-
2
-
-
77953802876
-
Secure transmission with multiple antennas i: The misome wiretap channel
-
Jul.
-
A. Khisti and G. W. Wornell, "Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
3
-
-
77958560746
-
Secure transmission with multiple antennas-part ii: The mimome wiretap channel
-
Nov.
-
-, "Secure Transmission With Multiple Antennas-Part II: The MIMOME Wiretap Channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
4
-
-
79960996804
-
The secrecy capacity of the mimo wiretap channel
-
Aug.
-
F. Oggier and B. Hassibi, "The Secrecy Capacity of the MIMO Wiretap Channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
5
-
-
66949180834
-
A note on the secrecy capacity of the multiple-antenna wiretap channel
-
Jun.
-
T. Liu and S. Shamai (Shitz), "A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
6
-
-
84867524245
-
On optimal signaling over secure MIMO channels
-
Cambridge, MA, USA, Jul.
-
S. Loyka and C. D. Charalambous, "On Optimal Signaling over Secure MIMO Channels," in Proc. IEEE Int. Symp. Inf. Theory, Cambridge, MA, USA, Jul. 2012, pp. 443-447.
-
(2012)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 443-447
-
-
Loyka, S.1
Charalambous, C.D.2
-
7
-
-
84890351529
-
Further results on optimal signaling over secure MIMO channels
-
Istanbul, Turkey, Jul.
-
S. Loyka and C. D. Charalambous, "Further Results on Optimal Signaling over Secure MIMO Channels," in Proc. IEEE Int. Symp. Inf. Theory, Istanbul, Turkey, Jul. 2013, pp. 2019-2023.
-
(2013)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2019-2023
-
-
Loyka, S.1
Charalambous, C.D.2
-
8
-
-
73449104694
-
Compound wiretap channels
-
Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), "Compound Wiretap Channels," EURASIP J. Wireless Commun. Netw., vol. Article ID 142374, pp. 1-13, 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw.
, pp. 1-13
-
-
Liang, Y.1
Kramer, G.2
Poor, H.V.3
Shamai, S.4
-
9
-
-
84876274641
-
Secrecy results for compound wiretap channels
-
Mar.
-
I. Bjelakovíc, H. Boche, and J. Sommerfeld, "Secrecy Results for Compound Wiretap Channels," Probl. Inf. Transmission, vol. 49, no. 1, pp. 73-98, Mar. 2013.
-
(2013)
Probl. Inf. Transmission
, vol.49
, Issue.1
, pp. 73-98
-
-
Bjelakovíc, I.1
Boche, H.2
Sommerfeld, J.3
-
10
-
-
79955497445
-
Interference alignment for the multiantenna compound wiretap channel
-
May
-
A. Khisti, "Interference Alignment for the Multiantenna Compound Wiretap Channel," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 2976-2993, May 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.5
, pp. 2976-2993
-
-
Khisti, A.1
-
12
-
-
84893328786
-
The Secrecy Capacity of a Compound MIMO Gaussian Channel
-
Seville, Spain, Sep.
-
R. F. Schaefer and S. Loyka, The Secrecy Capacity of a Compound MIMO Gaussian Channel, in Proc. IEEE Inf. Theory Workshop, Seville, Spain, Sep. 2013, pp. 104-108.
-
(2013)
Proc. IEEE Inf. Theory Workshop
, pp. 104-108
-
-
Schaefer, R.F.1
Loyka, S.2
-
16
-
-
0029706655
-
Almost independence and secrecy capacity
-
I. Csiszár, "Almost Independence and Secrecy Capacity," Probl. Pered. Inform., vol. 32, no. 1, pp. 48-57, 1996.
-
(1996)
Probl. Pered. Inform.
, vol.32
, Issue.1
, pp. 48-57
-
-
Csiszár, I.1
-
17
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Springer-Verlag, May
-
U. M. Maurer and S. Wolf, "Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free," in EUROCRYPT 2000, Lecture Notes in Computer Science. Springer-Verlag, May 2000, vol. 1807, pp. 351-368.
-
(2000)
EUROCRYPT 2000, Lecture Notes in Computer Science
, vol.1807
, pp. 351-368
-
-
Maurer, U.M.1
Wolf, S.2
|