-
2
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Info. Theory, vol. 56, no. 8, pp. 3807-3827, 2010.
-
(2010)
IEEE Trans. Info. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
5
-
-
84871819283
-
Strong secrecy and reliable Byzantine detection in the presence of an untrusted relay
-
X. He and A. Yener, "Strong secrecy and reliable Byzantine detection in the presence of an untrusted relay," IEEE Trans. Info. Theory, vol. 59, no. 1, pp. 177-192, 2013.
-
(2013)
IEEE Trans. Info. Theory
, vol.59
, Issue.1
, pp. 177-192
-
-
He, X.1
Yener, A.2
-
6
-
-
84873099749
-
End-to-end secure multi-hop communication with untrusted relays
-
-, "End-to-end secure multi-hop communication with untrusted relays," IEEE Trans. Wireless Communications, vol. 12, no. 1, pp. 1-11, 2013.
-
(2013)
IEEE Trans. Wireless Communications
, vol.12
, Issue.1
, pp. 1-11
-
-
He, X.1
Yener, A.2
-
7
-
-
78650894311
-
Secrecy in cooperative relay broadcast channels
-
E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," IEEE Trans. Info. Theory, vol. 57, no. 1, pp. 137-155, 2011.
-
(2011)
IEEE Trans. Info. Theory
, vol.57
, Issue.1
, pp. 137-155
-
-
Ekrem, E.1
Ulukus, S.2
-
8
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
-
C. Jeong, I.-M. Kim, and D. I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Proc., vol. 60, no. 1, pp. 310-325, 2012.
-
(2012)
IEEE Trans. Signal Proc
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.I.3
-
10
-
-
84946686335
-
Multi-terminal networks with an untrusted relay
-
A. A. Zewail, M. Nafea, and A. Yener, "Multi-terminal networks with an untrusted relay," in 52 Annual Allerton Conf. On Communication, Control and Computing. IEEE, 2014.
-
(2014)
52 Annual Allerton Conf. on Communication, Control and Computing. IEEE
-
-
Zewail, A.A.1
Nafea, M.2
Yener, A.3
-
11
-
-
84938924365
-
Secure transmission using an untrusted relay with scaled compute-and-forward
-
Z. Ren, J. Goseling, J. H. Weber, and M. Gastpar, "Secure transmission using an untrusted relay with scaled compute-and-forward," in Proc. Inf. Theory Workshop (ITW). IEEE, 2015.
-
(2015)
Proc. Inf. Theory Workshop (ITW). IEEE
-
-
Ren, Z.1
Goseling, J.2
Weber, J.H.3
Gastpar, M.4
-
14
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
15
-
-
55349095058
-
The wiretap channel with feedback: Encryption over the channel
-
L. Lai, H. El Gamal, and H. V. Poor, "The wiretap channel with feedback: Encryption over the channel," IEEE Trans. Info. Theory, vol. 54, no. 11, pp. 5059-5067, 2008.
-
(2008)
IEEE Trans. Info. Theory
, vol.54
, Issue.11
, pp. 5059-5067
-
-
Lai, L.1
El Gamal, H.2
Poor, H.V.3
-
16
-
-
84896958699
-
Providing secrecy with structured codes: Twouser Gaussian channels
-
X. He and A. Yener, "Providing secrecy with structured codes: Twouser Gaussian channels," IEEE Trans. Info. Theory, vol. 60, no. 4, pp. 2121-2138, 2014.
-
(2014)
IEEE Trans. Info. Theory
, vol.60
, Issue.4
, pp. 2121-2138
-
-
He, X.1
Yener, A.2
-
17
-
-
33947397919
-
Capacity with causal and noncausal side information: A unified view
-
S. A. Jafar, "Capacity with causal and noncausal side information: A unified view," IEEE Trans. Info. Theory, vol. 52, no. 12, pp. 5468-5474, 2006.
-
(2006)
IEEE Trans. Info. Theory
, vol.52
, Issue.12
, pp. 5468-5474
-
-
Jafar, S.A.1
|