-
4
-
-
0016562514
-
The wire-tap channel
-
A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.1
-
5
-
-
0017996501
-
The Gaussian wiretap channel
-
Jul.
-
S. Leung-Yan-Cheong, and M. Hellman, "The Gaussian wiretap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
-
6
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar, and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
7
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May.
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
8
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
9
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel, and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
10
-
-
45249101530
-
The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin, and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
11
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
12
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L. Lai, and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
13
-
-
82055177123
-
Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks
-
Dec.
-
D. Goeckel, S. Vasudevan, D. Towsley, S. Adams, Z. Ding, and K. Leung, "Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks," IEEE J. Sel. Areas Commun., vol. 29, no. 10, pp. 2067-2076, Dec. 2011.
-
(2011)
IEEE J. Sel. Areas Commun.
, vol.29
, Issue.10
, pp. 2067-2076
-
-
Goeckel, D.1
Vasudevan, S.2
Towsley, D.3
Adams, S.4
Ding, Z.5
Leung, K.6
-
14
-
-
84863157582
-
Robust secure transmission in MISO channels with imperfect ECSI
-
Dec.
-
J. Huang, and A. L. Swindlehurst, "Robust secure transmission in MISO channels with imperfect ECSI," in Proc. IEEE Global Telecommun. Conf., Dec. 2011, pp. 1-5.
-
(2011)
Proc. IEEE Global Telecommun. Conf.
, pp. 1-5
-
-
Huang, J.1
Swindlehurst, A.L.2
-
15
-
-
80051757223
-
Position-based jamming for enhanced wireless security
-
Sep.
-
J. P. Vilela, P. C. Pinto, and J. Barros, "Position-based jamming for enhanced wireless security," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 616-627, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 616-627
-
-
Vilela, J.P.1
Pinto, P.C.2
Barros, J.3
-
16
-
-
52349086199
-
The secrecy graph and some of its properties
-
Jun.
-
M. Haenggi, "The secrecy graph and some of its properties," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2008, pp. 539-543.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 539-543
-
-
Haenggi, M.1
-
17
-
-
62949215603
-
Physical-layer security in stochastic wireless networks
-
Nov.
-
P. Pinto, J. Barros, and M. Win, "Physical-layer security in stochastic wireless networks," in Proc. IEEE Int. Conf. Commun. Syst., Nov. 2008, pp. 974-979.
-
(2008)
Proc. IEEE Int. Conf. Commun. Syst.
, pp. 974-979
-
-
Pinto, P.1
Barros, J.2
Win, M.3
-
18
-
-
70449514539
-
Wireless physical-layer security: The case of colluding eavesdroppers
-
Jun.
-
P. Pinto, J. Barros, and M. Win, "Wireless physical-layer security: The case of colluding eavesdroppers," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2009, pp. 2442-2446.
-
(2009)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2442-2446
-
-
Pinto, P.1
Barros, J.2
Win, M.3
-
19
-
-
70449514137
-
Secrecy throughput of MANETs with malicious nodes
-
Jun.
-
Y. Liang, H. Poor, and L. Ying, "Secrecy throughput of MANETs with malicious nodes," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2009, pp. 1189-1193.
-
(2009)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1189-1193
-
-
Liang, Y.1
Poor, H.2
Ying, L.3
-
20
-
-
77952682796
-
On secrecy capacity scaling in wireless networks
-
Feb.
-
O. Koyluoglu, E. Koksal, and H. El Gamal, "On secrecy capacity scaling in wireless networks," in Proc. Inf. Theory Appl. Workshop, Feb. 2010, pp. 1-5.
-
(2010)
Proc. Inf. Theory Appl. Workshop
, pp. 1-5
-
-
Koyluoglu, O.1
Koksal, E.2
El Gamal, H.3
-
21
-
-
78649282396
-
Security-capacity trade-off in large wireless networks using keyless secrecy
-
Sep.
-
S. Vasudevan, D. Goeckel, and D. Towsley, "Security-capacity trade-off in large wireless networks using keyless secrecy," in Proc. ACM Int. Symp. Mobile Ad Hoc Netw. Comput., Sep. 2010, pp. 21-30.
-
(2010)
Proc. ACM Int. Symp. Mobile Ad Hoc Netw. Comput.
, pp. 21-30
-
-
Vasudevan, S.1
Goeckel, D.2
Towsley, D.3
-
22
-
-
44049095075
-
Secret communication via multiantenna transmission
-
Mar.
-
Z. Li, W. Trappe, and R. Yates, "Secret communication via multiantenna transmission," in Proc. Conf. Inf. Sci. Syst., Mar. 2007, pp. 905-910.
-
(2007)
Proc. Conf. Inf. Sci. Syst.
, pp. 905-910
-
-
Li, Z.1
Trappe, W.2
Yates, R.3
-
23
-
-
62149087803
-
Distributed transmit beamforming: Challenges and recent progress
-
Feb.
