-
1
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Information Theoretic Security," Found. Trends Commun. Inf. Theory, vol. 5, nos. 4/5, pp. 355-580, 2008.
-
(2008)
Found. Trends Commun. Inf. Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai Shitz, S.3
-
4
-
-
84906698210
-
Principles of physical layer security in multiuser wireless networks: A survey
-
Jul.-Sep.
-
A. Mukherjee, S. Fakoorian, J. Huang, and A. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey," IEEE Commun. Surveys Tut., vol. 16, no. 3, pp. 1550-1573, Jul.-Sep. 2014.
-
(2014)
IEEE Commun. Surveys Tut.
, vol.16
, Issue.3
, pp. 1550-1573
-
-
Mukherjee, A.1
Fakoorian, S.2
Huang, J.3
Swindlehurst, A.4
-
5
-
-
84960105777
-
Physical-layer security in the internet of things: Sensing and communication confidentiality under resource constraints
-
Oct.
-
A. Mukherjee, "Physical-layer security in the internet of things: Sensing and communication confidentiality under resource constraints," Proc. IEEE, vol. 103, no. 10, pp. 1747-1761, Oct. 2015.
-
(2015)
Proc. IEEE
, vol.103
, Issue.10
, pp. 1747-1761
-
-
Mukherjee, A.1
-
6
-
-
1942487834
-
Fundamental analysis for visible-light communication system using LED lights
-
Feb.
-
T. Komine and M. Nakagawa, "Fundamental analysis for visible-light communication system using LED lights," IEEE Trans. Consum. Electron., vol. 50, no. 1, pp. 100-107, Feb. 2004.
-
(2004)
IEEE Trans. Consum. Electron.
, vol.50
, Issue.1
, pp. 100-107
-
-
Komine, T.1
Nakagawa, M.2
-
7
-
-
84940056690
-
Physical-layer security forMISO visible light communication channels
-
Sep.
-
A.Mostafa and L. Lampe, "Physical-layer security forMISO visible light communication channels," IEEE J. Sel. Areas Commun., vol. 33, no. 9, pp. 1806-1818, Sep. 2015.
-
(2015)
IEEE J. Sel. Areas Commun.
, vol.33
, Issue.9
, pp. 1806-1818
-
-
Mostafa, A.1
Lampe, L.2
-
8
-
-
44049095075
-
Secret communication via multi-antenna transmission
-
Mar.
-
Z. Li,W. Trappe, and R. Yates, "Secret communication via multi-antenna transmission," in Proc. 41st Annu. Conf. Inf. Sci. Syst., Mar. 2007, pp. 905-910.
-
(2007)
Proc. 41st Annu. Conf. Inf. Sci. Syst.
, pp. 905-910
-
-
Li, Z.1
Trappe, W.2
Yates, R.3
-
9
-
-
51649110931
-
Achievable rates in Gaussian MISO channels with secrecy constraints
-
Jun.
-
S. Shafiee and S. Ulukus, "Achievable rates in Gaussian MISO channels with secrecy constraints," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2007, pp. 2466-2470.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2466-2470
-
-
Shafiee, S.1
Ulukus, S.2
-
10
-
-
77953802876
-
Secure transmission with multiple antennas I: TheMISOME wiretap channel
-
Jul.
-
A. Khisti and G.W.Wornell, "Secure transmission with multiple antennas I: TheMISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
11
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Aug.
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
12
-
-
77951542370
-
Robust beamforming design: From cognitive radioMISO channels to secrecyMISO channels
-
Nov.
-
L. Zhang,Y. C. Liang,Y. Pei, and R. Zhang, "Robust beamforming design: From cognitive radioMISO channels to secrecyMISO channels," in Proc. IEEE Global Telecommun Conf., Nov. 2009, pp. 1-5.
-
(2009)
Proc. IEEE Global Telecommun Conf.
, pp. 1-5
-
-
Zhang, L.1
Liang, Y.C.2
Pei, Y.3
Zhang, R.4
-
13
-
-
79957977565
-
Robust beamforming forMISO wiretap channel by optimizing the worst-case secrecy capacity
-
Nov.
-
W. Shi and J. Ritcey, "Robust beamforming forMISO wiretap channel by optimizing the worst-case secrecy capacity," in Proc. 44th Asilomar Conf. Signals, Syst. Comput., Nov. 2010, pp. 300-304.
-
(2010)
Proc. 44th Asilomar Conf. Signals, Syst. Comput.
, pp. 300-304
-
-
Shi, W.1
Ritcey, J.2
-
14
-
-
79960433598
-
Optimal and robust transmit designs forMISO channel secrecy by semidefinite programming
-
Aug.
-
Q. Li andW. K.Ma, "Optimal and robust transmit designs forMISO channel secrecy by semidefinite programming," IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799-3812, Aug. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.8
, pp. 3799-3812
-
-
Li, Q.1
Ma, W.K.2
-
15
-
-
84863359764
-
Robust secure transmission in MISO channels based on worst-case optimization
-
Apr.
-
J. Huang and A. Swindlehurst, "Robust secure transmission in MISO channels based on worst-case optimization," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1696-1707, Apr. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.4
, pp. 1696-1707
-
-
Huang, J.1
Swindlehurst, A.2
-
16
-
-
84903554995
-
Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper
-
May
-
K. Cumanan, Z. Ding, B. Sharif, G. Y. Tian, and K. K. Leung, "Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper," IEEE Trans. Veh. Technol., vol. 63, no. 4, pp. 1678-1690, May 2014.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.4
, pp. 1678-1690
-
-
Cumanan, K.1
Ding, Z.2
Sharif, B.3
Tian, G.Y.4
Leung, K.K.5
-
17
-
-
84929359010
-
Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer
-
May
-
Z. Chu et al., "Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer," IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 1833-1847, May 2015.
