-
1
-
-
84949923063
-
New physical layer security measures for wireless transmissions over fading channels
-
Dec.
-
B. He and X. Zhou, "New physical layer security measures for wireless transmissions over fading channels," in Proc. IEEE GLOBECOM, Dec. 2014, pp. 722-727.
-
(2014)
Proc. IEEE GLOBECOM
, pp. 722-727
-
-
He, B.1
Zhou, X.2
-
3
-
-
84904788826
-
-
Boca Raton, FL, USA: CRC Press
-
X. Zhou, L. Song, and Y. Zhang, Physical Layer Security in Wireless Communications. Boca Raton, FL, USA: CRC Press, 2013.
-
(2013)
Physical Layer Security in Wireless Communications
-
-
Zhou, X.1
Song, L.2
Zhang, Y.3
-
4
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Labs Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
-
(1949)
Bell Labs Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
5
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
6
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
7
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul.
-
S. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.E.2
-
8
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
9
-
-
45249119255
-
Secure communication over fading channels
-
Jun.
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai Shitz, S.3
-
10
-
-
45249092485
-
Secure broadcasting over fading channels
-
Jun.
-
A. Khisti, A. Tchamkerten, and G. W. Wornell, "Secure broadcasting over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453-2469, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2453-2469
-
-
Khisti, A.1
Tchamkerten, A.2
Wornell, G.W.3
-
11
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
12
-
-
79952706123
-
Rethinking the secrecy outage formulation: A secure transmission design perspective
-
Mar.
-
X. Zhou, M. R. McKay, B. Maham, and A. Hjørungnes, "Rethinking the secrecy outage formulation: A secure transmission design perspective," IEEE Commun. Lett., vol. 15, no. 3, pp. 302-304, Mar. 2011.
-
(2011)
IEEE Commun. Lett.
, vol.15
, Issue.3
, pp. 302-304
-
-
Zhou, X.1
McKay, M.R.2
Maham, B.3
Hjørungnes, A.4
-
13
-
-
84924410728
-
Wireless physical layer security with imperfect channel state information: A survey
-
Sep.
-
B. He, X. Zhou, and T. D. Abhayapala, "Wireless physical layer security with imperfect channel state information: A survey," ZTE Commun., vol. 11, no. 3, pp. 11-19, Sep. 2013.
-
(2013)
ZTE Commun.
, vol.11
, Issue.3
, pp. 11-19
-
-
He, B.1
Zhou, X.2
Abhayapala, T.D.3
-
14
-
-
79960399745
-
Robust beamforming for security in MIMO wiretap channels with imperfect CSI
-
Jan.
-
A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
15
-
-
84873731253
-
Transmit antenna selection for security enhancement in MIMO wiretap channels
-
Jan.
-
N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels," IEEE Trans. Commun., vol. 61, no. 1, pp. 144-154, Jan. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.1
, pp. 144-154
-
-
Yang, N.1
Yeoh, P.L.2
Elkashlan, M.3
Schober, R.4
Collings, I.B.5
-
16
-
-
84888090785
-
Secure on-off transmission design with channel estimation errors
-
Dec.
-
B. He and X. Zhou, "Secure on-off transmission design with channel estimation errors," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1923-1936, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.12
, pp. 1923-1936
-
-
He, B.1
Zhou, X.2
-
17
-
-
84863152970
-
Joint relay and jammer selection for secure decode-and-forward two-way relay communications
-
Dec.
-
J. Chen, L. Song, Z. Han, and B. Jiao, "Joint relay and jammer selection for secure decode-and-forward two-way relay communications," in Proc. IEEE GLOBECOM, Dec. 2011, pp. 1-5.
-
(2011)
Proc. IEEE GLOBECOM
, pp. 1-5
-
-
Chen, J.1
Song, L.2
Han, Z.3
Jiao, B.4
-
18
-
-
84988273338
-
Secure communication via jamming in massive MIMO rician channels
-
Dec.
-
J. Wang, J. Lee, F. Wang, and T. Q. S. Quek, "Secure communication via jamming in massive MIMO Rician channels," in Proc. IEEE GLOBECOM Workshops, Dec. 2014, pp. 340-345.
-
(2014)
Proc. IEEE GLOBECOM Workshops
, pp. 340-345
-
-
Wang, J.1
Lee, J.2
Wang, F.3
Quek, T.Q.S.4
-
19
-
-
84883307797
-
An error probability approach to MIMO wiretap channels
-
Aug.
-
J.-C. Belfiore and F. Oggier, "An error probability approach to MIMO wiretap channels," IEEE Trans. Commun., vol. 61, no. 8, pp. 3396-3403, Aug. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.8
, pp. 3396-3403
-
-
Belfiore, J.-C.1
Oggier, F.2
-
20
-
-
84947798997
-
Probability estimates for fading and wiretap channels from ideal class zeta functions
-
Nov.
-
D. Karpuk, A.-M. Ernvall-Hytönen, C. Hollanti, and E. Viterbo, "Probability estimates for fading and wiretap channels from ideal class zeta functions," Adv. Math. Commun., vol. 9, no. 4, pp. 391-413, Nov. 2015.
-
(2015)
Adv. Math. Commun.
