-
30
-
-
69449086815
-
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel
-
Sep.
-
S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4033-4039, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.9
, pp. 4033-4039
-
-
Shafiee, S.1
Liu, N.2
Ulukus, S.3
-
31
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Aug.
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
32
-
-
45249090083
-
Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
-
Jun.
-
R. Liu, I.Maric, P. Spasojevic, and R. D. Yates, "Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2493-2507
-
-
Liu, R.1
Maric, I.2
Spasojevic, P.3
Yates, R.D.4
-
33
-
-
79952846257
-
The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel
-
E. Ekrem and S. Ulukus, "The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 2083-2114, 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.4
, pp. 2083-2114
-
-
Ekrem, E.1
Ulukus, S.2
-
34
-
-
84908245996
-
MIMO wiretap channels with unknown and varying eavesdropper channel states
-
Nov.
-
X. He and A. Yener, "MIMO wiretap channels with unknown and varying eavesdropper channel states," IEEE Trans. Inf. Theory, vol. 60, no. 11, pp. 6844-6869, Nov. 2014.
-
(2014)
IEEE Trans. Inf. Theory
, vol.60
, Issue.11
, pp. 6844-6869
-
-
He, X.1
Yener, A.2
-
35
-
-
84880521772
-
MIMO multiple access channel with an arbitrarily varying eavesdropper
-
X. He, A. Khisti, and A. Yener, "MIMO multiple access channel with an arbitrarily varying eavesdropper," IEEE Trans. Inf. Theory, vol. 59, no. 8, pp. 4733-4745, 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.8
, pp. 4733-4745
-
-
He, X.1
Khisti, A.2
Yener, A.3
-
36
-
-
84893760853
-
MIMO broadcast channel with an unknown eavesdropper: Secrecy degrees of freedom
-
Jan.
-
X. He, A. Khisti, and A. Yener, "MIMO broadcast channel with an unknown eavesdropper: Secrecy degrees of freedom," IEEE Trans. Commun., vol. 62, no. 1, pp. 246-255, Jan. 2014.
-
(2014)
IEEE Trans. Commun.
, vol.62
, Issue.1
, pp. 246-255
-
-
He, X.1
Khisti, A.2
Yener, A.3
-
37
-
-
40949147785
-
Multiple access channels with confidential messages
-
Mar.
-
Y. Liang and H. V. Poor, "Multiple access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.3
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
38
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
Gamal, H.E.2
-
39
-
-
61349186445
-
Capacity of cognitive interference channels with and without secrecy
-
Feb.
-
Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai, and S. Verdu, "Capacity of cognitive interference channels with and without secrecy," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 604-619, Feb. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.2
, pp. 604-619
-
-
Liang, Y.1
Somekh-Baruch, A.2
Poor, H.V.3
Shamai, S.4
Verdu, S.5
-
40
-
-
79955504787
-
The Gaussian many-to-one interference channel with confidential messages
-
May
-
X. He and A. Yener, "The Gaussian many-to-one interference channel with confidential messages," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 2730-2745, May 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.5
, pp. 2730-2745
-
-
He, X.1
Yener, A.2
-
41
-
-
84875720845
-
The interference wiretap channel with an arbitrarily varying eavesdropper: Aligning interference with artificial noise
-
Oct.
-
X. He and A. Yener, "The interference wiretap channel with an arbitrarily varying eavesdropper: Aligning interference with artificial noise," in Proc. 50th Annu. Allerton Conf. Commun. Control Comput., Oct. 2012.
-
(2012)
Proc. 50th Annu. Allerton Conf. Commun. Control Comput.
-
-
He, X.1
Yener, A.2
-
42
-
-
85032751357
-
Cooperative security at the physical layer: A summary of recent advances
-
R. Bassily et al., "Cooperative security at the physical layer: A summary of recent advances," IEEE Signal Processing Mag., vol. 30, no. 5, pp. 16-28, 2013.
-
(2013)
IEEE Signal Processing Mag.
, vol.30
, Issue.5
, pp. 16-28
-
-
Bassily, R.1
-
44
-
-
39049168628
-
The Gaussian multiple-access wire-tap channel with collective secrecy constraints
-
Jul.
-
E. Tekin and A. Yener, "The Gaussian multiple-access wire-tap channel with collective secrecy constraints," in Proc. IEEE Int. Symp. Inf. Theory, Jul. 2006.
