-
1
-
-
0001254670
-
Description of a new variable-length key, 64-bit block cipher (blowfish)
-
Cambridge, U.K., Dec.
-
B. Schneier, "Description of a new variable-length key, 64-bit block cipher (blowfish)," in Proc. Fast Softw. Encryption Cambridge Security Workshop, Cambridge, U.K., Dec. 1993, pp. 191-204.
-
(1993)
Proc. Fast Softw. Encryption Cambridge Security Workshop
, pp. 191-204
-
-
Schneier, B.1
-
2
-
-
0003855464
-
-
Indianapolis, IN, USA: Wiley
-
B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C. Indianapolis, IN, USA: Wiley, 1996.
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
3
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
4
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1367, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1367
-
-
Wyner, A.D.1
-
5
-
-
0017495724
-
A note on Wyner's wiretap channel
-
May
-
A. Carleial and M. Hellman, "A note on Wyner's wiretap channel," IEEE Trans. Inf. Theory, vol. 23, no. 3, pp. 387-390, May 1977.
-
(1977)
IEEE Trans. Inf. Theory
, vol.23
, Issue.3
, pp. 387-390
-
-
Carleial, A.1
Hellman, M.2
-
6
-
-
0024666944
-
Coding theorem for secret sharing communication systems with two noisy channels
-
May
-
H. Yamamoto, "Coding theorem for secret sharing communication systems with two noisy channels," IEEE Trans. Inf. Theory, vol. 35, no. 3, pp. 572-578, May 1989.
-
(1989)
IEEE Trans. Inf. Theory
, vol.35
, Issue.3
, pp. 572-578
-
-
Yamamoto, H.1
-
7
-
-
0026153306
-
A coding theorem for secret sharing communication systems with two Gaussian wiretap channels
-
May
-
H. Yamamoto, "A coding theorem for secret sharing communication systems with two Gaussian wiretap channels," IEEE Trans. Inf. Theory, vol. 37, no. 3, pp. 634-638, May 1991.
-
(1991)
IEEE Trans. Inf. Theory
, vol.37
, Issue.3
, pp. 634-638
-
-
Yamamoto, H.1
-
8
-
-
0031103783
-
On a special class of broadcast channels with confidential messages
-
Mar.
-
M. V. Dijk, "On a special class of broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 43, no. 2, pp. 712-714, Mar. 1997.
-
(1997)
IEEE Trans. Inf. Theory
, vol.43
, Issue.2
, pp. 712-714
-
-
Dijk, M.V.1
-
9
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
10
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul.
-
S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
-
11
-
-
39049144353
-
Secrecy capacity of wireless channels
-
Seattle, WA, USA, Jul.
-
J. Barros and M. R. D. Rodrigues, "Secrecy capacity of wireless channels," in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, USA, Jul. 2006, pp. 356-360.
-
(2006)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 356-360
-
-
Barros, J.1
Rodrigues, M.R.D.2
-
12
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
13
-
-
45249119255
-
Secure communication over fading channels
-
Jun.
-
Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
14
-
-
51649109883
-
On the secrecy capacity of fading wireless channel with multiple eavesdroppers
-
Nice, France, Jun.
-
P. Wang, G. Yu, and Z. Zhang, "On the secrecy capacity of fading wireless channel with multiple eavesdroppers," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 2007, pp. 1301-1305.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1301-1305
-
-
Wang, P.1
Yu, G.2
Zhang, Z.3
-
15
-
-
45249092485
-
Secure broadcasting over fading channels
-
Jun.
-
A. Khisti, A. Tchamkerten, and G. W. Wornell, "Secure broadcasting over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453-2469, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2453-2469
-
-
Khisti, A.1
Tchamkerten, A.2
Wornell, G.W.3
-
16
-
-
79952822109
-
Bounds on secrecy capacity over correlated ergodic fading channels at high SNR
-
Apr.
-
H. Jeon, N. Kim, J. Choi, H. Lee, and J. Ha, "Bounds on secrecy capacity over correlated ergodic fading channels at high SNR," IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 1975-1983, Apr. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.4
, pp. 1975-1983
-
-
Jeon, H.1
Kim, N.2
Choi, J.3
Lee, H.4
Ha, J.5
-
17
-
-
77953857917
-
Secrecy capacity of Nakagami-m fading wireless channels in the presence of multiple eavesdroppers
-
Pacific Grove, CA, USA, Nov.
-
M. Z. I. Sarkar, T. Ratnarajah, and M. Sellathurai, "Secrecy capacity of Nakagami-m fading wireless channels in the presence of multiple eavesdroppers," in Proc. Conf. Signals Syst. Comput., Pacific Grove, CA, USA, Nov. 2009, pp. 829-833.
-
(2009)
Proc. Conf. Signals Syst. Comput.
, pp. 829-833
-
-
Sarkar, M.Z.I.1
Ratnarajah, T.2
Sellathurai, M.3
-
18
-
-
84893305820
-
On ergodic secrecy capacity of fast fading MIMOME wiretap channel with statistical CSIT
-
Kaohsiung, Taiwan, Oct.
-
S.-C. Lin, "On ergodic secrecy capacity of fast fading MIMOME wiretap channel with statistical CSIT," in Proc. Asia Pac. Conf. Signal Inf. Process. Assoc., Kaohsiung, Taiwan, Oct. 2013, pp. 1-4.
-
(2013)
Proc. Asia Pac. Conf. Signal Inf. Process. Assoc.
, pp. 1-4
-
-
Lin, S.-C.1
-
19
-
-
84908291362
-
On the secrecy capacity of the wiretap channel with imperfect main channel estimation
-
Oct.
-
Z. Rezki, A. Khisti, and M.-S. Alouini, "On the secrecy capacity of the wiretap channel with imperfect main channel estimation," IEEE Trans. Commun., vol. 62, no. 10, pp. 3652-3664, Oct. 2014.
-
(2014)
IEEE Trans. Commun.
, vol.62
, Issue.10
, pp. 3652-3664
-
-
Rezki, Z.1
Khisti, A.2
Alouini, M.-S.3
-
20
-
-
84906766299
-
Secure communication in frequency selective channels with fade-avoiding subchannel usage
-
Sydney, NSW, Australia, Jun.
-
E. Güvenkaya and H. Arslan, "Secure communication in frequency selective channels with fade-avoiding subchannel usage," in Proc. IEEE ICC, Sydney, NSW, Australia, Jun. 2014, pp. 813-818.
-
(2014)
Proc. IEEE ICC
, pp. 813-818
-
-
Güvenkaya, E.1
Arslan, H.2
-
21
-
-
33749450172
-
Secrecy capacity of SIMO and slow fading channels
-
Adelaide, SA, Australia, Sep.
-
P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. Inf. Theory, Adelaide, SA, Australia, Sep. 2005, pp. 2152-2155.
-
(2005)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2152-2155
-
-
Parada, P.1
Blahut, R.2
-
22
-
-
84893403880
-
Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels
-
Feb.
-
L. Wang, N. Yang, M. Elkashlan, P. L. Yeoh, and J. Yuan, "Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels," IEEE Trans. Inf. Forensics Security, vol. 9, no. 2, pp. 247-258, Feb. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.2
, pp. 247-258
-
-
Wang, L.1
Yang, N.2
Elkashlan, M.3
Yeoh, P.L.4
Yuan, J.5
-
23
-
-
44049095075
-
Secret communication via multiantenna transmission
-
Baltimore, MD, USA, Mar.
-
Z. Li, W. Trappe, and R. Yates, "Secret communication via multiantenna transmission," in Proc. 41st Annu. Conf. Inf. Sci. Syst., Baltimore, MD, USA, Mar. 2007, pp. 905-910.
-
(2007)
Proc. 41st Annu. Conf. Inf. Sci. Syst.
, pp. 905-910
-
-
Li, Z.1
Trappe, W.2
Yates, R.3
-
24
-
-
51649110931
-
Achievable rates in Gaussian MISO channels with secrecy constraints
-
Nice, France, Jun.
-
S. Shafiee and S. Ulukus, "Achievable rates in Gaussian MISO channels with secrecy constraints," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 2007, pp. 2466-2470.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2466-2470
-
-
Shafiee, S.1
Ulukus, S.2
-
25
-
-
77953802876
-
Secure transmission with multiple antennas I: The MISOME wiretap channel
-
Jul.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
26
-
-
77953222550
-
On the relationship between the multi-antenna secrecy communications and cognitive radio communications
-
Jun.
-
L. Zhang, R. Zhang, Y.-C. Liang, Y. Xin, and S. Cui, "On the relationship between the multi-antenna secrecy communications and cognitive radio communications," IEEE Trans. Commun., vol. 58, no. 6, pp. 1877-1886, Jun. 2010.
-
(2010)
IEEE Trans. Commun.
, vol.58
, Issue.6
, pp. 1877-1886
-
-
Zhang, L.1
Zhang, R.2
Liang, Y.-C.3
Xin, Y.4
Cui, S.5
-
27
-
-
79960433598
-
Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming
-
Aug.
-
Q. Li and W.-K. Ma, "Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming," IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799-3812, Aug. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.8
, pp. 3799-3812
-
-
Li, Q.1
Ma, W.-K.2
-
28
-
-
0347337828
-
Secure space-time communication
-
Dec.
-
A. O. Hero, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero, A.O.1
-
29
-
-
69449086815
-
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel
-
Sep.
-
S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4033-4039, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.9
, pp. 4033-4039
-
-
Shafiee, S.1
Liu, N.2
Ulukus, S.3
-
30
-
-
66949180834
-
A note on the secrecy capacity of the multipleantenna wiretap channel
-
Jun.
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
31
-
-
77955721830
-
Multiple-input multipleoutput Gaussian broadcast channels with confidential messages
-
Sep.
-
R. Liu, T. Liu, H. V. Poor, and S. Shamai, "Multiple-input multipleoutput Gaussian broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4215-4227, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.9
, pp. 4215-4227
-
-
Liu, R.1
Liu, T.2
Poor, H.V.3
Shamai, S.4
-
32
-
-
51649117832
-
On the Gaussian MIMO wiretap channel
-
Nice, France, Jun.
-
A. Khisti, G. Wornell, A. Wiesel, and Y. Eldar, "On the Gaussian MIMO wiretap channel," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 2007, pp. 2471-2475.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2471-2475
-
-
Khisti, A.1
Wornell, G.2
Wiesel, A.3
Eldar, Y.4
-
33
-
-
77958560746
-
Secure transmission with multiple antennas - Part II: The MIMOME wiretap channel
-
Nov.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas - Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
34
-
-
80051719720
-
MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design
-
Sep.
-
S. A. A. Fakoorian and A. L. Swindlehurst, "MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 640-649, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 640-649
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
35
-
-
84867563712
-
Optimal power allocation for GSVD-based beamforming in the MIMO Gaussian wiretap channel
-
Cambridge, MA, USA, Jul.
-
S. A. A. Fakoorian and A. L. Swindlehurst, "Optimal power allocation for GSVD-based beamforming in the MIMO Gaussian wiretap channel," in Proc. IEEE Int. Symp. Inf. Theory, Cambridge, MA, USA, Jul. 2012, pp. 2321-2325.
-
(2012)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2321-2325
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
36
-
-
84857202295
-
Dirty paper coding versus linear GSVD-based precoding in MIMO broadcast channel with confidential messages
-
Houston, TX, USA, Dec.
-
S. A. A. Fakoorian and A. L. Swindlehurst, "Dirty paper coding versus linear GSVD-based precoding in MIMO broadcast channel with confidential messages," in Proc. IEEE GLOBECOM, Houston, TX, USA, Dec. 2011, pp. 1-5.
