-
1
-
-
0032164539
-
Cryptographic design vulnerabilities
-
B. Schneier, "Cryptographic design vulnerabilities," Computer, vol. 31, no. 9, pp. 29-33, Sept. 1998. (Pubitemid 128551914)
-
(1998)
Computer
, vol.31
, Issue.9
, pp. 29-33
-
-
Schneier, B.1
-
2
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszàr and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inform. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszàr, I.1
Körner, J.2
-
4
-
-
77953802876
-
Secure transmission with multiple antennas-I: The MISOME wiretap channel
-
July
-
A. Khisti and G. Wornell, "Secure transmission with multiple antennas-I: The MISOME wiretap channel," IEEE Trans. Inform. Theory, vol. 56, no. 7, pp. 3088-3104, July 2010.
-
(2010)
IEEE Trans. Inform. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.2
-
5
-
-
77958560746
-
Secure transmission with multiple antennas-II: The MIMOME wiretap channel
-
Nov.
-
A. Khisti and G. Wornell, "Secure transmission with multiple antennas-II: The MIMOME wiretap channel," IEEE Trans. Inform. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inform. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.2
-
6
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Aug.
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inform. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
-
(2011)
IEEE Trans. Inform. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
7
-
-
45249104850
-
Wireless information-theoretic security
-
June
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. M. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inform. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.M.4
-
8
-
-
69249208566
-
An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel
-
July
-
R. Bustin, R. Liu, H. V. Poor, and S. Shamai (Shitz), "An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel," EURASIP J. Wireless Commun. Netw., July 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw
-
-
Bustin, R.1
Liu, R.2
Poor, H.V.3
Shamai, S.4
-
9
-
-
79960433598
-
Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming
-
Aug.
-
Q. Li and W.-K. Ma, "Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming," IEEE Trans. Signal Processing, vol. 59, no. 8, pp. 3799-3812, Aug. 2011.
-
(2011)
IEEE Trans. Signal Processing
, vol.59
, Issue.8
, pp. 3799-3812
-
-
Li, Q.1
Ma, W.-K.2
-
10
-
-
80052144374
-
Multicast secrecy rate maximization for MISO channels with multiple multiantenna eavesdroppers
-
Q. Li and W.-K. Ma, "Multicast secrecy rate maximization for MISO channels with multiple multiantenna eavesdroppers," in Proc. IEEE Int. Conf. Communications (ICC), 2011, pp. 1-5.
-
(2011)
Proc. IEEE Int. Conf. Communications (ICC)
, pp. 1-5
-
-
Li, Q.1
Ma, W.-K.2
-
11
-
-
84857366311
-
Physical layer security in mul-tibeam satellite systems
-
Feb.
-
G. Zheng, P.-D. Arapoglou, and B. Ottersten, "Physical layer security in mul-tibeam satellite systems," IEEE Trans. Wireless Commun., vol. 11, no. 2, pp. 852-863, Feb. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.2
, pp. 852-863
-
-
Zheng, G.1
Arapoglou, P.-D.2
Ottersten, B.3
-
12
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
June
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
13
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. Petropulu, and H. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Processing, vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Processing
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.3
Poor, H.4
-
14
-
-
84863359764
-
Robust secure transmission in MISO channels based on worst-case optimization
-
Apr.
-
J. Huang and A. Swindlehurst, "Robust secure transmission in MISO channels based on worst-case optimization," IEEE Trans. Signal Processing, vol. 60, no. 4, pp. 1696-1707, Apr. 2012.
-
(2012)
IEEE Trans. Signal Processing
, vol.60
, Issue.4
, pp. 1696-1707
-
-
Huang, J.1
Swindlehurst, A.2
-
15
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Aug.
-
X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inform. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
-
(2010)
IEEE Trans. Inform. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
16
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
-
Jan.
-
C. Jeong, I.-M. Kim, and D. I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Processing, vol. 60, no. 1, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Processing
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.I.3
-
17
-
-
78649287920
-
Training sequence design for discriminatory channel estimation in wireless MIMO systems
-
Dec.
-
T.-H. Chang, W.-C. Chiang, Y.-W. P. Hong, and C.-Y. Chi, "Training sequence design for discriminatory channel estimation in wireless MIMO systems," IEEE Trans. Signal Processing, vol. 58, no. 12, pp. 6223-6237, Dec. 2010.
-
(2010)
IEEE Trans. Signal Processing
, vol.58
, Issue.12
, pp. 6223-6237
-
-
Chang, T.-H.1
Chiang, W.-C.2
Hong, Y.-W.P.3
Chi, C.-Y.4
-
18
-
-
84883175353
-
Two-way training for discriminatory channel estimation in wireless MIMO systems
-
May
-
C.-W. Huang, T.-H. Chang, X. Zhou, and Y.-W. P. Hong, "Two-way training for discriminatory channel estimation in wireless MIMO systems," IEEE Trans. Signal Processing, vol. 61, no. 10, pp. 2724-2738, May 2013.
-
(2013)
IEEE Trans. Signal Processing
, vol.61
, Issue.10
, pp. 2724-2738
-
-
Huang, C.-W.1
Chang, T.-H.2
Zhou, X.3
Hong, Y.-W.P.4
-
19
-
-
45249119255
-
Secure communication over fading channels
-
June
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Trans. Inform. Theory, vol. 54, no. 6, pp. 2470-2492, June 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
20
-
-
79951595646
-
QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach
-
Mar.