, vol.9
, Issue.4
, pp. 391-413
-
-
Karpuk, D.1
Ernvall-Hytönen, A.-M.2
Hollanti, C.3
Viterbo, E.4
-
21
-
-
78651284967
-
Secrecy gain: A wiretap lattice code design
-
Oct.
-
J.-C. Belfiore and F. Oggier, "Secrecy gain: A wiretap lattice code design," in Proc. ISITA, Oct. 2010, pp. 174-178.
-
(2010)
Proc. ISITA
, pp. 174-178
-
-
Belfiore, J.-C.1
Oggier, F.2
-
22
-
-
84947814848
-
Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel
-
Jun.
-
M. Baldi, G. Ricciutelli, N. Maturo, and F. Chiaraluce, "Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel," in Proc. IEEE ICC Workshops, Jun. 2015, pp. 435-440.
-
(2015)
Proc. IEEE ICC Workshops
, pp. 435-440
-
-
Baldi, M.1
Ricciutelli, G.2
Maturo, N.3
Chiaraluce, F.4
-
23
-
-
80051720839
-
LDPC codes for the Gaussian wiretap channel
-
Sep.
-
D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, and B.-J. Kwak, "LDPC codes for the Gaussian wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 532-540, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 532-540
-
-
Klinc, D.1
Ha, J.2
McLaughlin, S.W.3
Barros, J.4
Kwak, B.-J.5
-
24
-
-
84861172829
-
Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: A security gap analysis
-
Jun.
-
M. Baldi, M. Bianchi, and F. Chiaraluce, "Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: A security gap analysis," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 883-894, Jun. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.3
, pp. 883-894
-
-
Baldi, M.1
Bianchi, M.2
Chiaraluce, F.3
-
25
-
-
84863928823
-
Scalable PHY-layer security for distributed detection in wireless sensor networks
-
Aug.
-
R. Soosahabi and M. Naraghi-Pour, "Scalable PHY-layer security for distributed detection in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1118-1126, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.4
, pp. 1118-1126
-
-
Soosahabi, R.1
Naraghi-Pour, M.2
-
26
-
-
84944235523
-
Rethinking the intercept probability of random linear network coding
-
Oct.
-
A. S. Khan, A. Tassi, and I. Chatzigeorgiou, "Rethinking the intercept probability of random linear network coding," IEEE Commun. Lett., vol. 19, no. 10, pp. 1762-1765, Oct. 2015.
-
(2015)
IEEE Commun. Lett.
, vol.19
, Issue.10
, pp. 1762-1765
-
-
Khan, A.S.1
Tassi, A.2
Chatzigeorgiou, I.3
-
27
-
-
84899636821
-
Amplify-andforward compressed sensing as a physical-layer secrecy solution in wireless sensor networks
-
May
-
J. E. Barcelo-Llado, A. Morell, and G. Seco-Granados, "Amplify-andforward compressed sensing as a physical-layer secrecy solution in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 5, pp. 839-850, May 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.5
, pp. 839-850
-
-
Barcelo-Llado, J.E.1
Morell, A.2
Seco-Granados, G.3
-
29
-
-
0028273691
-
Relations between entropy and error probability
-
Jan.
-
M. Feder and N. Merhav, "Relations between entropy and error probability," IEEE Trans. Inf. Theory, vol. 40, no. 1, pp. 259-266, Jan. 1994.
-
(1994)
IEEE Trans. Inf. Theory
, vol.40
, Issue.1
, pp. 259-266
-
-
Feder, M.1
Merhav, N.2
-
30
-
-
84863393230
-
LDPC code design for the BPSK-constrained Gaussian wiretap channel
-
Dec.
-
C. W. Wong, T. F. Wong, and J. M. Shea, "LDPC code design for the BPSK-constrained Gaussian wiretap channel," in Proc. IEEE GLOBECOM Workshops, Dec. 2011, pp. 898-902.
-
(2011)
Proc. IEEE GLOBECOM Workshops
, pp. 898-902
-
-
Wong, C.W.1
Wong, T.F.2
Shea, J.M.3
-
31
-
-
80051774472
-
Secret-sharing LDPC codes for the BPSK-constrained Gaussian wiretap channel
-
Sep.
-
C. W. Wong, T. F. Wong, and J. M. Shea, "Secret-sharing LDPC codes for the BPSK-constrained Gaussian wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 551-564, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 551-564
-
-
Wong, C.W.1
Wong, T.F.2
Shea, J.M.3
-
32
-
-
84907528055
-
Secrecy transmission on parallel channels: Theoretical limits and performance of practical codes
-
Nov.
-
M. Baldi, F. Chiaraluce, N. Laurenti, S. Tomasin, and F. Renna, "Secrecy transmission on parallel channels: Theoretical limits and performance of practical codes," IEEE Trans. Inf. Forensics Security, vol. 9, no. 11, pp. 1765-1779, Nov. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.11
, pp. 1765-1779
-
-
Baldi, M.1
Chiaraluce, F.2
Laurenti, N.3
Tomasin, S.4
Renna, F.5
-
33
-
-
84968496713
-
Sequential minimax search for a maximum
-
J. Kiefer, "Sequential minimax search for a maximum," Proc. Amer. Math. Soc., vol. 4, no. 3, pp. 502-506, 1953.
-
(1953)
Proc. Amer. Math. Soc.
, vol.4
, Issue.3
, pp. 502-506
-
-
Kiefer, J.1
|