-
(2011)
Proc. IEEE GLOBECOM
, pp. 1-5
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
37
-
-
65449150244
-
Zero-forcing precoding and generalized inverses
-
Sep.
-
A. Wiesel, Y. C. Eldar, and S. Shamai, "Zero-forcing precoding and generalized inverses," IEEE Trans. Signal Process., vol. 56, no. 9, pp. 4409-4418, Sep. 2008.
-
(2008)
IEEE Trans. Signal Process.
, vol.56
, Issue.9
, pp. 4409-4418
-
-
Wiesel, A.1
Eldar, Y.C.2
Shamai, S.3
-
38
-
-
84880560795
-
Filter design with secrecy constraints: The MIMO Gaussian wiretap channel
-
Aug.
-
H. Reboredo, J. Xavier, and M. R. D. Rodrigues, "Filter design with secrecy constraints: The MIMO Gaussian wiretap channel," IEEE Trans. Signal Process., vol. 61, no. 15, pp. 3799-3814, Aug. 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.15
, pp. 3799-3814
-
-
Reboredo, H.1
Xavier, J.2
Rodrigues, M.R.D.3
-
39
-
-
84870563576
-
Secrecy sumrates for multi-user MIMO regularized channel inversion precoding
-
Nov.
-
G. Geraci, M. Egan, J. Yuan, A. Razi, and I. B. Collings, "Secrecy sumrates for multi-user MIMO regularized channel inversion precoding," IEEE Trans. Commun., vol. 60, no. 11, pp. 3472-3482, Nov. 2012.
-
(2012)
IEEE Trans. Commun.
, vol.60
, Issue.11
, pp. 3472-3482
-
-
Geraci, G.1
Egan, M.2
Yuan, J.3
Razi, A.4
Collings, I.B.5
-
40
-
-
84858390705
-
Secrecy outage in MISO systems with partial channel information
-
Apr.
-
S. Gerbracht, C. Scheunert, and E. A. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 704-716, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 704-716
-
-
Gerbracht, S.1
Scheunert, C.2
Jorswieck, E.A.3
-
41
-
-
84861601547
-
STROBE: Actively securing wireless communications using zero-forcing beamforming
-
Orlando, FL, USA, Mar.
-
N. Anand, S.-J. Lee, and E. W. Knightly, "STROBE: Actively securing wireless communications using zero-forcing beamforming," in Proc. IEEE INFOCOM, Orlando, FL, USA, Mar. 2012, pp. 720-728.
-
(2012)
Proc. IEEE INFOCOM
, pp. 720-728
-
-
Anand, N.1
Lee, S.-J.2
Knightly, E.W.3
-
42
-
-
85180623047
-
Practical known-plaintext attacks against physical layer security in wireless MIMO systems
-
San Diego, CA, USA, [Online]
-
M. Schulz, A. Loch, and M. Hollick, "Practical known-plaintext attacks against physical layer security in wireless MIMO systems," in Proc. Symp. NDSS, San Diego, CA, USA, 2014, p. 13. [Online]. Available: http://www.internetsociety.org/doc/ practical-known-plaintext-attacks-against-physical-layer-securitywireless-mimo-systems
-
(2014)
Proc. Symp. NDSS
, pp. 13
-
-
Schulz, M.1
Loch, A.2
Hollick, M.3
-
43
-
-
84931425598
-
Secret communication using artificial noise
-
Dallas, TX, USA, Sep.
-
R. Negi and S. Goel, "Secret communication using artificial noise," in Proc. 62nd IEEE Conf. Veh. Tech., vol. 3. Dallas, TX, USA, Sep. 2005, pp. 1906-1910.
-
(2005)
Proc. 62nd IEEE Conf. Veh. Tech.
, vol.3
, pp. 1906-1910
-
-
Negi, R.1
Goel, S.2
-
44
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
45
-
-
84857366666
-
Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI
-
Feb.
-
M. Pei, J. Wei, K.-K. Wong, and X. Wang, "Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI," IEEE Trans. Wireless Commun., vol. 11, no. 2, pp. 544-549, Feb. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.2
, pp. 544-549
-
-
Pei, M.1
Wei, J.2
Wong, K.-K.3
Wang, X.4
-
46
-
-
84863359764
-
Robust secure transmission in MISO channels based on worst-case optimization
-
Apr.
-
J. Huang and A. L. Swindlehurst, "Robust secure transmission in MISO channels based on worst-case optimization," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1696-1707, Apr. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.4
, pp. 1696-1707
-
-
Huang, J.1
Swindlehurst, A.L.2
-
47
-
-
79951595646
-
QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach
-
Mar.
-
W.-C. Liao, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1202-1216
-
-
Liao, W.-C.1
Chang, T.-H.2
Ma, W.-K.3
Chi, C.-Y.4
-
48
-
-
84883395356
-
Transmit solutions for MIMO wiretap channels using alternating optimization
-
Sep.
-
Q. Li et al., "Transmit solutions for MIMO wiretap channels using alternating optimization," IEEE J. Sel. Areas Commun., vol. 31, no. 4, pp. 1714-1727, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.4
, pp. 1714-1727
-
-
Li, Q.1
-
49
-
-
77958083375
-
Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
-
Oct.
-
X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.8
, pp. 3831-3842
-
-
Zhou, X.1
McKay, M.R.2
-
50
-
-
84933053985
-
Artificial noise revisited
-
Jul.
-
S. Liu, Y. Hong, and E. Viterbo, "Artificial noise revisited," IEEE Trans. Inf. Theory, vol. 61, no. 7, pp. 3901-3911, Jul. 2015.
-
(2015)
IEEE Trans. Inf. Theory
, vol.61
, Issue.7
, pp. 3901-3911
-
-
Liu, S.1
Hong, Y.2
Viterbo, E.3
-
51
-
-
79952985755
-
On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem
-
Mar.
-
S.-C. Lin, T.-H. Chang, Y.-L. Liang, Y.-W. P. Hong, and C.-Y. Chi, "On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem," IEEE Trans. Wireless Commun., vol. 10, no. 3, pp. 901-915, Mar. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.3
, pp. 901-915
-
-
Lin, S.-C.1
Chang, T.-H.2
Liang, Y.-L.3
Hong, Y.-W.P.4
Chi, C.-Y.5
-
52
-
-
79960399745
-
Robust beamforming for security in MIMO wiretap channels with imperfect CSI
-
Jan.
-
A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
53
-
-
70349223815
-
Fixed SINR solutions for the MIMO wiretap channel
-
Taipei, Taiwan, Apr.
-
A. L. Swindlehurst, "Fixed SINR solutions for the MIMO wiretap channel," in Proc. IEEE Int. Conf. Acoust. Speech Signal Process., Taipei, Taiwan, Apr. 2009, pp. 2437-2440.
-
(2009)
Proc. IEEE Int. Conf. Acoust. Speech Signal Process.
, pp. 2437-2440
-
-
Swindlehurst, A.L.1
-
54
-
-
80051744719
-
On wireless channels with M-antenna eavesdroppers: Characterization of the outage probability and ϵ-outage secrecy capacity
-
Sep.
-
V. U. Prabhu and M. R. D. Rodrigues, "On wireless channels with M-antenna eavesdroppers: Characterization of the outage probability and ϵ-outage secrecy capacity," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 853-860, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 853-860
-
-
Prabhu, V.U.1
Rodrigues, M.R.D.2
-
55
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Aug.
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
56
-
-
84879416886
-
SLNR-based transmit beamforming for MIMO wiretap channel
-
K. Wang, X. Wang, and X. Zhang, "SLNR-based transmit beamforming for MIMO wiretap channel," Wireless Pers. Commun., vol. 71, no. 1, pp. 109-121, 2013.
-
(2013)
Wireless Pers. Commun.
, vol.71
, Issue.1
, pp. 109-121
-
-
Wang, K.1
Wang, X.2
Zhang, X.3
-
57
-
-
84903203394
-
On the optimal precoding for MIMO Gaussian wire-tap channels
-
Ilmenau, Germany, Aug.
-
A. Khabbazibasmenj, M. A. Girnyk, S. A. Vorobyov, M. Vehkaperae, and L. K. Rasmussen, "On the optimal precoding for MIMO Gaussian wire-tap channels," in Proc. 10th Int. Symp. Wireless Commun. Syst., Ilmenau, Germany, Aug. 2013, pp. 1-4.
-
(2013)
Proc. 10th Int. Symp. Wireless Commun. Syst.
, pp. 1-4
-
-
Khabbazibasmenj, A.1
Girnyk, M.A.2
Vorobyov, S.A.3
Vehkaperae, M.4
Rasmussen, L.K.5
-
58
-
-
84876775276
-
The secrecy capacity region of the Gaussian MIMO broadcast channel
-
May
-
G. Bagherikaram, A. S. Motahari, and A. K. Khandani, "The secrecy capacity region of the Gaussian MIMO broadcast channel," IEEE Trans. Inf. Theory, vol. 59, no. 5, pp. 2673-2682, May 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.5
, pp. 2673-2682
-
-
Bagherikaram, G.1
Motahari, A.S.2
Khandani, A.K.3
-
59
-
-
84877752784
-
Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint
-
May
-
S. A. Fakoorian and A. L. Swindlehurst, "Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2620-2631, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2620-2631
-
-
Fakoorian, S.A.1
Swindlehurst, A.L.2
-
60
-
-
84903554995
-
Secrecy rate optimizations for a MIMO secrecy channel with a multipleantenna eavesdropper
-
May
-
K. Cumanan, Z. Ding, B. Sharif, G. Y. Tian, and K. K. Leung, "Secrecy rate optimizations for a MIMO secrecy channel with a multipleantenna eavesdropper," IEEE Trans. Veh. Technol., vol. 63, no. 4, pp. 1678-1690, May 2014.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.4
, pp. 1678-1690
-
-
Cumanan, K.1
Ding, Z.2
Sharif, B.3
Tian, G.Y.4
Leung, K.K.5
-
61
-
-
84873731253
-
Transmit antenna selection for security enhancement in MIMO wiretap channels
-
Jan.
-
N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels," IEEE Trans. Commun., vol. 61, no. 1, pp. 144-154, Jan. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.1
, pp. 144-154
-
-
Yang, N.1
Yeoh, P.L.2
Elkashlan, M.3
Schober, R.4
Collings, I.B.5
-
62
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
Gamal, H.E.2
-
63
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
64
-
-
84866730022
-
Physical layer integration of private, common, and confidential messages in bidirectional relay networks
-
Sep.
-
R. F. Wyrembelski and H. Boche, "Physical layer integration of private, common, and confidential messages in bidirectional relay networks," IEEE Trans. Wireless Commun., vol. 11, no. 9, pp. 3170-3179, Sep. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.9
, pp. 3170-3179
-
-
Wyrembelski, R.F.1
Boche, H.2
-
65
-
-
76949094931
-
Practical physical layer network coding for two-way relay channels: Performance analysis and comparison
-
Feb.
-
R. H. Y. Louie, Y. Li, and B. Vucetic, "Practical physical layer network coding for two-way relay channels: Performance analysis and comparison," IEEE Trans. Wireless Commun., vol. 9, no. 2, pp. 764-777, Feb. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.2
, pp. 764-777
-
-
Louie, R.H.Y.1
Li, Y.2
Vucetic, B.3
-
66
-
-
82055177123
-
Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks
-
Dec.
-
D. Goeckel et al., "Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks," IEEE J. Sel. Areas Commun., vol. 29, no. 10, pp. 2067-2076, Dec. 2011.
-
(2011)
IEEE J. Sel. Areas Commun.