-
(2006)
Proc. IEEE Int. Symp. Inf. Theory
-
-
Tekin, E.1
Yener, A.2
-
45
-
-
45249101530
-
The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming
-
E. Tekin and A. Yener, "The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
47
-
-
84940659555
-
Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy
-
Sep.
-
E. Tekin and A. Yener, "Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy," in Proc. 44th Annu. Allerton Conf. Commun. Control Comput., Sep. 2006.
-
(2006)
Proc. 44th Annu. Allerton Conf. Commun. Control Comput.
-
-
Tekin, E.1
Yener, A.2
-
48
-
-
84896958699
-
Providing secrecy with structured codes: Two-user Gaussian channels
-
X. He and A. Yener, "Providing secrecy with structured codes: Two-user Gaussian channels," IEEE Trans. Inf. Theory, vol. 60, no. 4, pp. 2121-2138, 2014.
-
(2014)
IEEE Trans. Inf. Theory
, vol.60
, Issue.4
, pp. 2121-2138
-
-
He, X.1
Yener, A.2
-
49
-
-
79551623225
-
Improving wireless physical-layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. Petropulu, and H. Poor, "Improving wireless physical-layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.3
Poor, H.4
-
50
-
-
84901263705
-
Secure degrees of freedom of one-hop wireless networks
-
Jun.
-
J. Xie and S. Ulukus, "Secure degrees of freedom of one-hop wireless networks," IEEE Trans. Inf. Theory, vol. 60, no. 6, pp. 3359-3378, Jun. 2014.
-
(2014)
IEEE Trans. Inf. Theory
, vol.60
, Issue.6
, pp. 3359-3378
-
-
Xie, J.1
Ulukus, S.2
-
51
-
-
57349093480
-
The Gaussian multiple access wire-tap channel
-
Dec.
-
E. Tekin and A. Yener, "The Gaussian multiple access wire-tap channel," IEEE Trans. Inf. Theory, vol. 54, no. 12, pp. 5747-5755, Dec. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.12
, pp. 5747-5755
-
-
Tekin, E.1
Yener, A.2
-
52
-
-
58249142630
-
Interference alignment on the deterministic channel and application to fully connected Gaussian interference networks
-
Jan.
-
V. Cadambe, S. Jafar, and S. Shamai, "Interference alignment on the deterministic channel and application to fully connected Gaussian interference networks," IEEE Trans. Inf. Theory, vol. 55, no. 1, pp. 269-274, Jan. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.1
, pp. 269-274
-
-
Cadambe, V.1
Jafar, S.2
Shamai, S.3
-
53
-
-
5144221013
-
Achieving 1/2 log (1+SNR) on the AWGN channel with lattice encoding and decoding
-
Oct.
-
U. Erez and R. Zamir, "Achieving 1/2 log (1+SNR) on the AWGN channel with lattice encoding and decoding," IEEE Trans. Inf. Theory, vol. 50, no. 10, pp. 2293-2314, Oct. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.10
, pp. 2293-2314
-
-
Erez, U.1
Zamir, R.2
-
54
-
-
26844546304
-
Lattices which are good for (almost) everything
-
Oct.
-
U. Erez, S. Litsyn, and R. Zamir, "Lattices which are good for (almost) everything," IEEE Trans. Inf. Theory, vol. 51, no. 10, pp. 3401-3416, Oct. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.10
, pp. 3401-3416
-
-
Erez, U.1
Litsyn, S.2
Zamir, R.3
-
55
-
-
79960678507
-
Compute-and-forward: Harnessing interference through structured codes
-
B. Nazer and M. Gastpar, "Compute-and-forward: Harnessing interference through structured codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6463-6486, 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.10
, pp. 6463-6486
-
-
Nazer, B.1
Gastpar, M.2
-
56
-
-
77958563966
-
Joint physical layer coding and network coding for bidirectional relaying
-
Nov.
-
M. Wilson, K. Narayanan, H. Pfister, and A. Sprintson, "Joint physical layer coding and network coding for bidirectional relaying," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5641-5654, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5641-5654
-
-
Wilson, M.1
Narayanan, K.2
Pfister, H.3
Sprintson, A.4
-
57
-
-
84857722105
-
Ergodic secret alignment
-
Mar.
