-
1
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Aug
-
X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective, " IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
2
-
-
51649095674
-
Capacity theorems for relay channels with confidential messages
-
Jun
-
Y. Oohama, "Capacity theorems for relay channels with confidential messages, " in Proc. Int. Symp. Inf. Theory (ISIT), Jun. 2007, pp. 926-930.
-
(2007)
Proc. Int. Symp. Inf. Theory (ISIT)
, pp. 926-930
-
-
Oohama, Y.1
-
3
-
-
76649123145
-
Two-hop secure communication using an untrusted relay
-
Dec
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay, " EURASIP J. Wireless Commun. Netw., vol. 2009, p. 305146, Dec. 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw
, vol.2009
, pp. 305146
-
-
He, X.1
Yener, A.2
-
4
-
-
84873099749
-
End-To-end secure multi-hop communication with untrusted relays
-
Jan
-
X. He and A. Yener, "End-To-end secure multi-hop communication with untrusted relays, " IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 1-11, Jan. 2013.
-
(2013)
IEEE Trans. Wireless Commun
, vol.12
, Issue.1
, pp. 1-11
-
-
He, X.1
Yener, A.2
-
5
-
-
78650894311
-
Secrecy in cooperative relay broadcast channels
-
Jan
-
E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels, " IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 137-155, Jan. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.1
, pp. 137-155
-
-
Ekrem, E.1
Ulukus, S.2
-
6
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-And-forward MIMO untrusted relay system
-
Jan
-
C. Jeong, I.-M. Kim, and D. Kim, "Joint secure beamforming design at the source and the relay for an amplify-And-forward MIMO untrusted relay system, " IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.3
-
7
-
-
84871819283
-
Strong secrecy and reliable byzantine detection in the presence of an untrusted relay
-
Jan
-
X. He and A. Yener, "Strong secrecy and reliable byzantine detection in the presence of an untrusted relay, " IEEE Trans. Inf. Theory, vol. 59, no. 1, pp. 177-192, Jan. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.1
, pp. 177-192
-
-
He, X.1
Yener, A.2
-
8
-
-
84890393802
-
Lattice coding for strongly secure compute-And-forward in a bidirectional relay
-
V. Shashank and N. Kashyap, "Lattice coding for strongly secure compute-And-forward in a bidirectional relay, " in Proc. Int. Symp. Inf. Theory (ISIT), 2013, pp. 2775-2779.
-
(2013)
Proc. Int. Symp. Inf. Theory (ISIT
, pp. 2775-2779
-
-
Shashank, V.1
Kashyap, N.2
-
9
-
-
84938924365
-
Secure transmission using an untrusted relay with scaled compute-And-forward
-
Z. Ren, J. Goseling, J. H. Weber, and M. Gastpar, "Secure transmission using an untrusted relay with scaled compute-And-forward, " in Proc. Inf. Theory Workshop (ITW), 2015, pp. 1-5.
-
(2015)
Proc. Inf. Theory Workshop (ITW
, pp. 1-5
-
-
Ren, Z.1
Goseling, J.2
Weber, J.H.3
Gastpar, M.4
-
10
-
-
84929346934
-
The multiple access channel with an untrusted relay
-
A. A. Zewail and A. Yener, "The multiple access channel with an untrusted relay, " in Proc. Inf. Theory Workshop (ITW), 2014, pp. 25-29.
-
(2014)
Proc. Inf. Theory Workshop (ITW
, pp. 25-29
-
-
Zewail, A.A.1
Yener, A.2
-
11
-
-
84879973839
-
One-receiver two-eavesdropper broadcast channel with degraded message sets
-
Jul
-
S. Salehkalaibar, M. Mirmohseni, and M. R. Aref, "One-receiver two-eavesdropper broadcast channel with degraded message sets, " IEEE Trans. Inf. Forensics Security, vol. 8, no. 7, pp. 1162-1172, Jul. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.7
, pp. 1162-1172
-
-
Salehkalaibar, S.1
Mirmohseni, M.2
Aref, M.R.3
-
13
-
-
85027329503
-
Gaussian multiple access via compute-Andforward
-
J. Zhu and M. Gastpar, "Gaussian multiple access via compute-Andforward, " IEEE Trans. Inf. Theory, vol. 63, no. 5, pp. 2678-2695, 2017.