, vol.29
, Issue.10
, pp. 2067-2076
-
-
Goeckel, D.1
-
67
-
-
78650894311
-
Secrecy in cooperative relay broadcast channels
-
Jan.
-
E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 137-155, Jan. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.1
, pp. 137-155
-
-
Ekrem, E.1
Ulukus, S.2
-
68
-
-
45249101530
-
The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
69
-
-
80855123713
-
Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks
-
Oct.
-
D. W. K. Ng, E. S. Lo, and R. Schober, "Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3528-3540, Oct. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.10
, pp. 3528-3540
-
-
Ng, D.W.K.1
Lo, E.S.2
Schober, R.3
-
70
-
-
84863956395
-
Improving wireless security for bidirectional communication scenarios
-
Jul.
-
Z. Ding, M. Xu, J. Lu, and F. Liu, "Improving wireless security for bidirectional communication scenarios," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2842-2848, Jul. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.6
, pp. 2842-2848
-
-
Ding, Z.1
Xu, M.2
Lu, J.3
Liu, F.4
-
71
-
-
84862617441
-
Distance spectrum and performance of channel-coded physical-layer network coding for binary-input Gaussian two-way relay channels
-
Jun.
-
T. Yang, I. Land, T. Huang, J. Yuan, and Z. Chen, "Distance spectrum and performance of channel-coded physical-layer network coding for binary-input Gaussian two-way relay channels," IEEE Trans. Commun., vol. 60, no. 6, pp. 1499-1510, Jun. 2012.
-
(2012)
IEEE Trans. Commun.
, vol.60
, Issue.6
, pp. 1499-1510
-
-
Yang, T.1
Land, I.2
Huang, T.3
Yuan, J.4
Chen, Z.5
-
72
-
-
84865022675
-
A new cooperative transmission strategy for physical-layer security with multiple eavesdroppers
-
Yokohama, Japan, May
-
C.-L. Wang, T.-N. Cho, and K.-J. Yang, "A new cooperative transmission strategy for physical-layer security with multiple eavesdroppers," in Proc. 75th IEEE Conf. Veh. Tech., Yokohama, Japan, May 2012, pp. 1-5.
-
(2012)
Proc. 75th IEEE Conf. Veh. Tech.
, pp. 1-5
-
-
Wang, C.-L.1
Cho, T.-N.2
Yang, K.-J.3
-
73
-
-
84870554789
-
Cooperative secure beamforming for AF relay networks with multiple eavesdroppers
-
Jan.
-
Y. Yang, Q. Li, W.-K. Ma, J. Ge, and P. C. Ching, "Cooperative secure beamforming for AF relay networks with multiple eavesdroppers," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 35-38, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.1
, pp. 35-38
-
-
Yang, Y.1
Li, Q.2
Ma, W.-K.3
Ge, J.4
Ching, P.C.5
-
74
-
-
84870499401
-
A general relaying transmission protocol for MIMO secrecy communications
-
Nov.
-
Z. Ding, M. Peng, and H.-H. Chen, "A general relaying transmission protocol for MIMO secrecy communications," IEEE Trans. Commun., vol. 60, no. 11, pp. 3461-3471, Nov. 2012.
-
(2012)
IEEE Trans. Commun.
, vol.60
, Issue.11
, pp. 3461-3471
-
-
Ding, Z.1
Peng, M.2
Chen, H.-H.3
-
75
-
-
84870266491
-
Deaf cooperation for secrecy with multiple antennas at the helper
-
Dec.
-
R. Bassily and S. Ulukus, "Deaf cooperation for secrecy with multiple antennas at the helper," IEEE Trans. Inf. Forensics Security, vol. 7, no. 6, pp. 1855-1864, Dec. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.6
, pp. 1855-1864
-
-
Bassily, R.1
Ulukus, S.2
-
76
-
-
84874906565
-
Deaf cooperation and relay selection strategies for secure communication in multiple relay networks
-
Mar.
-
R. Bassily and S. Ulukus, "Deaf cooperation and relay selection strategies for secure communication in multiple relay networks," IEEE Trans. Signal Process., vol. 61, no. 6, pp. 1544-1554, Mar. 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.6
, pp. 1544-1554
-
-
Bassily, R.1
Ulukus, S.2
-
77
-
-
84877748089
-
Design of irregular repeataccumulate coded physical-layer network coding for Gaussian two-way relay channels
-
Mar.
-
T. Huang, T. Yang, J. Yuan, and I. Land, "Design of irregular repeataccumulate coded physical-layer network coding for Gaussian two-way relay channels," IEEE Trans. Commun., vol. 61, no. 3, pp. 897-909, Mar. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.3
, pp. 897-909
-
-
Huang, T.1
Yang, T.2
Yuan, J.3
Land, I.4
-
78
-
-
84901255051
-
Wireless physical layer security enhancement with buffer-aided relaying
-
Pacific Grove, CA, USA, Nov.
-
J. Huang and A. L. Swindlehurst, "Wireless physical layer security enhancement with buffer-aided relaying," in Proc. Asilomar Conf. Signals Syst. Comput., Pacific Grove, CA, USA, Nov. 2013, pp. 1560-1564.
-
(2013)
Proc. Asilomar Conf. Signals Syst. Comput.
, pp. 1560-1564
-
-
Huang, J.1
Swindlehurst, A.L.2
-
79
-
-
84867219611
-
Physical layer security with uncoordinated helpers implementing cooperative jamming
-
Hoboken, NJ, USA, Jun.
-
S. Luo, J. Li, and A. Petropulu, "Physical layer security with uncoordinated helpers implementing cooperative jamming," in Proc. 7th IEEE Sensor Array Multichannel Signal Process. Workshop, Hoboken, NJ, USA, Jun. 2012, pp. 97-100.
-
(2012)
Proc. 7th IEEE Sensor Array Multichannel Signal Process. Workshop
, pp. 97-100
-
-
Luo, S.1
Li, J.2
Petropulu, A.3
-
80
-
-
84879149313
-
Secure relay beamforming with imperfect channel side information
-
Jun.
-
X. Wang, K. Wang, and X.-D. Zhang, "Secure relay beamforming with imperfect channel side information," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2140-2155, Jun. 2013.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, Issue.5
, pp. 2140-2155
-
-
Wang, X.1
Wang, K.2
Zhang, X.-D.3
-
81
-
-
84858392930
-
Secure communication over parallel relay channel
-
Apr.
-
Z. H. Awan, A. Zaidi, and L. Vandendorpe, "Secure communication over parallel relay channel," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 359-371, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 359-371
-
-
Awan, Z.H.1
Zaidi, A.2
Vandendorpe, L.3
-
82
-
-
84897855007
-
When does relay transmission give a more secure connection in wireless ad hoc networks
-
Apr.
-
C. Cai, Y. Cai, X. Zhou, W. Yang, and W. Yang, "When does relay transmission give a more secure connection in wireless ad hoc networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 4, pp. 624-632, Apr. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.4
, pp. 624-632
-
-
Cai, C.1
Cai, Y.2
Zhou, X.3
Yang, W.4
Yang, W.5
-
83
-
-
84904614329
-
Security versus reliability analysis of opportunistic relaying
-
Jul.
-
Y. Zou, X. Wang, W. Shen, and L. Hanzo, "Security versus reliability analysis of opportunistic relaying," IEEE Trans. Veh. Technol., vol. 63, no. 6, pp. 2653-2661, Jul. 2014.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.6
, pp. 2653-2661
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
Hanzo, L.4
-
84
-
-
84862963131
-
Joint relay and jammer selection for secure two-way relay networks
-
Feb.
-
J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, "Joint relay and jammer selection for secure two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 310-320, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 310-320
-
-
Chen, J.1
Zhang, R.2
Song, L.3
Han, Z.4
Jiao, B.5
-
85
-
-
84884537599
-
Optimal relay selection for physicallayer security in cooperative wireless networks
-
Oct.
-
Y. Zou, X. Wang, and W. Shen, "Optimal relay selection for physicallayer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.10
, pp. 2099-2111
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
86
-
-
84925066114
-
Secrecy capacity optimization via cooperative relaying and jamming for WANETs
-
Apr.
-
B. Han, J. Li, J. Su, M. Guo, and B. Zhao, "Secrecy capacity optimization via cooperative relaying and jamming for WANETs," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 4, pp. 1117-1128, Apr. 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, Issue.4
, pp. 1117-1128
-
-
Han, B.1
Li, J.2
Su, J.3
Guo, M.4
Zhao, B.5
-
87
-
-
84871978301
-
Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks
-
Ottawa, ON, Canada, Jun.
-
T. Wang, L. Song, Z. Han, X. Cheng, and B. Jiao, "Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks," in Proc. IEEE Int. Conf. Commun., Ottawa, ON, Canada, Jun. 2012, pp. 1683-1687.
-
(2012)
Proc. IEEE Int. Conf. Commun.
, pp. 1683-1687
-
-
Wang, T.1
Song, L.2
Han, Z.3
Cheng, X.4
Jiao, B.5
-
88
-
-
84876223968
-
Physical layer security in space-division multiplexed fiber optic communications
-
Pacific Grove, CA, USA, Nov.
-
K. Guan, E. C. Song, E. Soljanin, P. J. Winzer, and A. M. Tulino, "Physical layer security in space-division multiplexed fiber optic communications," in Proc. 46th IEEE Asilomar Conf. Signals Syst. Comput., Pacific Grove, CA, USA, Nov. 2012, pp. 654-658.
-
(2012)
Proc. 46th IEEE Asilomar Conf. Signals Syst. Comput.
, pp. 654-658
-
-
Guan, K.1
Song, E.C.2
Soljanin, E.3
Winzer, P.J.4
Tulino, A.M.5
-
89
-
-
84862635573
-
Distributed beamforming for physical-layer security of two-way relay networks
-
Jul.
-
H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks," IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3545, Jul. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.7
, pp. 3532-3545
-
-
Wang, H.-M.1
Yin, Q.2
Xia, X.-G.3
-
90
-
-
84897459881
-
Algorithms for secrecy guarantee with null space beamforming in two-way relay networks
-
Apr.
-
Y. Yang, C. Sun, H. Zhao, H. Long, and W. Wang, "Algorithms for secrecy guarantee with null space beamforming in two-way relay networks," IEEE Trans. Signal Process., vol. 62, no. 8, pp. 2111-2126, Apr. 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.8
, pp. 2111-2126
-
-
Yang, Y.1
Sun, C.2
Zhao, H.3
Long, H.4
Wang, W.5
-
91
-
-
84938932265
-
Coding for relay channels with confidential messages
-
Cairns, QLD, Australia
-
Y. Oohama, "Coding for relay channels with confidential messages," in Proc. IEEE Inf. Theory Workshop, Cairns, QLD, Australia, 2001, pp. 87-89.
-
(2001)
Proc. IEEE Inf. Theory Workshop
, pp. 87-89
-
-
Oohama, Y.1
-
92
-
-
51649095674
-
Capacity theorems for relay channels with confidential messages
-
Nice, France, Jun.
-
Y. Oohama, "Capacity theorems for relay channels with confidential messages," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 2007, pp. 926-930.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 926-930
-
-
Oohama, Y.1
-
93
-
-
76649123145
-
Two-hop secure communication using an untrusted relay
-
Mar.
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay," EURASIP J. Wireless Commun. Netw., vol. 2009, Mar. 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw.
, vol.2009
-
-
He, X.1
Yener, A.2
-
94
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Aug.
-
X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
95
-
-
84871819283
-
Strong secrecy and reliable Byzantine detection in the presence of an untrusted relay
-
Jan.