-
(2015)
IEEE Trans. Veh. Technol.
, vol.64
, Issue.5
, pp. 1833-1847
-
-
Chu, Z.1
-
18
-
-
33750593475
-
MIMO broadcast channels with finite-rate feedback
-
Nov.
-
N. Jindal, "MIMO broadcast channels with finite-rate feedback," IEEE Trans. Inf. Theory, vol. 52, no. 11, pp. 5045-5060, Nov. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.11
, pp. 5045-5060
-
-
Jindal, N.1
-
19
-
-
70450159497
-
Predistortion in optical wireless transmission using OFDM
-
Aug.
-
H. Elgala, R. Mesleh, and H. Haas, "Predistortion in optical wireless transmission using OFDM," in Proc. 9th Int. Conf. Hybrid Intell. Syst., Aug. 2009, vol. 2, pp. 184-189.
-
(2009)
Proc. 9th Int. Conf. Hybrid Intell. Syst.
, vol.2
, pp. 184-189
-
-
Elgala, H.1
Mesleh, R.2
Haas, H.3
-
20
-
-
60949085102
-
Broadband information broadcasting using LED-based interior lighting
-
Dec.
-
J. Grubor, S. Randel, K. D. Langer, and J. W. Walewski, "Broadband information broadcasting using LED-based interior lighting," J. Lightw. Technol., vol. 26, no. 24, pp. 3883-3892, Dec. 2008.
-
(2008)
J. Lightw. Technol.
, vol.26
, Issue.24
, pp. 3883-3892
-
-
Grubor, J.1
Randel, S.2
Langer, K.D.3
Walewski, J.W.4
-
21
-
-
0031070220
-
Wireless infrared communications
-
Feb.
-
J. Kahn and J. Barry, "Wireless infrared communications," Proc. IEEE, vol. 85, no. 2, pp. 265-298, Feb. 1997.
-
(1997)
Proc. IEEE
, vol.85
, Issue.2
, pp. 265-298
-
-
Kahn, J.1
Barry, J.2
-
22
-
-
84959342400
-
Gaussian wiretap channel with amplitude and variance constraints
-
Oct.
-
O. Ozel, E. Ekrem, and S. Ulukus, "Gaussian wiretap channel with amplitude and variance constraints," IEEE Trans. Inf. Theory, vol. 61, no. 10, pp. 5553-5563, Oct. 2015.
-
(2015)
IEEE Trans. Inf. Theory
, vol.61
, Issue.10
, pp. 5553-5563
-
-
Ozel, O.1
Ekrem, E.2
Ulukus, S.3
-
23
-
-
0032207223
-
Robust convex optimization
-
Nov.
-
A. Ben-Tal and A. Nemirovski, "Robust convex optimization," Math Oper. Res., vol. 23, no. 4, pp. 769-805, Nov. 1998.
-
(1998)
Math Oper. Res.
, vol.23
, Issue.4
, pp. 769-805
-
-
Ben-Tal, A.1
Nemirovski, A.2
-
25
-
-
0032664938
-
Robust solutions to uncertain linear programs
-
A. Ben-Tal and A. Nemirovski, "Robust solutions to uncertain linear programs," Oper. Res. Lett., vol. 25, pp. 1-13, 1999.
-
(1999)
Oper. Res. Lett.
, vol.25
, pp. 1-13
-
-
Ben-Tal, A.1
Nemirovski, A.2
-
26
-
-
0141712989
-
Robust optimization - Methodology and applications
-
A. Ben-Tal and A. Nemirovski, "Robust optimization - Methodology and applications," Math. Program., vol. 92, pp. 453-480, 2002.
-
(2002)
Math. Program.
, vol.92
, pp. 453-480
-
-
Ben-Tal, A.1
Nemirovski, A.2
-
28
-
-
84855790699
-
Interior point methods 25 years later
-
J. Gondzio, "Interior point methods 25 years later," Eur. J. Oper. Res., vol. 218, no. 3, pp. 587-601, 2012.
-
(2012)
Eur. J. Oper. Res.
, vol.218
, Issue.3
, pp. 587-601
-
-
Gondzio, J.1
-
31
-
-
84055212429
-
High data rate multiple input multiple output (MIMO) optical wireless communications using white LED lighting
-
Dec.
-
L. Zeng et al., "High data rate multiple input multiple output (MIMO) optical wireless communications using white LED lighting," IEEE J. Sel. Areas Commun., vol. 27, no. 9, pp. 1654-1662, Dec. 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.9
, pp. 1654-1662
-
-
Zeng, L.1
-
32
-
-
0000367775
-
Ray-tracing algorithms for fast calculation of the channel impulse response on diffuse IR wireless indoor channels
-
Oct.
-
F. J. López-Hernández et al., "Ray-tracing algorithms for fast calculation of the channel impulse response on diffuse IR wireless indoor channels," Opt. Eng., vol. 30, no. 10, pp. 2775-2780, Oct. 2000.
-
(2000)
Opt. Eng.
, vol.30
, Issue.10
, pp. 2775-2780
-
-
López-Hernández, F.J.1
-
34
-
-
0004267646
-
-
Princeton, NJ, USA: Princeton Univ. Press
-
R. T. Rockafellar, Convex Analysis. Princeton, NJ, USA: Princeton Univ. Press, 1970.
-
(1970)
Convex Analysis
-
-
Rockafellar, R.T.1
|