-
R. Mudumbai, D. R. Brown III, U. Madhow, and H. V. Poor, "Distributed transmit beamforming: Challenges and recent progress," IEEE Commun. Mag., vol. 47, no. 2, pp. 102-110, Feb. 2009.
-
(2009)
IEEE Commun. Mag.
, vol.47
, Issue.2
, pp. 102-110
-
-
Mudumbai, R.1
Brown, D.R.2
Madhow, U.3
Poor, H.V.4
-
24
-
-
84860534255
-
Fully wireless implementation of distributed beamforming on a software-defined radio platform
-
M. M. Rahman, H. E. Baidoo-Williams, R. Mudumbai, and S. Dasgupta, "Fully wireless implementation of distributed beamforming on a software-defined radio platform," in Proc. Int. Conf. Inf. Process. Sensor Netw., 2012, pp. 305-316.
-
(2012)
Proc. Int. Conf. Inf. Process. Sensor Netw.
, pp. 305-316
-
-
Rahman, M.M.1
Baidoo-Williams, H.E.2
Mudumbai, R.3
Dasgupta, S.4
-
25
-
-
84863174459
-
Coordinated multipoint transmission and reception in LTE-advanced: Deployment scenarios and operational challenges
-
Feb.
-
D. Lee, H. Seo, B. Clerckx, E. Hardouin, D. Mazzarese, S. Nagata, and K. Sayana, "Coordinated multipoint transmission and reception in LTE-advanced: Deployment scenarios and operational challenges," IEEE Commun. Mag., vol. 50, no. 2, pp. 148-155, Feb. 2012.
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.2
, pp. 148-155
-
-
Lee, D.1
Seo, H.2
Clerckx, B.3
Hardouin, E.4
Mazzarese, D.5
Nagata, S.6
Sayana, K.7
-
26
-
-
84877658480
-
Distributed beamforming with software-defined radios: Frequency synchronization and digital feedback
-
Dec.
-
F. Quitin, M. M. Ur Rahman, R. Mudumbai, and U. Madhow, "Distributed beamforming with software-defined radios: Frequency synchronization and digital feedback," in Proc. IEEE Global Telecommun. Conf., Dec. 2012, pp. 4787-4792.
-
(2012)
Proc. IEEE Global Telecommun. Conf.
, pp. 4787-4792
-
-
Quitin, F.1
Ur Rahman, M.M.2
Mudumbai, R.3
Madhow, U.4
-
27
-
-
84875619688
-
A scalable architecture for distributed transmit beamforming with commodity radios: Design and proof of concept
-
Mar.
-
F. Quitin, M. M. Ur Rahman, R. Mudumbai, and U. Madhow, "A scalable architecture for distributed transmit beamforming with commodity radios: Design and proof of concept," IEEE Trans. Wireless Commun., vol. 12, no. 3, pp. 1418-1428, Mar. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.3
, pp. 1418-1428
-
-
Quitin, F.1
Ur Rahman, M.M.2
Mudumbai, R.3
Madhow, U.4
-
28
-
-
84861591386
-
Phantom: Physical layer cooperation for location privacy protection
-
presented at Orlando, USA, Mar.
-
S. Oh, T. Vu, M. Gruteser, and S. Banerjee, "Phantom: Physical layer cooperation for location privacy protection," presented at the IEEE Conf. Comput. Commun., Orlando, USA, Mar. 2012.
-
(2012)
The IEEE Conf. Comput. Commun.
-
-
Oh, S.1
Vu, T.2
Gruteser, M.3
Banerjee, S.4
-
31
-
-
85084162299
-
Decoy routing: Toward unblockable Internet communication
-
Nov.
-
J. Karlin, D. Ellard, A. W. Jackson, C. E. Jones, G. Lauer, D. P. Mankins, and W. T. Strayer, "Decoy routing: Toward unblockable Internet communication," in Proc. USENIX Workshop Free Open Commun. Internet, Nov. 2011.
-
(2011)
Proc. USENIX Workshop Free Open Commun. Internet
-
-
Karlin, J.1
Ellard, D.2
Jackson, A.W.3
Jones, C.E.4
Lauer, G.5
Mankins, D.P.6
Strayer, W.T.7
-
32
-
-
0347901196
-
-
Palo Alto, CA, USA: Dale Seymour Publications
-
D. Seymour, and J. Britton, Introduction to Tessellations, Palo Alto, CA, USA: Dale Seymour Publications, 1990.
-
(1990)
Introduction to Tessellations
-
-
Seymour, D.1
Britton, J.2
-
33
-
-
84866730731
-
Energy efficiency of cooperative jamming strategies in secure wireless networks
-
Sep.