-
X. He and A. Yener, "Strong secrecy and reliable Byzantine detection in the presence of an untrusted relay," IEEE Trans. Inf. Theory, vol. 59, no. 1, pp. 177-192, Jan. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.1
, pp. 177-192
-
-
He, X.1
Yener, A.2
-
96
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
-
Jan.
-
C. Jeong, I.-M. Kim, and D. I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.I.3
-
97
-
-
84881572098
-
Secure beamforming for MIMO two-way transmission with an untrusted relay
-
Shanghai, China, Apr.
-
J. Mo, M. Tao, Y. Liu, B. Xia, and X. Ma, "Secure beamforming for MIMO two-way transmission with an untrusted relay," in Proc. IEEE Wireless Commun. Netw. Conf., Shanghai, China, Apr. 2013, pp. 4180-4185.
-
(2013)
Proc. IEEE Wireless Commun. Netw. Conf.
, pp. 4180-4185
-
-
Mo, J.1
Tao, M.2
Liu, Y.3
Xia, B.4
Ma, X.5
-
98
-
-
84928974649
-
Weak secrecy in the multiway untrusted relay channel with computeand-forward
-
Jun.
-
J. Richter, C. Scheunert, S. Engelmann, and E. A. Jorswieck, "Weak secrecy in the multiway untrusted relay channel with computeand-forward," IEEE Trans. Inf. Forensics Security, vol. 10, no. 6, pp. 1262-1273, Jun. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.6
, pp. 1262-1273
-
-
Richter, J.1
Scheunert, C.2
Engelmann, S.3
Jorswieck, E.A.4
-
99
-
-
84867800602
-
Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes
-
Oct.
-
L. Sun, T. Zhang, Y. Li, and H. Niu, "Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3801-3807, Oct. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3801-3807
-
-
Sun, L.1
Zhang, T.2
Li, Y.3
Niu, H.4
-
100
-
-
84877718412
-
Secure communication via an untrusted non-regenerative relay in fading channels
-
May
-
J. Huang, A. Mukherjee, and A. L. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536-2550, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2536-2550
-
-
Huang, J.1
Mukherjee, A.2
Swindlehurst, A.L.3
-
101
-
-
77955712103
-
Near-optimal joint antenna selection for amplify-andforward relay networks
-
Aug.
-
Y. Zhang et al., "Near-optimal joint antenna selection for amplify-andforward relay networks," IEEE Trans. Wireless Commun., vol. 9, no. 8, pp. 2401-2407, Aug. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.8
, pp. 2401-2407
-
-
Zhang, Y.1
-
102
-
-
84901257838
-
Joint transmit design and node selection for one-way and two-way untrusted relay channels
-
Pacific Grove, CA, USA, Nov.
-
J. Huang and A. L. Swindlehurst, "Joint transmit design and node selection for one-way and two-way untrusted relay channels," in Proc. Asilomar Conf. Signals Syst. Comput., Pacific Grove, CA, USA, Nov. 2013, pp. 1555-1559.
-
(2013)
Proc. Asilomar Conf. Signals Syst. Comput.
, pp. 1555-1559
-
-
Huang, J.1
Swindlehurst, A.L.2
-
103
-
-
67249087217
-
Two-hop secure communication using an untrusted relay: A case for cooperative jamming
-
New Orleans, LA, USA, Nov.
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay: A case for cooperative jamming," in Proc. IEEE GLOBECOM, New Orleans, LA, USA, Nov. 2008, pp. 1-5.
-
(2008)
Proc. IEEE GLOBECOM
, pp. 1-5
-
-
He, X.1
Yener, A.2
-
104
-
-
84867799883
-
Physical layer security for two-way untrusted relaying with friendly jammers
-
Oct.
-
R. Zhang, L. Song, Z. Han, and B. Jiao, "Physical layer security for two-way untrusted relaying with friendly jammers," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693-3704, Oct. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3693-3704
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Jiao, B.4
-
105
-
-
84876054344
-
Physical-layer security in distributed wireless networks using matching theory
-
May
-
S. Bayat, R. H. Y. Louie, Z. Han, B. Vucetic, and Y. Li, "Physical-layer security in distributed wireless networks using matching theory," IEEE Trans. Inf. Forensics Security, vol. 8, no. 5, pp. 717-732, May 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.5
, pp. 717-732
-
-
Bayat, S.1
Louie, R.H.Y.2
Han, Z.3
Vucetic, B.4
Li, Y.5
-
106
-
-
84971225716
-
Secret key agreement for massive MIMO systems with two-way training under pilot contamination attack
-
San Diego, CA, USA, Dec.
-
S. Im, J. Choi, and J. Ha, "Secret key agreement for massive MIMO systems with two-way training under pilot contamination attack," in Proc. IEEE GLOBECOM, San Diego, CA, USA, Dec. 2015, pp. 1-6.
-
(2015)
Proc. IEEE GLOBECOM
, pp. 1-6
-
-
Im, S.1
Choi, J.2
Ha, J.3
-
107
-
-
84960373745
-
Secret key generation rate with power allocation in relay-based LTE-A networks
-
Nov.
-
K. Chen, B. B. Natarajan, and S. Shattil, "Secret key generation rate with power allocation in relay-based LTE-A networks," IEEE Trans. Inf. Forensics Security, vol. 10, no. 11, pp. 2424-2434, Nov. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.11
, pp. 2424-2434
-
-
Chen, K.1
Natarajan, B.B.2
Shattil, S.3
-
108
-
-
84933522482
-
Physical layer key generation in wireless networks: Challenges and opportunities
-
Jun.
-
K. Zeng, "Physical layer key generation in wireless networks: Challenges and opportunities," IEEE Commun. Mag., vol. 53, no. 6, pp. 33-39, Jun. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.6
, pp. 33-39
-
-
Zeng, K.1
-
109
-
-
84866269425
-
Exploiting channel diversity in secret key generation from multipath fading randomness
-
Oct.
-
Y. Liu, S. C. Draper, and A. M. Sayeed, "Exploiting channel diversity in secret key generation from multipath fading randomness," IEEE Trans. Inf. Forensics Security, vol. 7, no. 5, pp. 1484-1497, Oct. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.5
, pp. 1484-1497
-
-
Liu, Y.1
Draper, S.C.2
Sayeed, A.M.3
-
110
-
-
84962132625
-
Physical-layer secret key generation with colluding untrusted relays
-
Feb.
-
C. D. T. Thai, J. Lee, and T. Q. S. Quek, "Physical-layer secret key generation with colluding untrusted relays," IEEE Trans. Wireless Commun., vol. 15, no. 2, pp. 1517-1530, Feb. 2016.
-
(2016)
IEEE Trans. Wireless Commun.
, vol.15
, Issue.2
, pp. 1517-1530
-
-
Thai, C.D.T.1
Lee, J.2
Quek, T.Q.S.3
-
111
-
-
84964848526
-
Secret group key generation in physical layer for mesh topology
-
San Diego, CA, USA, Dec.
-
C. D. T. Thai, J. Lee, and T. Q. S. Quek, "Secret group key generation in physical layer for mesh topology," in Proc. IEEE GLOBECOM, San Diego, CA, USA, Dec. 2015, pp. 1-6.
-
(2015)
Proc. IEEE GLOBECOM
, pp. 1-6
-
-
Thai, C.D.T.1
Lee, J.2
Quek, T.Q.S.3
-
112
-
-
84964902033
-
LDPC code design aspects for physical-layer key reconciliation
-
San Diego, CA, USA, Dec.
-
N. Islam, O. Graur, A. Filip, and W. Henkel, "LDPC code design aspects for physical-layer key reconciliation," in Proc. IEEE GLOBECOM, San Diego, CA, USA, Dec. 2015, pp. 1-7.
-
(2015)
Proc. IEEE GLOBECOM
, pp. 1-7
-
-
Islam, N.1
Graur, O.2
Filip, A.3
Henkel, W.4
-
113
-
-
28644438588
-
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
-
Nov.
-
T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," IEEE Trans. Antennas Propag., vol. 53, no. 11, pp. 3776-3784, Nov. 2005.
-
(2005)
IEEE Trans. Antennas Propag.
, vol.53
, Issue.11
, pp. 3776-3784
-
-
Aono, T.1
Higuchi, K.2
Ohira, T.3
Komiyama, B.4
Sasaoka, H.5
-
114
-
-
80052337836
-
Secret key generation exploiting channel characteristics in wireless communications
-
Aug.
-
K. Ren, H. Su, and Q. Wang, "Secret key generation exploiting channel characteristics in wireless communications," IEEE Wireless Commun., vol. 18, no. 4, pp. 6-12, Aug. 2011.
-
(2011)
IEEE Wireless Commun.
, vol.18
, Issue.4
, pp. 6-12
-
-
Ren, K.1
Su, H.2
Wang, Q.3
-
115
-
-
84964885214
-
Physical layer secret key exchange using phase randomization in MIMO-OFDM
-
San Diego, CA, USA, Dec.
-
H. Taha and E. Alsusa, "Physical layer secret key exchange using phase randomization in MIMO-OFDM," in Proc. IEEE GLOBECOM, San Diego, CA, USA, Dec. 2015, pp. 1-6.
-
(2015)
Proc. IEEE GLOBECOM
, pp. 1-6
-
-
Taha, H.1
Alsusa, E.2
-
116
-
-
84962007216
-
RSS-based secret key generation in underwater acoustic networks: Advantages, challenges, and performance improvements
-
Feb.
-
Y. Luo, L. Pu, Z. Peng, and Z. Shi, "RSS-based secret key generation in underwater acoustic networks: Advantages, challenges, and performance improvements," IEEE Commun. Mag., vol. 54, no. 2, pp. 32-38, Feb. 2016.
-
(2016)
IEEE Commun. Mag.
, vol.54
, Issue.2
, pp. 32-38
-
-
Luo, Y.1
Pu, L.2
Peng, Z.3
Shi, Z.4
-
117
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
118
-
-
84868526075
-
Secrecy outage capacity of fading channels
-
Princeton, NJ, USA, Mar.
-
O. Gungor, J. Tan, C. E. Koksal, H. El-Gamal, and N. B. Shroff, "Secrecy outage capacity of fading channels," in Proc. 46th Annu. Conf. Inf. Sci. Syst., Princeton, NJ, USA, Mar. 2012, pp. 1-6.
-
(2012)
Proc. 46th Annu. Conf. Inf. Sci. Syst.
, pp. 1-6
-
-
Gungor, O.1
Tan, J.2
Koksal, C.E.3
El-Gamal, H.4
Shroff, N.B.5
-
119
-
-
80051749392
-
Physical-layer secret key agreement in two-way wireless relaying systems
-
Sep.
-
T. Shimizu, H. Iwai, and H. Sasaoka, "Physical-layer secret key agreement in two-way wireless relaying systems," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 650-660, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 650-660
-
-
Shimizu, T.1
Iwai, H.2
Sasaoka, H.3
-
120
-
-
84902988987
-
Secret key generation from reciprocal spatially correlated MIMO channels
-
Atlanta, GA, USA, Dec.
-
E. A. Jorswieck, A. Wolf, and S. Engelmann, "Secret key generation from reciprocal spatially correlated MIMO channels," in Proc. IEEE GLOBECOM, Atlanta, GA, USA, Dec. 2013, pp. 1245-1250.
-
(2013)
Proc. IEEE GLOBECOM
, pp. 1245-1250
-
-
Jorswieck, E.A.1
Wolf, A.2
Engelmann, S.3
-
121
-
-
84959431549
-
Polar coding for secret-key generation
-
Nov.
-
R. A. Chou, M. R. Bloch, and E. Abbe, "Polar coding for secret-key generation," IEEE Trans. Inf. Theory, vol. 61, no. 11, pp. 6213-6237, Nov. 2015.