-
R. Bassily and S. Ulukus, "Ergodic secret alignment," IEEE Trans. Inf. Theory, vol. 58, no. 3, pp. 1594-1611, Mar. 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.3
, pp. 1594-1611
-
-
Bassily, R.1
Ulukus, S.2
-
58
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
59
-
-
84938932265
-
Coding for relay channels with confidential messages
-
Sep.
-
Y. Oohama, "Coding for relay channels with confidential messages," in Proc. IEEE Inf. Theory Workshop, Sep. 2001.
-
(2001)
Proc. IEEE Inf. Theory Workshop
-
-
Oohama, Y.1
-
60
-
-
51649095674
-
Capacity theorems for relay channels with confidential messages
-
Jun.
-
Y. Oohama, "Capacity theorems for relay channels with confidential messages," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2007.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory
-
-
Oohama, Y.1
-
61
-
-
0018523303
-
Capacity theorems for the relay channel
-
T. M. Cover and A. E. Gamal, "Capacity theorems for the relay channel," IEEE Trans. Inf. Theory, vol. 25, no. 9, pp. 572-584, 1979.
-
(1979)
IEEE Trans. Inf. Theory
, vol.25
, Issue.9
, pp. 572-584
-
-
Cover, T.M.1
Gamal, A.E.2
-
62
-
-
78650894311
-
Secrecy in cooperative relay broadcast channels
-
Jan.
-
E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 137-155, Jan. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.1
, pp. 137-155
-
-
Ekrem, E.1
Ulukus, S.2
-
63
-
-
76649123145
-
Two-hop secure communication using an untrusted relay
-
Nov.
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay," EURASIP J. Wireless Commun. Netw., Nov. 2009, Art. ID. 305146.
-
(2009)
EURASIP J. Wireless Commun. Netw.
-
-
He, X.1
Yener, A.2
-
64
-
-
0019069689
-
Source coding theory for multiterminal communication systems with a remote source
-
Oct.
-
H. Yamamoto and K. Itoh, "Source coding theory for multiterminal communication systems with a remote source," Trans. IECE Jpn., vol. E-63, pp. 700-706, Oct. 1980.
-
(1980)
Trans. IECE Jpn.
, vol.E-63
, pp. 700-706
-
-
Yamamoto, H.1
Itoh, K.2
-
65
-
-
84929346934
-
The multiple access channel with an untrusted relay
-
presented at Nov
-
A. Zewail and A. Yener, "The multiple access channel with an untrusted relay," presented at the IEEE Inf. Theory Workshop, Nov. 2014.
-
(2014)
The IEEE Inf. Theory Workshop
-
-
Zewail, A.1
Yener, A.2
-
67
-
-
84873099749
-
End-to-end secure multi-hop communication with untrusted relays
-
X. He and A. Yener, "End-to-end secure multi-hop communication with untrusted relays," IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 1-11, 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.1
, pp. 1-11
-
-
He, X.1
Yener, A.2
-
68
-
-
84873097542
-
Improving secrecy rate via spectrum leasing for friendly jamming
-
I. Stanojev and A. Yener, "Improving secrecy rate via spectrum leasing for friendly jamming," IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 134-145, 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.1
, pp. 134-145
-
-
Stanojev, I.1
Yener, A.2
-
69
-
-
84881483763
-
Secure degrees of freedom of the Gaussian wiretap channel with helpers and no eavesdropper CSI: Blind cooperative jamming
-
Mar.
-
J. Xie and S. Ulukus, "Secure degrees of freedom of the Gaussian wiretap channel with helpers and no eavesdropper CSI: Blind cooperative jamming," in Proc. Conf. Inf. Sci. Syst., Mar. 2013.
-
(2013)
Proc. Conf. Inf. Sci. Syst.
-
-
Xie, J.1
Ulukus, S.2
-
70
-
-
80051928178
-
Multiple access wiretap channels with strong secrecy
-
Aug.
-
M. Yassaee and M. Aref, "Multiple access wiretap channels with strong secrecy," in Proc. IEEE Inf. Theory Workshop, Aug. 2010, pp. 1-5.
-
(2010)
Proc. IEEE Inf. Theory Workshop
, pp. 1-5
-
-
Yassaee, M.1
Aref, M.2
|