-
1
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
3
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
4
-
-
77958560746
-
Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel
-
Nov
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
5
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Aug
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
6
-
-
66949180834
-
A note on the secrecy capacity of the multiple-antenna wiretap channel
-
Jun
-
T. Liu and S. Shamai (Shitz), "A note on the secrecy capacity of the multiple-antenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
7
-
-
69249208566
-
An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel
-
Jul
-
R. Bustin, R. Liu, H. V. Poor, and S. Shamai (Shitz), "An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel," EURASIP J. Wireless Commun. Netw. Special Issue Wireless Phys. Secur., vol. 2009, no. 1, p. 370970, Jul. 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw. Special Issue Wireless Phys. Secur.
, vol.2009
, Issue.1
, pp. 370970
-
-
Bustin, R.1
Liu, R.2
Poor, H.V.3
Shamai, S.4
-
8
-
-
84933558349
-
An algorithm for global maximization of secrecy rates in Gaussian MIMO wiretap channels
-
Jun
-
S. Loyka and C. D. Charalambous, "An algorithm for global maximization of secrecy rates in Gaussian MIMO wiretap channels," IEEE Trans. Commun., vol. 63, no. 6, pp. 2288-2299, Jun. 2015.
-
(2015)
IEEE Trans. Commun.
, vol.63
, Issue.6
, pp. 2288-2299
-
-
Loyka, S.1
Charalambous, C.D.2
-
9
-
-
85000444128
-
Optimal signaling for secure communications over Gaussian MIMO wiretap channels
-
Dec
-
S. Loyka and C. D. Charalambous, "Optimal signaling for secure communications over Gaussian mimo wiretap channels," IEEE Trans. Inf. Theory, vol. 62, no. 12, pp. 7207-7215, Dec. 2016.
-
(2016)
IEEE Trans. Inf. Theory
, vol.62
, Issue.12
, pp. 7207-7215
-
-
Loyka, S.1
Charalambous, C.D.2
-
10
-
-
33748578624
-
The capacity region of the Gaussian multiple-input multiple-output broadcast channel
-
Sep
-
H.Weingarten, Y. Steinberg, and S. Shamai (Shitz), "The capacity region of the Gaussian multiple-input multiple-output broadcast channel," IEEE Trans. Inf. Theory, vol. 52, no. 9, pp. 3936-3964, Sep. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.9
, pp. 3936-3964
-
-
Weingarten, H.1
Steinberg, Y.2
Shamai, S.3
-
11
-
-
62749109096
-
Secrecy capacity region of a multiple-antenna Gaussian broadcast channel with confidential messages
-
Mar
-
R. Liu and H. V. Poor, "Secrecy capacity region of a multiple-antenna Gaussian broadcast channel with confidential messages," IEEE Trans. Inf. Theory, vol. 55, no. 3, pp. 1235-1249, Mar. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.3
, pp. 1235-1249
-
-
Liu, R.1
Poor, H.V.2
-
12
-
-
77955721830
-
Multiple-input multiple-output Gaussian broadcast channels with confidential messages
-
Sep
-
R. Liu, T. Liu, H. V. Poor, and S. Shamai (Shitz), "Multiple-input multiple-output Gaussian broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4215-4227, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.9
, pp. 4215-4227
-
-
Liu, R.1
Liu, T.2
Poor, H.V.3
Shamai, S.4
-
13
-
-
84906539585
-
Explicit capacity-achieving coding scheme for the Gaussian wiretap channel
-
Honolulu, HI, USA, Jun./Jul
-
H. Tyagi and A. Vardy, "Explicit capacity-achieving coding scheme for the Gaussian wiretap channel," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Honolulu, HI, USA, Jun./Jul. 2014, pp. 956-960.