-
(2015)
IEEE Trans. Inf. Theory
, vol.61
, Issue.11
, pp. 6213-6237
-
-
Chou, R.A.1
Bloch, M.R.2
Abbe, E.3
-
122
-
-
39449137863
-
Physical-layer authentication
-
Mar.
-
P. L. Yu, J. S. Baras, and B. M. Sadler, "Physical-layer authentication," IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 38-51, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.1
, pp. 38-51
-
-
Yu, P.L.1
Baras, J.S.2
Sadler, B.M.3
-
123
-
-
38549124508
-
Fingerprints in the ether: Using the physical layer for wireless authentication
-
Glasgow, U.K., Jun.
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Fingerprints in the ether: Using the physical layer for wireless authentication," in Proc. IEEE Int. Conf. Commun., Glasgow, U.K., Jun. 2007, pp. 4646-4651.
-
(2007)
Proc. IEEE Int. Conf. Commun.
, pp. 4646-4651
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
124
-
-
84355162331
-
Extrinsic channel-like fingerprint embedding for authenticating MIMO systems
-
Dec.
-
N. Goergen, W. S. Lin, K. J. R. Liu, and T. C. Clancy, "Extrinsic channel-like fingerprint embedding for authenticating MIMO systems," IEEE Trans. Wireless Commun., vol. 10, no. 12, pp. 4270-4281, Dec. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.12
, pp. 4270-4281
-
-
Goergen, N.1
Lin, W.S.2
Liu, K.J.R.3
Clancy, T.C.4
-
125
-
-
77953185209
-
Physical layer authentication watermarks through synthetic channel emulation
-
Singapore, Apr.
-
N. Goergen, T. C. Clancy, and T. R. Newman, "Physical layer authentication watermarks through synthetic channel emulation," in Proc. IEEE Symp. New Front. Dyn. Spectr., Singapore, Apr. 2010, pp. 1-7.
-
(2010)
Proc. IEEE Symp. New Front. Dyn. Spectr.
, pp. 1-7
-
-
Goergen, N.1
Clancy, T.C.2
Newman, T.R.3
-
126
-
-
79551638642
-
Authenticating MIMO transmissions using channel-like fingerprinting
-
Miami, FL, USA, Dec.
-
N. Goergen, W. S. Lin, K. J. Liu, and T. C. Clancy, "Authenticating MIMO transmissions using channel-like fingerprinting," in Proc. IEEE GLOBECOM, Miami, FL, USA, Dec. 2010, pp. 1-6.
-
(2010)
Proc. IEEE GLOBECOM
, pp. 1-6
-
-
Goergen, N.1
Lin, W.S.2
Liu, K.J.3
Clancy, T.C.4
-
127
-
-
77952407534
-
Attacks on physical-layer identification
-
Hoboken, NJ, USA
-
B. Danev, H. Luecken, S. Capkun, and K. E. Defrawy, "Attacks on physical-layer identification," in Proc. ACM Conf. Inf. Wireless Netw. Security, Hoboken, NJ, USA, 2010, pp. 89-98.
-
(2010)
Proc. ACM Conf. Inf. Wireless Netw. Security
, pp. 89-98
-
-
Danev, B.1
Luecken, H.2
Capkun, S.3
Defrawy, K.E.4
-
128
-
-
84927167486
-
An energy-ratio-based approach for detecting pilot spoofing attack in multiple-antenna systems
-
May
-
Q. Xiong, Y.-C. Liang, K. H. Li, and Y. Gong, "An energy-ratio-based approach for detecting pilot spoofing attack in multiple-antenna systems," IEEE Trans. Inf. Forensics Security, vol. 10, no. 5, pp. 932-940, May 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.5
, pp. 932-940
-
-
Xiong, Q.1
Liang, Y.-C.2
Li, K.H.3
Gong, Y.4
-
129
-
-
48149115694
-
Using the physical layer for wireless authentication in time-variant channels
-
Jul.
-
L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Using the physical layer for wireless authentication in time-variant channels," IEEE Trans. Wireless Commun., vol. 7, no. 7, pp. 2571-2579, Jul. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.7
, pp. 2571-2579
-
-
Xiao, L.1
Greenstein, L.J.2
Mandayam, N.B.3
Trappe, W.4
-
130
-
-
5444259436
-
Transmitter identification using embedded pseudo random sequences
-
Sep.
-
X. Wang, Y. Wu, and B. Caron, "Transmitter identification using embedded pseudo random sequences," IEEE Trans. Broadcast., vol. 50, no. 3, pp. 244-252, Sep. 2004.
-
(2004)
IEEE Trans. Broadcast.
, vol.50
, Issue.3
, pp. 244-252
-
-
Wang, X.1
Wu, Y.2
Caron, B.3
-
131
-
-
84883362174
-
PHYCRAM: Physical layer challenge-response authentication mechanism for wireless networks
-
Sep.
-
D. Shan, K. Zeng, W. Xiang, P. Richardson, and Y. Dong, "PHYCRAM: Physical layer challenge-response authentication mechanism for wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1817-1827, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1817-1827
-
-
Shan, D.1
Zeng, K.2
Xiang, W.3
Richardson, P.4
Dong, Y.5
-
132
-
-
84862947659
-
Intrinsic physical-layer authentication of integrated circuits
-
Feb.
-
W. E. Cobb, E. D. Laspe, R. O. Baldwin, M. A. Temple, and Y. C. Kim, "Intrinsic physical-layer authentication of integrated circuits," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 14-24, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 14-24
-
-
Cobb, W.E.1
Laspe, E.D.2
Baldwin, R.O.3
Temple, M.A.4
Kim, Y.C.5
-
133
-
-
23744510451
-
Authentication with distortion criteria
-
Jul.
-
E. Martinian, G. W. Wornell, and B. Chen, "Authentication with distortion criteria," IEEE Trans. Inf. Theory, vol. 51, no. 7, pp. 2523-2542, Jul. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.7
, pp. 2523-2542
-
-
Martinian, E.1
Wornell, G.W.2
Chen, B.3
-
134
-
-
79551640226
-
PHY-authentication protocol for spoofing detection in wireless networks
-
Miami, FL, USA, Dec.
-
L. Xiao et al., "PHY-authentication protocol for spoofing detection in wireless networks," in Proc. IEEE GLOBECOM, Miami, FL, USA, Dec. 2010, pp. 1-6.
-
(2010)
Proc. IEEE GLOBECOM
, pp. 1-6
-
-
Xiao, L.1
-
135
-
-
84864117726
-
Physical layer authentication over MIMO fading wiretap channels
-
Jul.
-
P. Baracca, N. Laurenti, and S. Tomasin, "Physical layer authentication over MIMO fading wiretap channels," IEEE Trans. Wireless Commun., vol. 11, no. 7, pp. 2564-2573, Jul. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.7
, pp. 2564-2573
-
-
Baracca, P.1
Laurenti, N.2
Tomasin, S.3
-
136
-
-
84904439278
-
Physical layer challengeresponse authentication in wireless networks with relay
-
Toronto, ON, Canada, Apr.
-
X. Du, D. Shan, K. Zeng, and L. Huie, "Physical layer challengeresponse authentication in wireless networks with relay," in Proc. IEEE INFOCOM, Toronto, ON, Canada, Apr. 2014, pp. 1276-1284.
-
(2014)
Proc. IEEE INFOCOM
, pp. 1276-1284
-
-
Du, X.1
Shan, D.2
Zeng, K.3
Huie, L.4
-
137
-
-
33744764278
-
Robust and secure image hashing
-
Jun.
-
A. Swaminathan, Y. Mao, and M. Wu, "Robust and secure image hashing," IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, pp. 215-230, Jun. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.2
, pp. 215-230
-
-
Swaminathan, A.1
Mao, Y.2
Wu, M.3
-
138
-
-
84864330345
-
Preventing wormhole attacks using physical layer authentication
-
Shanghai, China, Apr.
-
S. Jain and J. S. Baras, "Preventing wormhole attacks using physical layer authentication," in Proc. IEEE Conf. Wireless Commun. Netw., Shanghai, China, Apr. 2012, pp. 2712-2717.
-
(2012)
Proc. IEEE Conf. Wireless Commun. Netw.
, pp. 2712-2717
-
-
Jain, S.1
Baras, J.S.2
-
139
-
-
84891361344
-
A two dimensional quantization algorithm for CIR-based physical layer authentication
-
Budapest, Hungary, Jun.
-
F. J. Liu, X. Wang, and S. L. Primak, "A two dimensional quantization algorithm for CIR-based physical layer authentication," in Proc. IEEE Int. Conf. Commun., Budapest, Hungary, Jun. 2013, pp. 4724-4728.
-
(2013)
Proc. IEEE Int. Conf. Commun.
, pp. 4724-4728
-
-
Liu, F.J.1
Wang, X.2
Primak, S.L.3
-
140
-
-
84863039074
-
Robust physical layer authentication using inherent properties of channel impulse response
-
Baltimore, MD, USA, Nov.
-
F. J. Liu, X. Wang, and H. Tang, "Robust physical layer authentication using inherent properties of channel impulse response," in Proc. Mil. Commun. Conf., Baltimore, MD, USA, Nov. 2011, pp. 538-542.
-
(2011)
Proc. Mil. Commun. Conf.
, pp. 538-542
-
-
Liu, F.J.1
Wang, X.2
Tang, H.3
-
141
-
-
84921345607
-
Physical-layer authentication for multi-carrier transmission
-
Jan.
-
X. Wu and Z. Yang, "Physical-layer authentication for multi-carrier transmission," IEEE Commun. Lett., vol. 19, no. 1, pp. 74-77, Jan. 2015.
-
(2015)
IEEE Commun. Lett.
, vol.19
, Issue.1
, pp. 74-77
-
-
Wu, X.1
Yang, Z.2
-
142
-
-
67650676864
-
Power allocation tradeoffs in multicarrier authentication systems
-
Princeton, NJ, USA, Mar.
-
P. L. Yu, J. S. Baras, and B. M. Sadler, "Power allocation tradeoffs in multicarrier authentication systems," in Proc. IEEE Symp. Sarnoff, Princeton, NJ, USA, Mar. 2009, pp. 1-5.
-
(2009)
Proc. IEEE Symp. Sarnoff
, pp. 1-5
-
-
Yu, P.L.1
Baras, J.S.2
Sadler, B.M.3
-
143
-
-
84883373500
-
Wireless user authentication via comparison of power spectral densities
-
Sep.
-
J. K. Tugnait, "Wireless user authentication via comparison of power spectral densities," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1791-1802, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1791-1802
-
-
Tugnait, J.K.1
-
144
-
-
84863962575
-
Physical-layer identification of wired Ethernet devices
-
Aug.
-
R. M. Gerdes, M. Mina, S. F. Russell, and T. E. Daniels, "Physical-layer identification of wired Ethernet devices," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1339-1353, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.4
, pp. 1339-1353
-
-
Gerdes, R.M.1
Mina, M.2
Russell, S.F.3
Daniels, T.E.4
-
145
-
-
84876772985
-
Physical layer security of hybrid spread spectrum systems
-
Austin, TX, USA, Jan.
-
A. Martin, Y. Hasan, and R. M. Buehrer, "Physical layer security of hybrid spread spectrum systems," in Proc. IEEE Symp. Radio Wireless, Austin, TX, USA, Jan. 2013, pp. 370-372.
-
(2013)
Proc. IEEE Symp. Radio Wireless
, pp. 370-372
-
-
Martin, A.1
Hasan, Y.2
Buehrer, R.M.3
-
146
-
-
61349140043
-
Authentication over noisy channels
-
Feb.