-
(2017)
IEEE Trans. Inf. Theory
, vol.63
, Issue.5
, pp. 2678-2695
-
-
Zhu, J.1
Gastpar, M.2
-
14
-
-
84946686335
-
Multi-Terminal networks with an untrusted relay
-
A. A. Zewail, M. Nafea, and A. Yener, "Multi-Terminal networks with an untrusted relay, " in Proc. 52nd Annu. Allerton Conf. Commun., Control Comput., 2014, pp. 895-902.
-
(2014)
Proc. 52nd Annu. Allerton Conf. Commun., Control Comput
, pp. 895-902
-
-
Zewail, A.A.1
Nafea, M.2
Yener, A.3
-
15
-
-
84962640362
-
The two-hop interference untrustedrelay channel with confidential messages
-
Oct
-
A. A. Zewail and A. Yener, "The two-hop interference untrustedrelay channel with confidential messages, " in Proc. Inf. Theory Workshop (ITW), Oct. 2015, pp. 322-326.
-
(2015)
Proc. Inf. Theory Workshop (ITW)
, pp. 322-326
-
-
Zewail, A.A.1
Yener, A.2
-
16
-
-
0016562514
-
The wire-Tap channel
-
A. D. Wyner, "The wire-Tap channel, " Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
17
-
-
0018523303
-
Capacity theorems for the relay channel
-
Sep
-
T. M. Cover and A. A. El Gamal, "Capacity theorems for the relay channel, " IEEE Trans. Inf. Theory, vol. 25, no. 5, pp. 572-584, Sep. 1979.
-
(1979)
IEEE Trans. Inf. Theory
, vol.25
, Issue.5
, pp. 572-584
-
-
Cover, T.M.1
El Gamal, A.A.2
-
18
-
-
45249101530
-
The general Gaussian multiple-Access and two-way wiretap channels: Achievable rates and cooperative jamming
-
Jun
-
E. Tekin and A. Yener, "The general Gaussian multiple-Access and two-way wiretap channels: Achievable rates and cooperative jamming, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
19
-
-
26444443782
-
Capacity theorems for the multiple-Access relay channel
-
L. Sankaranarayanan, G. Kramer, and N. B. Mandayam, "Capacity theorems for the multiple-Access relay channel, " in Proc. 42nd Annu. Allerton Conf. Commun., Control, Comput., 2004, pp. 1782-1791.
-
(2004)
Proc. 42nd Annu. Allerton Conf. Commun., Control, Comput
, pp. 1782-1791
-
-
Sankaranarayanan, L.1
Kramer, G.2
Mandayam, N.B.3
-
20
-
-
20344371477
-
Hierarchical sensor networks: Capacity bounds and cooperative strategies using the multiple-Access relay channel model
-
Oct
-
L. Sankaranarayanan, G. Kramer, and N. B. Mandayam, "Hierarchical sensor networks: Capacity bounds and cooperative strategies using the multiple-Access relay channel model, " in Proc. 1st Annu. IEEE Commun. Soc. Conf. Sens. Ad Hoc Commun. Netw. (SECON), Oct. 2004, pp. 191-199.
-
(2004)
Proc. 1st Annu IEEE Commun. Soc. Conf. Sens. Ad Hoc Commun. Netw. (SECON)
, pp. 191-199
-
-
Sankaranarayanan, L.1
Kramer, G.2
Mandayam, N.B.3
-
21
-
-
55349095058
-
The wiretap channel with feedback: Encryption over the channel
-
Nov
-
L. Lai, H. El Gamal, and H. V. Poor, "The wiretap channel with feedback: Encryption over the channel, " IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 5059-5067, Nov. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.11
, pp. 5059-5067
-
-
Lai, L.1
El Gamal, H.2
Poor, H.V.3
-
22
-
-
84896958699
-
Providing secrecy with structured codes: Twouser Gaussian channels
-
Apr
-
X. He and A. Yener, "Providing secrecy with structured codes: Twouser Gaussian channels, " IEEE Trans. Inf. Theory, vol. 60, no. 4, pp. 2121-2138, Apr. 2014.
-
(2014)
IEEE Trans. Inf. Theory
, vol.60
, Issue.4
, pp. 2121-2138
-
-
He, X.1
Yener, A.2
-
23
-
-
33947397919
-
Capacity with causal and noncausal side information: A unified view
-
Dec
-
S. Jafar, "Capacity with causal and noncausal side information: A unified view, " IEEE Trans. Inf. Theory, vol. 52, no. 12, pp. 5468-5474, Dec. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.12
, pp. 5468-5474
-
-
Jafar, S.1
|