-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, Oct. 1948.
-
(1948)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1367, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1367
-
-
Wyner, A.1
-
3
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul.
-
S. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.E.2
-
5
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
7
-
-
64249156371
-
On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels
-
Apr.
-
X. Tang, R. Liu, P. Spasojevíc, H. V. Poor, "On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels," IEEE Trans. Inf. Theory, vol. 55, no. 4, pp. 1575-1591, Apr. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.4
, pp. 1575-1591
-
-
Tang, X.1
Liu, R.2
Spasojevíc, P.3
Poor, H.V.4
-
8
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
Aug.
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, J.-M. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
9
-
-
80051720839
-
LDPC codes for the Gaussian wiretap channel
-
Sep.
-
D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, B.-J. Kwak, "LDPC codes for the Gaussian wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 532-540, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 532-540
-
-
Klinc, D.1
Ha, J.2
McLaughlin, S.W.3
Barros, J.4
Kwak, B.-J.5
-
10
-
-
80051991715
-
Achievable rates for lattice coded Gaussian wiretap channels
-
Jun.
-
L.-C. Choo, C. Ling, K.-K.Wong, "Achievable rates for lattice coded Gaussian wiretap channels," in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2011, pp. 1-5.
-
(2011)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 1-5
-
-
Choo, L.-C.1
Ling, C.2
Wong, K.-K.3
-
12
-
-
80053941690
-
Achieving the secrecy capacity of wiretap channels using polar codes
-
Oct.
-
H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6428-6443, Oct. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.10
, pp. 6428-6443
-
-
Mahdavifar, H.1
Vardy, A.2
-
13
-
-
77955596749
-
Nested polar codes for wiretap and relay channels
-
Aug.
-
M. Andersson, V. Rathi, R. Thobaben, J. Kliewer, M. Skoglund, "Nested polar codes for wiretap and relay channels," IEEE Commun. Lett., vol. 14, no. 8, pp. 752-754, Aug. 2010.
-
(2010)
IEEE Commun. Lett.
, vol.14
, Issue.8
, pp. 752-754
-
-
Andersson, M.1
Rathi, V.2
Thobaben, R.3
Kliewer, J.4
Skoglund, M.5
-
15
-
-
67650631347
-
Channel coding and decoding in a relay system operated with physical-layer network coding
-
Jun.
-
S. Zhang and S.-C. Liew, "Channel coding and decoding in a relay system operated with physical-layer network coding," IEEE J. Sel. Areas Commun., vol. 27, no. 5, pp. 788-796, Jun. 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.5
, pp. 788-796
-
-
Zhang, S.1
Liew, S.-C.2
-
16
-
-
70449516333
-
On the security performance of physical-layer network coding
-
Jun.
-
K. Lu, S. Fu, Y. Qian, T. Zhang, "On the security performance of physical-layer network coding," in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2009, pp. 1-5.
-
(2009)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 1-5
-
-
Lu, K.1
Fu, S.2
Qian, Y.3
Zhang, T.4
-
18
-
-
84877718412
-
Secure communication via an untrusted non-regenerative relay in fading channels
-
May
-
J. Huang, A. Mukherjee, A. L. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536-2550, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2536-2550
-
-
Huang, J.1
Mukherjee, A.2
Swindlehurst, A.L.3
-
19
-
-
84867799883
-
Physical layer security for two-way untrusted relaying with friendly jammers
-
Oct.
-
R. Zhang, L. Song, Z. Han, B. Jiao, "Physical layer security for two-way untrusted relaying with friendly jammers," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693-3704, Oct. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3693-3704
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Jiao, B.4
-
20
-
-
84873099749
-
End-to-end secure multi-hop communication with untrusted relays
-
Jan.
-
X. He and A. Yener, "End-to-end secure multi-hop communication with untrusted relays," IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 1-11, Jan. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.1
, pp. 1-11
-
-
He, X.1
Yener, A.2
-
21
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
22
-
-
84946570450
-
Large system secrecy rate analysis for SWIPT MIMO wiretap channels
-
Jan.