-
L. Lai, H. El Gamal, and H. V. Poor, "Authentication over noisy channels," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 906-916, Feb. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.2
, pp. 906-916
-
-
Lai, L.1
El Gamal, H.2
Poor, H.V.3
-
147
-
-
73049092718
-
Channelbased spoofing detection in frequency-selective Rayleigh channels
-
Dec.
-
L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Channelbased spoofing detection in frequency-selective Rayleigh channels," IEEE Trans. Wireless Commun., vol. 8, no. 12, pp. 5948-5956, Dec. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.12
, pp. 5948-5956
-
-
Xiao, L.1
Greenstein, L.J.2
Mandayam, N.B.3
Trappe, W.4
-
148
-
-
4344692251
-
Physical-layer secrecy in AWGN via a class of chaotic DS/SS systems: Analysis and design
-
Sep.
-
Y. Hwang and H. C. Papadopoulos, "Physical-layer secrecy in AWGN via a class of chaotic DS/SS systems: Analysis and design," IEEE Trans. Signal Process., vol. 52, no. 9, pp. 2637-2649, Sep. 2004.
-
(2004)
IEEE Trans. Signal Process.
, vol.52
, Issue.9
, pp. 2637-2649
-
-
Hwang, Y.1
Papadopoulos, H.C.2
-
149
-
-
85014124024
-
Physical layer built-in security analysis and enhancement of CDMA systems
-
Atlantic City, NJ, USA, Oct.
-
T. Li, J. Ren, Q. Ling, and A. Jain, "Physical layer built-in security analysis and enhancement of CDMA systems," in Proc. IEEE Mil. Commun. Conf., vol. 2. Atlantic City, NJ, USA, Oct. 2005, pp. 956-962.
-
(2005)
Proc. IEEE Mil. Commun. Conf.
, vol.2
, pp. 956-962
-
-
Li, T.1
Ren, J.2
Ling, Q.3
Jain, A.4
-
150
-
-
84928128204
-
Authorized and rogue device discrimination using dimensionally reduced RF-DNA fingerprints
-
Jun.
-
D. R. Reising, M. A. Temple, and J. A. Jackson, "Authorized and rogue device discrimination using dimensionally reduced RF-DNA fingerprints," IEEE Trans. Inf. Forensics Security, vol. 10, no. 6, pp. 1180-1192, Jun. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.6
, pp. 1180-1192
-
-
Reising, D.R.1
Temple, M.A.2
Jackson, J.A.3
-
151
-
-
84988291998
-
Channel-based physical layer authentication
-
Austin, TX, USA, Dec.
-
C. Pei, N. Zhang, X. S. Shen, and J. W. Mark, "Channel-based physical layer authentication," in Proc. IEEE GLOBECOM, Austin, TX, USA, Dec. 2014, pp. 4114-4119.
-
(2014)
Proc. IEEE GLOBECOM
, pp. 4114-4119
-
-
Pei, C.1
Zhang, N.2
Shen, X.S.3
Mark, J.W.4
-
152
-
-
0038343420
-
From theory to practice: An overview of MIMO space-time coded wireless systems
-
Apr.
-
D. Gesbert, M. Shafi, D.-S. Shiu, P. J. Smith, and A. Naguib, "From theory to practice: An overview of MIMO space-time coded wireless systems," IEEE J. Sel. Areas Commun., vol. 21, no. 3, pp. 281-302, Apr. 2003.
-
(2003)
IEEE J. Sel. Areas Commun.
, vol.21
, Issue.3
, pp. 281-302
-
-
Gesbert, D.1
Shafi, M.2
Shiu, D.-S.3
Smith, P.J.4
Naguib, A.5
-
153
-
-
85032752478
-
Cooperative communications in resource-constrained wireless networks
-
May
-
Y.-W. Hong, W.-J. Huang, F.-H. Chiu, and C.-C. J. Kuo, "Cooperative communications in resource-constrained wireless networks," IEEE Signal Process. Mag., vol. 24, no. 3, pp. 47-57, May 2007.
-
(2007)
IEEE Signal Process. Mag.
, vol.24
, Issue.3
, pp. 47-57
-
-
Hong, Y.-W.1
Huang, W.-J.2
Chiu, F.-H.3
Kuo, C.-C.J.4
-
154
-
-
85032751776
-
Enhancing physicallayer secrecy in multiantenna wireless systems: An overview of signal processing approaches
-
Sep.
-
Y.-W. P. Hong, P.-C. Lan, and C.-C. J. Kuo, "Enhancing physicallayer secrecy in multiantenna wireless systems: An overview of signal processing approaches," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 29-40, Sep. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.5
, pp. 29-40
-
-
Hong, Y.-W.P.1
Lan, P.-C.2
Kuo, C.-C.J.3
-
155
-
-
85032751357
-
Cooperative security at the physical layer: A summary of recent advances
-
Sep.
-
R. Bassily et al., "Cooperative security at the physical layer: A summary of recent advances," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 16-28, Sep. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.5
, pp. 16-28
-
-
Bassily, R.1
-
156
-
-
85032751057
-
Coding for secrecy: An overview of error-control coding techniques for physical-layer security
-
Sep.
-
W. K. Harrison, J. Almeida, M. R. Bloch, S. W. McLaughlin, and J. Barros, "Coding for secrecy: An overview of error-control coding techniques for physical-layer security," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 41-50, Sep. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.5
, pp. 41-50
-
-
Harrison, W.K.1
Almeida, J.2
Bloch, M.R.3
McLaughlin, S.W.4
Barros, J.5
-
157
-
-
79955372872
-
Physical layer security in wireless networks: A tutorial
-
Apr.
-
Y.-S. Shiu, S. Y. Chang, H.-C. Wu, S. C.-H. Huang, and H.-H. Chen, "Physical layer security in wireless networks: A tutorial," IEEE Wireless Commun., vol. 18, no. 2, pp. 66-74, Apr. 2011.
-
(2011)
IEEE Wireless Commun.
, vol.18
, Issue.2
, pp. 66-74
-
-
Shiu, Y.-S.1
Chang, S.Y.2
Wu, H.-C.3
Huang, S.C.-H.4
Chen, H.-H.5
-
158
-
-
84906698210
-
Principles of physical layer security in multiuser wireless networks: A survey
-
3rd Quart.
-
A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey," IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550-1573, 3rd Quart. 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.3
, pp. 1550-1573
-
-
Mukherjee, A.1
Fakoorian, S.A.A.2
Huang, J.3
Swindlehurst, A.L.4
-
159
-
-
84959512212
-
A survey on wireless security: Technical challenges, recent advances and future trends
-
to be published
-
Y. Zou, J. Zhu, X. Wang, and L. Hanzo, "A survey on wireless security: Technical challenges, recent advances and future trends," Proc. IEEE, to be published.
-
Proc. IEEE
-
-
Zou, Y.1
Zhu, J.2
Wang, X.3
Hanzo, L.4
-
160
-
-
84930508485
-
Advances on security threats and countermeasures for cognitive radio networks: A survey
-
2nd Quart.
-
R. K. Sharma and D. B. Rawat, "Advances on security threats and countermeasures for cognitive radio networks: A survey," IEEE Commun. Surveys Tuts., vol. 17, no. 2, pp. 1023-1043, 2nd Quart. 2015.
-
(2015)
IEEE Commun. Surveys Tuts.
, vol.17
, Issue.2
, pp. 1023-1043
-
-
Sharma, R.K.1
Rawat, D.B.2
-
161
-
-
84925881945
-
PHY-layer resiliency in OFDM communications: A tutorial
-
1st Quart.
-
C. Shahriar et al., "PHY-layer resiliency in OFDM communications: A tutorial," IEEE Commun. Surveys Tuts., vol. 17, no. 1, pp. 292-314, 1st Quart. 2015.
-
(2015)
IEEE Commun. Surveys Tuts.
, vol.17
, Issue.1
, pp. 292-314
-
-
Shahriar, C.1
-
162
-
-
84962197386
-
A survey: Spoofing attacks in physical layer security
-
Clearwater Beach, FL, USA, Oct.
-
M. H. Yilmaz and H. Arslan, "A survey: Spoofing attacks in physical layer security," in Proc. IEEE Local Comput. Netw. Conf. Workshops, Clearwater Beach, FL, USA, Oct. 2015, pp. 812-817.
-
(2015)
Proc. IEEE Local Comput. Netw. Conf. Workshops
, pp. 812-817
-
-
Yilmaz, M.H.1
Arslan, H.2
-
163
-
-
84933037312
-
Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks
-
Jun.
-
D. Kapetanovic, G. Zheng, and F. Rusek, "Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks," IEEE Commun. Mag., vol. 53, no. 6, pp. 21-27, Jun. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.6
, pp. 21-27
-
-
Kapetanovic, D.1
Zheng, G.2
Rusek, F.3
-
164
-
-
84925359289
-
A comparative review on the wireless implantable medical devices privacy and security
-
Athens, Greece, Nov.
-
Z. E. Ankarali et al., "A comparative review on the wireless implantable medical devices privacy and security," in Proc. Conf. Wireless Mobile Commun. Healthcare, Athens, Greece, Nov. 2014, pp. 246-249.
-
(2014)
Proc. Conf. Wireless Mobile Commun. Healthcare
, pp. 246-249
-
-
Ankarali, Z.E.1
-
167
-
-
84904788826
-
-
Boca Raton, FL, USA: CRC Press
-
X. S. Zhou, L. Song, and Y. Zhang, Physical Layer Security in Wireless Communications. Boca Raton, FL, USA: CRC Press, 2013.
-
(2013)
Physical Layer Security in Wireless Communications
-
-
Zhou, X.S.1
Song, L.2
Zhang, Y.3
-
168
-
-
84861327707
-
A full-duplex active eavesdropper in MIMO wiretap channels: Construction and countermeasures
-
Pacific Grove, CA, USA, Nov.
-
A. Mukherjee and A. L. Swindlehurst, "A full-duplex active eavesdropper in MIMO wiretap channels: Construction and countermeasures," in Proc. 45th Asilomar Conf. Signals Syst. Comput., Pacific Grove, CA, USA, Nov. 2011, pp. 265-269.
-
(2011)
Proc. 45th Asilomar Conf. Signals Syst. Comput.
, pp. 265-269
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
169
-
-
84981309810
-
Proactive eavesdropping via cognitive jamming in fading channels
-
submitted
-
J. Xu, L. Duan, and R. Zhang, "Proactive eavesdropping via cognitive jamming in fading channels," IEEE Trans. Inf. Theory, submitted.
-
IEEE Trans. Inf. Theory
-
-
Xu, J.1
Duan, L.2
Zhang, R.3
-
170
-
-
84962603357
-
Proactive eavesdropping via jamming for rate maximization over Rayleigh fading channels
-
Feb.
-
J. Xu, L. Duan, and R. Zhang, "Proactive eavesdropping via jamming for rate maximization over Rayleigh fading channels," IEEE Wireless Commun. Lett., vol. 5, no. 1, pp. 80-83, Feb. 2016.
-
(2016)
IEEE Wireless Commun. Lett.
, vol.5
, Issue.1
, pp. 80-83
-
-
Xu, J.1
Duan, L.2
Zhang, R.3
-
171
-
-
69749083720
-
Channelbased detection of Sybil attacks in wireless networks
-
Sep.
-
L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Channelbased detection of Sybil attacks in wireless networks," IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 492-503, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.3
, pp. 492-503
-
-
Xiao, L.1
Greenstein, L.J.2
Mandayam, N.B.3
Trappe, W.4
-
172
-
-
84855933248
-
Security embedding codes
-
Feb.