-
W.-C. Liao, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach," IEEE Trans. Signal Processing, vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
-
(2011)
IEEE Trans. Signal Processing
, vol.59
, Issue.3
, pp. 1202-1216
-
-
Liao, W.-C.1
Chang, T.-H.2
Ma, W.-K.3
Chi, C.-Y.4
-
21
-
-
73449104694
-
Compound wiretap channels
-
Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), "Compound wiretap channels," EURASIP J. Wireless Commun. Netw., 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw.
-
-
Liang, Y.1
Kramer, G.2
Poor, H.V.3
Shamai, S.4
-
22
-
-
0004236492
-
-
3rd ed. Baltimore, MD: The Johns Hopkins Univ. Press
-
G. Golub and C. F. V. Loan, Matrix Computations, 3rd ed. Baltimore, MD: The Johns Hopkins Univ. Press, 1996.
-
(1996)
Matrix Computations
-
-
Golub, G.1
Loan, C.F.V.2
-
23
-
-
84870563576
-
Secrecy sum-rates for multi-user MIMO regularized channel inversion precoding
-
Nov.
-
G. Geraci, M. Egan, J. Yuan, A. Razi, and I. B. Collings, "Secrecy sum-rates for multi-user MIMO regularized channel inversion precoding," IEEE Trans. Commun., vol. 60, no. 11, pp. 3472-3482, Nov. 2012.
-
(2012)
IEEE Trans. Commun.
, vol.60
, Issue.11
, pp. 3472-3482
-
-
Geraci, G.1
Egan, M.2
Yuan, J.3
Razi, A.4
Collings, I.B.5
-
24
-
-
77949575243
-
Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels
-
Sept.
-
A. Mukherjee and A. L. Swindlehurst, "Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels," in Proc. 47th Annu. Allerton Conf. Communication, Control, and Computing, Sept. 2009, pp. 1134-1141.
-
(2009)
Proc. 47th Annu. Allerton Conf. Communication, Control, and Computing
, pp. 1134-1141
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
25
-
-
77958083375
-
Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
-
Oct.
-
X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.8
, pp. 3831-3842
-
-
Zhou, X.1
McKay, M.R.2
-
26
-
-
79952985755
-
On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem
-
Mar.
-
S.-C. Lin, T.-H. Chang, Y.-L. Liang, Y.-W. P. Hong, and C.-Y. Chi, "On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem," IEEE Trans. Wireless Commun., vol. 10, no. 3, pp. 901-915, Mar. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.3
, pp. 901-915
-
-
Lin, S.-C.1
Chang, T.-H.2
Liang, Y.-L.3
Hong, Y.-W.P.4
Chi, C.-Y.5
-
27
-
-
84858390705
-
Secrecy outage in MISO systems with partial channel information
-
A pr.
-
S. Gerbracht, C. Scheunert, and E. A. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Trans. Inform. Forensics Sec., vol. 7, no. 2, pp. 704-716, A pr. 2012.
-
(2012)
IEEE Trans. Inform. Forensics Sec.
, vol.7
, Issue.2
, pp. 704-716
-
-
Gerbracht, S.1
Scheunert, C.2
Jorswieck, E.A.3
-
28
-
-
85032752079
-
Convex optimization-based beamforming
-
May
-
A. B. Gershman, N. D. Sidiropoulos, S. Shahbazpanahi, M. Bengtsson, and B. Ottersten, "Convex optimization-based beamforming," IEEE Signal Processing Mag., vol. 27, no. 3, pp. 62-75, May 2010.
-
(2010)
IEEE Signal Processing Mag.
, vol.27
, Issue.3
, pp. 62-75
-
-
Gershman, A.B.1
Sidiropoulos, N.D.2
Shahbazpanahi, S.3
Bengtsson, M.4
Ottersten, B.5
-
29
-
-
84864605556
-
A survey on cooperative diversity for wireless networks
-
F. Gomez-Cuba, R. Asorey-Cacheda, and F. J. Gonzalez-Castano, "A survey on cooperative diversity for wireless networks," IEEE Commun. Surveys Tuts., vol. 14, no. 3, pp. 822-835, 2012.
-
(2012)
IEEE Commun. Surveys Tuts.
, vol.14
, Issue.3
, pp. 822-835
-
-
Gomez-Cuba, F.1
Asorey-Cacheda, R.2
Gonzalez-Castano, F.J.3
-
32
-
-
84870499401
-
A general relaying transmission protocol for MIMO secrecy communications
-
Nov.
-
Z. Ding, M. Peng, and H.-H. Chen, "A general relaying transmission protocol for MIMO secrecy communications," IEEE Trans. Commun., vol. 60, no. 11, pp. 3461-3471, Nov. 2012.
-
(2012)
IEEE Trans. Commun.
, vol.60
, Issue.11
, pp. 3461-3471
-
-
Ding, Z.1
Peng, M.2
Chen, H.-H.3
-
33
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Processing, vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Processing
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
34
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Oct.
-
J. Li, A. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Processing, vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
-
(2011)
IEEE Trans. Signal Processing
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.2
Weber, S.3
-
35
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar.
-
G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Processing, vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Processing
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wong, K.-K.3
-
36
-
-
84862817856
-
Pilot contamination for active eavesdropping
-
X. Zhou, B. Maham, and A. Hjorungnes, "Pilot contamination for active eavesdropping," IEEE Trans. Wireless Commun., vol. 11, no. 3, pp. 903-907, 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.3
, pp. 903-907
-
-
Zhou, X.1
Maham, B.2
Hjorungnes, A.3
|