-
J. Zhang, C. Yuen, C.-K. Wen, S. Jin, K.-K. Wong, H. Zhu, "Large system secrecy rate analysis for SWIPT MIMO wiretap channels," IEEE Trans. Inf. Forensics Security, vol. 11, no. 1, pp. 74-85, Jan. 2016.
-
(2016)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.1
, pp. 74-85
-
-
Zhang, J.1
Yuen, C.2
Wen, C.-K.3
Jin, S.4
Wong, K.-K.5
Zhu, H.6
-
23
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
-
Jan.
-
C. Jeong, I.-M. Kim, D. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.3
-
24
-
-
5144221013
-
Achieving 12 log(1+SNR) on the AWGN channel with lattice encoding and decoding
-
Oct.
-
U. Erez and R. Zamir, "Achieving 12 log(1+SNR) on the AWGN channel with lattice encoding and decoding," IEEE Trans. Inf. Theory, vol. 50, no. 10, pp. 2293-2314, Oct. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.10
, pp. 2293-2314
-
-
Erez, U.1
Zamir, R.2
-
25
-
-
26844546304
-
Lattices which are good for (almost) everything
-
Oct.
-
U. Erez, S. Litsyn, R. Zamir, "Lattices which are good for (almost) everything," IEEE Trans. Inf. Theory, vol. 51, no. 10, pp. 3401-3416, Oct. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.10
, pp. 3401-3416
-
-
Erez, U.1
Litsyn, S.2
Zamir, R.3
-
26
-
-
84889564298
-
Approximately achieving Gaussian relay network capacity with lattice-based QMF codes
-
Dec.
-
A. Ozgur and S. Diggavi, "Approximately achieving Gaussian relay network capacity with lattice-based QMF codes," IEEE Trans. Inf. Theory, vol. 59, no. 12, pp. 8275-8294, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.12
, pp. 8275-8294
-
-
Ozgur, A.1
Diggavi, S.2
-
27
-
-
77953740795
-
Generalized degrees of freedom of the symmetric Gaussian K user interference channel
-
Jul.
-
S. A. Jafar and S. Vishwanath, "Generalized degrees of freedom of the symmetric Gaussian K user interference channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3297-3303, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3297-3303
-
-
Jafar, S.A.1
Vishwanath, S.2
-
28
-
-
84867800602
-
Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes
-
Oct.
-
L. Sun, T. Zhang, Y. Li, N. Niu, "Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3801-3807, Oct. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3801-3807
-
-
Sun, L.1
Zhang, T.2
Li, Y.3
Niu, N.4
-
29
-
-
67651149765
-
Opportunistic relay selection with outdated CSI: Outage probability and diversity analysis
-
Jun.
-
J. L. Vicario, A. Bel, J. Lopez-Salcedo, G. Seco, "Opportunistic relay selection with outdated CSI: Outage probability and diversity analysis," IEEE Trans. Wireless Commun., vol. 8, no. 6, pp. 2872-2876, Jun. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.6
, pp. 2872-2876
-
-
Vicario, J.L.1
Bel, A.2
Lopez-Salcedo, J.3
Seco, G.4
-
30
-
-
61449257403
-
Relay subset selection in wireless networks using partial decode-and-forward transmission
-
Feb.
-
C. K. Lo, S. Vishwanath, R. W. Heath, "Relay subset selection in wireless networks using partial decode-and-forward transmission," IEEE Trans. Veh. Technol., vol. 58, no. 2, pp. 692-704, Feb. 2009.
-
(2009)
IEEE Trans. Veh. Technol.
, vol.58
, Issue.2
, pp. 692-704
-
-
Lo, C.K.1
Vishwanath, S.2
Heath, R.W.3
-
31
-
-
77949416026
-
Dual-hop systems with noisy relay and interference-limited destination
-
Mar.
-
C. Zhong, S. Jin, K.-K. Wong, "Dual-hop systems with noisy relay and interference-limited destination," IEEE Trans. Commun., vol. 58, no. 3, pp. 764-768, Mar. 2010.
-
(2010)
IEEE Trans. Commun.
, vol.58
, Issue.3
, pp. 764-768
-
-
Zhong, C.1
Jin, S.2
Wong, K.-K.3
|