-
H. D. Ly, T. Liu, and Y. Blankenship, "Security embedding codes," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 148-159, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 148-159
-
-
Ly, H.D.1
Liu, T.2
Blankenship, Y.3
-
173
-
-
84861172829
-
Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: A security gap analysis
-
Jun.
-
M. Baldi, M. Bianchi, and F. Chiaraluce, "Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: A security gap analysis," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 883-894, Jun. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.3
, pp. 883-894
-
-
Baldi, M.1
Bianchi, M.2
Chiaraluce, F.3
-
174
-
-
84877902869
-
A classification of unimodular lattice wiretap codes in small dimensions
-
Jun.
-
F. Lin and F. Oggier, "A classification of unimodular lattice wiretap codes in small dimensions," IEEE Trans. Inf. Theory, vol. 59, no. 6, pp. 3295-3303, Jun. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.6
, pp. 3295-3303
-
-
Lin, F.1
Oggier, F.2
-
175
-
-
84896958699
-
Providing secrecy with structured codes: Twouser Gaussian channels
-
Apr.
-
X. He and A. Yener, "Providing secrecy with structured codes: Twouser Gaussian channels," IEEE Trans. Inf. Theory, vol. 60, no. 4, pp. 2121-2138, Apr. 2014.
-
(2014)
IEEE Trans. Inf. Theory
, vol.60
, Issue.4
, pp. 2121-2138
-
-
He, X.1
Yener, A.2
-
176
-
-
0029405656
-
Generalized privacy amplification
-
Nov.
-
C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Maurer, U.M.4
-
177
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
Aug.
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J.-M. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
178
-
-
80051720839
-
LDPC codes for the Gaussian wiretap channel
-
Sep.
-
D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, and B.-J. Kwak, "LDPC codes for the Gaussian wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 532-540, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 532-540
-
-
Klinc, D.1
Ha, J.2
McLaughlin, S.W.3
Barros, J.4
Kwak, B.-J.5
-
179
-
-
80053941690
-
Achieving the secrecy capacity of wiretap channels using polar codes
-
Oct.
-
H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6428-6443, Oct. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.10
, pp. 6428-6443
-
-
Mahdavifar, H.1
Vardy, A.2
-
180
-
-
0027629488
-
Common randomness in information theory and cryptography. I. Secret sharing
-
Jul.
-
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography. I. Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
181
-
-
84863913546
-
Physical-layer secrecy for OFDM transmissions over fading channels
-
Aug.
-
F. Renna, N. Laurenti, and H. V. Poor, "Physical-layer secrecy for OFDM transmissions over fading channels," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1354-1367, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.4
, pp. 1354-1367
-
-
Renna, F.1
Laurenti, N.2
Poor, H.V.3
-
182
-
-
84865360202
-
Degraded compound multi-receiver wiretap channels
-
Sep.
-
E. Ekrem and S. Ulukus, "Degraded compound multi-receiver wiretap channels," IEEE Trans. Inf. Theory, vol. 58, no. 9, pp. 5681-5698, Sep. 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.9
, pp. 5681-5698
-
-
Ekrem, E.1
Ulukus, S.2
-
183
-
-
73449104694
-
Compound wiretap channels
-
Dec.
-
Y. Liang, G. Kramer, H. V. Poor, and S. Shamai, "Compound wiretap channels," EURASIP J. Wireless Commun. Netw., vol. 2009, pp. 976-1002, Dec. 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw.
, vol.2009
, pp. 976-1002
-
-
Liang, Y.1
Kramer, G.2
Poor, H.V.3
Shamai, S.4
-
184
-
-
52349104395
-
The secrecy capacity of a class of parallel Gaussian compound wiretap channels
-
Toronto, ON, Canada, Jul.
-
T. Liu, V. Prabhakaran, and S. Vishwanath, "The secrecy capacity of a class of parallel Gaussian compound wiretap channels," in Proc. IEEE Int. Symp. Inf. Theory, Toronto, ON, Canada, Jul. 2008, pp. 116-120.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 116-120
-
-
Liu, T.1
Prabhakaran, V.2
Vishwanath, S.3
-
185
-
-
84908245996
-
MIMO wiretap channels with unknown and varying eavesdropper channel states
-
Nov.
-
X. He and A. Yener, "MIMO wiretap channels with unknown and varying eavesdropper channel states," IEEE Trans. Inf. Theory, vol. 60, no. 11, pp. 6844-6869, Nov. 2014.
-
(2014)
IEEE Trans. Inf. Theory
, vol.60
, Issue.11
, pp. 6844-6869
-
-
He, X.1
Yener, A.2
-
186
-
-
0031272703
-
Capacity of fading channels with channel side information
-
Nov.
-
A. J. Goldsmith and P. P. Varaiya, "Capacity of fading channels with channel side information," IEEE Trans. Inf. Theory, vol. 43, no. 6, pp. 1986-1992, Nov. 1997.
-
(1997)
IEEE Trans. Inf. Theory
, vol.43
, Issue.6
, pp. 1986-1992
-
-
Goldsmith, A.J.1
Varaiya, P.P.2
-
187
-
-
40949147785
-
Multiple-access channels with confidential messages
-
Mar.
-
Y. Liang and H. V. Poor, "Multiple-access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.3
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
188
-
-
84880521772
-
MIMO multiple access channel with an arbitrarily varying eavesdropper: Secrecy degrees of freedom
-
Aug.
-
X. He, A. Khisti, and A. Yener, "MIMO multiple access channel with an arbitrarily varying eavesdropper: Secrecy degrees of freedom," IEEE Trans. Inf. Theory, vol. 59, no. 8, pp. 4733-4745, Aug. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.8
, pp. 4733-4745
-
-
He, X.1
Khisti, A.2
Yener, A.3
-
189
-
-
84888354468
-
Rate regions for multiple access channel with conference and secrecy constraints
-
Dec.
-
P. Xu, Z. Ding, and X. Dai, "Rate regions for multiple access channel with conference and secrecy constraints," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1961-1974, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.12
, pp. 1961-1974
-
-
Xu, P.1
Ding, Z.2
Dai, X.3
-
191
-
-
84923915852
-
Highly efficient known-plaintext attacks against orthogonal blinding based physical layer security
-
Feb.
-
Y. Zheng, M. Schulz, W. Lou, Y. T. Hou, and M. Hollick, "Highly efficient known-plaintext attacks against orthogonal blinding based physical layer security," IEEE Wireless Commun. Lett., vol. 4, no. 1, pp. 34-37, Feb. 2015.
-
(2015)
IEEE Wireless Commun. Lett.
, vol.4
, Issue.1
, pp. 34-37
-
-
Zheng, Y.1
Schulz, M.2
Lou, W.3
Hou, Y.T.4
Hollick, M.5
-
192
-
-
84913593877
-
Joint information-and jamming-beamforming for physical layer security with full duplex base station
-
Dec.
-
F. Zhu, F. Gao, M. Yao, and H. Zou, "Joint information-and jamming-beamforming for physical layer security with full duplex base station," IEEE Trans. Signal Process., vol. 62, no. 24, pp. 6391-6401, Dec. 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.24
, pp. 6391-6401
-
-
Zhu, F.1
Gao, F.2
Yao, M.3
Zou, H.4
-
193
-
-
0018523303
-
Capacity theorems for the relay channel
-
Sep.
-
T. Cover and A. E. Gamal, "Capacity theorems for the relay channel," IEEE Trans. Inf. Theory, vol. 25, no. 5, pp. 572-584, Sep. 1979.
-
(1979)
IEEE Trans. Inf. Theory
, vol.25
, Issue.5
, pp. 572-584
-
-
Cover, T.1
Gamal, A.E.2
-
194
-
-
84907222991
-
Semantically secure lattice codes for the Gaussian wiretap channel
-
Oct.
-
C. Ling, L. Luzzi, J.-C. Belfiore, and D. Stehlé, "Semantically secure lattice codes for the Gaussian wiretap channel," IEEE Trans. Inf. Theory, vol. 60, no. 10, pp. 6399-6416, Oct. 2014.
-
(2014)
IEEE Trans. Inf. Theory
, vol.60
, Issue.10
, pp. 6399-6416
-
-
Ling, C.1
Luzzi, L.2
Belfiore, J.-C.3
Stehlé, D.4
-
195
-
-
0346342498
-
Channel estimation using implicit training
-
Jan.
-
A. G. Orozco-Lugo, M. M. Lara, and D. C. McLernon, "Channel estimation using implicit training," IEEE Trans. Signal Process., vol. 52, no. 1, pp. 240-254, Jan. 2004.
-
(2004)
IEEE Trans. Signal Process.
, vol.52
, Issue.1
, pp. 240-254
-
-
Orozco-Lugo, A.G.1
Lara, M.M.2
McLernon, D.C.3
-
196
-
-
0035669989
-
A comparison of pilot-aided channel estimation methods for OFDM systems
-
Dec.
-
M. Morelli and U. Mengali, "A comparison of pilot-aided channel estimation methods for OFDM systems," IEEE Trans. Signal Process., vol. 49, no. 12, pp. 3065-3073, Dec. 2001.
-
(2001)
IEEE Trans. Signal Process.
, vol.49
, Issue.12
, pp. 3065-3073
-
-
Morelli, M.1
Mengali, U.2
-
197
-
-
67650671123
-
Key agreement from close secrets over unsecured channels
-
Heidelberg, Germany: Springer
-
B. Kanukurthi and L. Reyzin, "Key agreement from close secrets over unsecured channels," in Advances in Cryptology - EUROCRYPT 2009. Heidelberg, Germany: Springer, 2009, pp. 206-223.
-
(2009)
Advances in Cryptology - EUROCRYPT 2009.
, pp. 206-223
-
-
Kanukurthi, B.1
Reyzin, L.2
-
198
-
-
84922456022
-
GenePrint: Generic and accurate physical-layer identification for UHF RFID tags
-
Apr.
-
J. Han et al., "GenePrint: Generic and accurate physical-layer identification for UHF RFID tags," IEEE/ACM Trans. Netw., vol. 24, no. 2, pp. 846-858, Apr. 2016.
-
(2016)
IEEE/ACM Trans. Netw.
, vol.24
, Issue.2
, pp. 846-858
-
-
Han, J.1
-
199
-
-
85032752174
-
Scaling up MIMO: Opportunities and challenges with very large arrays
-
Jan.
-
F. Rusek et al., "Scaling up MIMO: Opportunities and challenges with very large arrays," IEEE Signal Process. Mag., vol. 30, no. 1, pp. 40-60, Jan. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.1
, pp. 40-60
-
-
Rusek, F.1
-
200
-
-
84963567995
-
Linear precoding of data and artificial noise in secure massive MIMO systems
-
Mar.
-
J. Zhu, R. Schober, and V. K. Bhargava, "Linear precoding of data and artificial noise in secure massive MIMO systems," IEEE Trans. Wireless Commun., vol. 15, no. 3, pp. 2245-2261, Mar. 2016.
-
(2016)
IEEE Trans. Wireless Commun.
, vol.15
, Issue.3
, pp. 2245-2261
-
-
Zhu, J.1
Schober, R.2
Bhargava, V.K.3
-
201
-
-
84907195591
-
Secure transmission in multicell massive MIMO systems
-
Sep.
-
J. Zhu, R. Schober, and V. K. Bhargava, "Secure transmission in multicell massive MIMO systems," IEEE Trans. Wireless Commun., vol. 13, no. 9, pp. 4766-4781, Sep. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.9
, pp. 4766-4781
-
-
Zhu, J.1
Schober, R.2
Bhargava, V.K.3
-
202
-
-
84961590340
-
Jamming-aided secure communication in massive MIMO Rician channels
-
Dec.