-
M. Dehghan, D. L. Goeckel, M. Ghaderi, and Z. Ding, "Energy efficiency of cooperative jamming strategies in secure wireless networks," IEEE Trans. Wireless Commun., vol. 11, no. 9, pp. 3025-3029, Sep. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.9
, pp. 3025-3029
-
-
Dehghan, M.1
Goeckel, D.L.2
Ghaderi, M.3
Ding, Z.4
-
34
-
-
84868585200
-
Receiver-coordinated distributed transmit nullforming with channel state uncertainty
-
Mar.
-
D. R. Brown III, U. Madhow, P. Bidigare, and S. Dasgupta, "Receiver-coordinated distributed transmit nullforming with channel state uncertainty," in Proc. Conf. Inf. Sci. Syst., Mar. 2012, pp. 1-6.
-
(2012)
Proc. Conf. Inf. Sci. Syst.
, pp. 1-6
-
-
Brown, D.R.1
Madhow, U.2
Bidigare, P.3
Dasgupta, S.4
-
35
-
-
84860255627
-
On the secrecy capacity scaling in wireless networks
-
May
-
O. O. Koyluoglu, C. E. Koksal, and H. E. Gamal, "On the secrecy capacity scaling in wireless networks," IEEE Trans. Inf. Theory, vol. 58, no. 5, pp. 3000-3015, May 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.5
, pp. 3000-3015
-
-
Koyluoglu, O.O.1
Koksal, C.E.2
Gamal, H.E.3
-
36
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
38
-
-
0035364530
-
A simple efficient approximation scheme for the restricted shortest path problem
-
D. H. Lorenz, and D. Raz, "A simple efficient approximation scheme for the restricted shortest path problem," Oper. Res. Lett., vol. 28, pp. 213-219, 1999.
-
(1999)
Oper. Res. Lett.
, vol.28
, pp. 213-219
-
-
Lorenz, D.H.1
Raz, D.2
-
39
-
-
70450164574
-
A survey of secure mobile ad hoc routing protocols
-
Fourth Quarter
-
L. Abusalah, A. Khokhar, and M. Guizani, "A survey of secure mobile ad hoc routing protocols," IEEE Commun. Surveys Tuts., vol. 10, no. 4, pp. 78-93, Fourth Quarter 2008.
-
(2008)
IEEE Commun. Surveys Tuts.
, vol.10
, Issue.4
, pp. 78-93
-
-
Abusalah, L.1
Khokhar, A.2
Guizani, M.3
-
40
-
-
80053135174
-
They can hear your heartbeats: Non-invasive security for implantable medical devices
-
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu, "They can hear your heartbeats: Non-invasive security for implantable medical devices," in Proc. ACM Sigcomm Conf., 2011, pp. 2-13.
-
(2011)
Proc. ACM Sigcomm Conf.
, pp. 2-13
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
41
-
-
33747142749
-
The capacity of wireless networks
-
May
-
P. Gupta, and P. R. Kumar, "The capacity of wireless networks," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 388-404, May 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.2
, pp. 388-404
-
-
Gupta, P.1
Kumar, P.R.2
-
42
-
-
84861601537
-
Physical layer security from inter-session interference in large wireless networks
-
Mar.
-
A. Sheikholeslami, D. Goeckel, H. Pishro-Nik, and D. Towsley, "Physical layer security from inter-session interference in large wireless networks," in Proc. IEEE Conf. Comput. Commun., Mar. 2012, pp. 1179-1187.
-
(2012)
Proc. IEEE Conf. Comput. Commun.
, pp. 1179-1187
-
-
Sheikholeslami, A.1
Goeckel, D.2
Pishro-Nik, H.3
Towsley, D.4
-
43
-
-
60049091288
-
SPREAD: Improving network security by multipath routing in mobile ad hoc networks
-
W. Lou, W. Liu, Y. Zhang, and Y. Fang, "SPREAD: Improving network security by multipath routing in mobile ad hoc networks," ACM Wireless Netw., vol. 15, pp. 279-293, 2009.
-
(2009)
ACM Wireless Netw.
, vol.15
, pp. 279-293
-
-
Lou, W.1
Liu, W.2
Zhang, Y.3
Fang, Y.4
-
44
-
-
77952986444
-
Secure data collection in wireless sensor networks using randomized dispersive routes
-
Jul.
-
T. Shu, M. Krunz, and S. Liu, "Secure data collection in wireless sensor networks using randomized dispersive routes," IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 941-954, Jul. 2010.
-
(2010)
IEEE Trans. Mobile Comput.
, vol.9
, Issue.7
, pp. 941-954
-
-
Shu, T.1
Krunz, M.2
Liu, S.3
-
46
-
-
1842815876
-
Security based on network topology against the wiretapping attack
-
Feb.
-
K. Jain, "Security based on network topology against the wiretapping attack," IEEE Wireless Commun. Mag., vol. 11, no. 1, pp. 68-71, Feb. 2004.
-
(2004)
IEEE Wireless Commun. Mag.
, vol.11
, Issue.1
, pp. 68-71
-
-
Jain, K.1
|