-
J. Wang, J. Lee, F. Wang, and T. Q. S. Quek, "Jamming-aided secure communication in massive MIMO Rician channels," IEEE Trans. Wireless Commun., vol. 14, no. 12, pp. 6854-6868, Dec. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.12
, pp. 6854-6868
-
-
Wang, J.1
Lee, J.2
Wang, F.3
Quek, T.Q.S.4
-
203
-
-
84946607375
-
Large-scale MIMO relaying techniques for physical layer security: AF or DF?
-
Sep.
-
X. Chen, L. Lei, H. Zhang, and C. Yuen, "Large-scale MIMO relaying techniques for physical layer security: AF or DF?" IEEE Trans. Wireless Commun., vol. 14, no. 9, pp. 5135-5146, Sep. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.9
, pp. 5135-5146
-
-
Chen, X.1
Lei, L.2
Zhang, H.3
Yuen, C.4
-
204
-
-
84922540471
-
Millimeter wave mobile communications for 5G cellular: It will work!
-
T. S. Rappaport et al., "Millimeter wave mobile communications for 5G cellular: It will work!" IEEE Access, vol. 1, pp. 335-349, 2013.
-
(2013)
IEEE Access
, vol.1
, pp. 335-349
-
-
Rappaport, T.S.1
-
205
-
-
84963746451
-
Switched phased-array transmission architecture for secure millimeter-wave wireless communication
-
Mar.
-
N. N. Alotaibi and K. A. Hamdi, "Switched phased-array transmission architecture for secure millimeter-wave wireless communication," IEEE Trans. Commun., vol. 64, no. 3, pp. 1303-1312, Mar. 2016.
-
(2016)
IEEE Trans. Commun.
, vol.64
, Issue.3
, pp. 1303-1312
-
-
Alotaibi, N.N.1
Hamdi, K.A.2
-
206
-
-
84964868834
-
Silent antenna hopping transmission technique for secure millimeter-wave wireless communication
-
San Diego, CA, USA, Dec.
-
N. N. Alotaibi and K. A. Hamdi, "Silent antenna hopping transmission technique for secure millimeter-wave wireless communication," in Proc. IEEE GLOBECOM, San Diego, CA, USA, Dec. 2015, pp. 1-6.
-
(2015)
Proc. IEEE GLOBECOM
, pp. 1-6
-
-
Alotaibi, N.N.1
Hamdi, K.A.2
-
207
-
-
77954455181
-
LTEadvanced: Heterogeneous networks
-
Lucca, Italy, Apr.
-
A. Khandekar, N. Bhushan, J. Tingfang, and V. Vanghi, "LTEadvanced: Heterogeneous networks," in Proc. Eur. Wireless Conf., Lucca, Italy, Apr. 2010, pp. 978-982.
-
(2010)
Proc. Eur. Wireless Conf.
, pp. 978-982
-
-
Khandekar, A.1
Bhushan, N.2
Tingfang, J.3
Vanghi, V.4
-
208
-
-
84963742236
-
Physical layer security in heterogeneous cellular networks
-
Mar.
-
H.-M. Wang, T.-X. Zheng, J. Yuan, D. Towsley, and M. H. Lee, "Physical layer security in heterogeneous cellular networks," IEEE Trans. Commun., vol. 64, no. 3, pp. 1204-1219, Mar. 2016.
-
(2016)
IEEE Trans. Commun.
, vol.64
, Issue.3
, pp. 1204-1219
-
-
Wang, H.-M.1
Zheng, T.-X.2
Yuan, J.3
Towsley, D.4
Lee, M.H.5
-
209
-
-
84962195676
-
Physical-layer security for full duplex communications with self-interference mitigation
-
Jan.
-
F. Zhu, F. Gao, T. Zhang, K. Sun, and M. Yao, "Physical-layer security for full duplex communications with self-interference mitigation," IEEE Trans. Wireless Commun., vol. 15, no. 1, pp. 329-340, Jan. 2016.
-
(2016)
IEEE Trans. Wireless Commun.
, vol.15
, Issue.1
, pp. 329-340
-
-
Zhu, F.1
Gao, F.2
Zhang, T.3
Sun, K.4
Yao, M.5
-
210
-
-
84929353100
-
Secure degrees of freedom of MIMO rayleigh block fading wiretap channels with no CSI anywhere
-
May
-
T.-Y. Liu, P. Mukherjee, S. Ulukus, S.-C. Lin, and Y.-W. P. Hong, "Secure degrees of freedom of MIMO rayleigh block fading wiretap channels with no CSI anywhere," IEEE Trans. Wireless Commun., vol. 14, no. 5, pp. 2655-2669, May 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.5
, pp. 2655-2669
-
-
Liu, T.-Y.1
Mukherjee, P.2
Ulukus, S.3
Lin, S.-C.4
Hong, Y.-W.P.5
-
211
-
-
84883051913
-
On the trade-off between security and energy efficiency in cooperative spectrum sensing for cognitive radio
-
Aug.
-
S. Althunibat et al., "On the trade-off between security and energy efficiency in cooperative spectrum sensing for cognitive radio," IEEE Commun. Lett., vol. 17, no. 8, pp. 1564-1567, Aug. 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.8
, pp. 1564-1567
-
-
Althunibat, S.1
-
212
-
-
84959334315
-
Lightweight security against combined IE and SSDF attacks in cooperative spectrum sensing for cognitive radio networks
-
V. Sucasas et al., "Lightweight security against combined IE and SSDF attacks in cooperative spectrum sensing for cognitive radio networks," Security Commun. Netw., vol. 8, no. 18, pp. 3978-3994, 2015.
-
(2015)
Security Commun. Netw.
, vol.8
, Issue.18
, pp. 3978-3994
-
-
Sucasas, V.1
-
213
-
-
84879072350
-
On physical layer security for cognitive radio networks
-
May/Jun.
-
Z. Shu, Y. Qian, and S. Ci, "On physical layer security for cognitive radio networks," IEEE Netw., vol. 27, no. 3, pp. 28-33, May/Jun. 2013.
-
(2013)
IEEE Netw.
, vol.27
, Issue.3
, pp. 28-33
-
-
Shu, Z.1
Qian, Y.2
Ci, S.3
-
214
-
-
84901022882
-
A new decomposition method for multiuser DC-programming and its applications
-
Jun.
-
A. Alvarado, G. Scutari, and J.-S. Pang, "A new decomposition method for multiuser DC-programming and its applications," IEEE Trans. Signal Process., vol. 62, no. 11, pp. 2984-2998, Jun. 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.11
, pp. 2984-2998
-
-
Alvarado, A.1
Scutari, G.2
Pang, J.-S.3
-
215
-
-
84919786115
-
Secure robust ergodic uplink resource allocation in relay-assisted cognitive radio networks
-
Jan.
-
N. Mokari, S. Parsaeefard, H. Saeedi, P. Azmi, and E. Hossain, "Secure robust ergodic uplink resource allocation in relay-assisted cognitive radio networks," IEEE Trans. Signal Process., vol. 63, no. 2, pp. 291-304, Jan. 2015.
-
(2015)
IEEE Trans. Signal Process.
, vol.63
, Issue.2
, pp. 291-304
-
-
Mokari, N.1
Parsaeefard, S.2
Saeedi, H.3
Azmi, P.4
Hossain, E.5
-
216
-
-
84923221226
-
MASK-BAN: Movement-aided authenticated secret key extraction utilizing channel characteristics in body area networks
-
Feb.
-
L. Shi, J. Yuan, S. Yu, and M. Li, "MASK-BAN: Movement-aided authenticated secret key extraction utilizing channel characteristics in body area networks," IEEE Internet Things J., vol. 2, no. 1, pp. 52-62, Feb. 2015.
-
(2015)
IEEE Internet Things J.
, vol.2
, Issue.1
, pp. 52-62
-
-
Shi, L.1
Yuan, J.2
Yu, S.3
Li, M.4
-
217
-
-
84883408567
-
BANA: Body area network authentication exploiting channel characteristics
-
Sep.
-
L. Shi, M. Li, S. Yu, and J. Yuan, "BANA: Body area network authentication exploiting channel characteristics," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1803-1816, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1803-1816
-
-
Shi, L.1
Li, M.2
Yu, S.3
Yuan, J.4
-
218
-
-
84911072446
-
Securing first-hop data provenance for bodyworn devices using wireless link fingerprints
-
Dec.
-
S. T. Ali, V. Sivaraman, D. Ostry, G. Tsudik, and S. Jha, "Securing first-hop data provenance for bodyworn devices using wireless link fingerprints," IEEE Trans. Inf. Forensics Security, vol. 9, no. 12, pp. 2193-2204, Dec. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.12
, pp. 2193-2204
-
-
Ali, S.T.1
Sivaraman, V.2
Ostry, D.3
Tsudik, G.4
Jha, S.5
-
219
-
-
84927712570
-
Safeguarding 5G wireless communication networks using physical layer security
-
Apr.
-
N. Yang et al., "Safeguarding 5G wireless communication networks using physical layer security," IEEE Commun. Mag., vol. 53, no. 4, pp. 20-27, Apr. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.4
, pp. 20-27
-
-
Yang, N.1
-
220
-
-
84921323282
-
Interference exploitation in D2D-enabled cellular networks: A secrecy perspective
-
Jan.
-
C. Ma et al., "Interference exploitation in D2D-enabled cellular networks: A secrecy perspective," IEEE Trans. Commun., vol. 63, no. 1, pp. 229-242, Jan. 2015.
-
(2015)
IEEE Trans. Commun.
, vol.63
, Issue.1
, pp. 229-242
-
-
Ma, C.1
-
221
-
-
84921696409
-
Secure communications of cellular users in device-to-device communication underlaying cellular networks
-
Hefei, China, Oct.
-
Y. Wang, Z. Chen, Y. Yao, M. Shen, and B. Xia, "Secure communications of cellular users in device-to-device communication underlaying cellular networks," in Proc. 6th Int. Conf. Wireless Commun. Signal Process., Hefei, China, Oct. 2014, pp. 1-6.
-
(2014)
Proc. 6th Int. Conf. Wireless Commun. Signal Process.
, pp. 1-6
-
-
Wang, Y.1
Chen, Z.2
Yao, Y.3
Shen, M.4
Xia, B.5
-
222
-
-
84857921504
-
Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions
-
4th Quart.
-
G. Karagiannis et al., "Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions," IEEE Commun. Surveys Tuts., vol. 13, no. 4, pp. 584-616, 4th Quart. 2011.
-
(2011)
IEEE Commun. Surveys Tuts.
, vol.13
, Issue.4
, pp. 584-616
-
-
Karagiannis, G.1
-
223
-
-
84863962542
-
Joint topology control and authentication design in mobile ad hoc networks with cooperative communications
-
Jul.
-
Q. Guan, F. R. Yu, S. Jiang, and V. C. M. Leung, "Joint topology control and authentication design in mobile ad hoc networks with cooperative communications," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2674-2685, Jul. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.6
, pp. 2674-2685
-
-
Guan, Q.1
Yu, F.R.2
Jiang, S.3
Leung, V.C.M.4
-
224
-
-
84901454675
-
Physical layer authentication for mobile systems with time-varying carrier frequency offsets
-
May
-
W. Hou, X. Wang, J.-Y. Chouinard, and A. Refaey, "Physical layer authentication for mobile systems with time-varying carrier frequency offsets," IEEE Trans. Commun., vol. 62, no. 5, pp. 1658-1667, May 2014.
-
(2014)
IEEE Trans. Commun.
, vol.62
, Issue.5
, pp. 1658-1667
-
-
Hou, W.1
Wang, X.2
Chouinard, J.-Y.3
Refaey, A.4
|