-
(2014)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 956-960
-
-
Tyagi, H.1
Vardy, A.2
-
14
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
Aug
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J.-M. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
15
-
-
80051720839
-
LDPC codes for the Gaussian wiretap channel
-
Sep
-
D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, and B.-J. Kwak, "LDPC codes for the Gaussian wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 532-540, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 532-540
-
-
Klinc, D.1
Ha, J.2
McLaughlin, S.W.3
Barros, J.4
Kwak, B.-J.5
-
16
-
-
84988596663
-
Lattice codes for the wiretap Gaussian channel: Construction and analysis
-
Oct
-
F. Oggier, P. Solë, and J.-C. Belfiore, "Lattice codes for the wiretap Gaussian channel: Construction and analysis," IEEE Trans. Inf. Theory, vol. 62, no. 10, pp. 5690-5708, Oct. 2016.
-
(2016)
IEEE Trans. Inf. Theory
, vol.62
, Issue.10
, pp. 5690-5708
-
-
Oggier, F.1
Solë, P.2
Belfiore, J.-C.3
-
17
-
-
80053941690
-
Achieving the secrecy capacity of wiretap channels using polar codes
-
Oct
-
H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6428-6443, Oct. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.10
, pp. 6428-6443
-
-
Mahdavifar, H.1
Vardy, A.2
-
18
-
-
84900512107
-
-
Ph.D. dissertation, School Elect. Eng. (EES), Royal Inst. Technol. (KTH), Stockholm, Sweden
-
M. Andersson, "Coding for the wiretap channel," Ph.D. dissertation, School Elect. Eng. (EES), Royal Inst. Technol. (KTH), Stockholm, Sweden, 2011.
-
(2011)
Coding for the Wiretap Channel
-
-
Andersson, M.1
-
19
-
-
84906535802
-
Polar lattices for strong secrecy over the mod Gaussian wiretap channel
-
Honolulu, HI, USA, Jun./Jul
-
Y. Yan, L. Liu, and C. Ling, "Polar lattices for strong secrecy over the mod-? Gaussian wiretap channel," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Honolulu, HI, USA, Jun./Jul. 2014, pp. 961-965.
-
(2014)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 961-965
-
-
Yan, Y.1
Liu, L.2
Ling, C.3
-
20
-
-
84555191907
-
Joint unitary triangularization for MIMO networks
-
Jan
-
A. Khina, Y. Kochman, and U. Erez, "Joint unitary triangularization for MIMO networks," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 326-336, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.1
, pp. 326-336
-
-
Khina, A.1
Kochman, Y.2
Erez, U.3
-
21
-
-
0004083131
-
Capacity of multi-antenna Gaussian channels
-
Nov
-
I. E. Telatar, "Capacity of multi-antenna Gaussian channels," Eur. Trans. Telecommun., vol. 10, no. 6, pp. 585-595, Nov. 1999.
-
(1999)
Eur. Trans. Telecommun.
, vol.10
, Issue.6
, pp. 585-595
-
-
Telatar, I.E.1
-
22
-
-
0030234863
-
Layered space-time architecture for wireless communication in a fading environment when using multi-element antennas
-
G. J. Foschini, "Layered space-time architecture for wireless communication in a fading environment when using multi-element antennas," Bell Labs Tech. J., vol. 1, no. 2, pp. 41-59, 1996.
-
(1996)
Bell Labs Tech. J.
, vol.1
, Issue.2
, pp. 41-59
-
-
Foschini, G.J.1
-
23
-
-
0032217929
-
V-BLAST: An architecture for realizing very high data rates over the rich-scattering wireless channel
-
Sep./Oct
-
P. W. Wolniansky, G. J. Foschini, G. D. Golden, and R. A. Valenzuela, "V-BLAST: An architecture for realizing very high data rates over the rich-scattering wireless channel," in Proc. URSI Int. Symp. Sig., Syst., Elect. (ISSSE), Sep./Oct. 1998, pp. 295-300.
-
(1998)
Proc. URSI Int. Symp. Sig., Syst., Elect. (ISSSE)
, pp. 295-300
-
-
Wolniansky, P.W.1
Foschini, G.J.2
Golden, G.D.3
Valenzuela, R.A.4
-
24
-
-
0002415892
-
Generalized decision-feedback equalization for packet transmission with ISI and Gaussian noise
-
Springer
-
J. M. Cioffi and G. D. Forney, Jr., "Generalized decision-feedback equalization for packet transmission with ISI and Gaussian noise," in Communications, Computation, Control, and Signal Processing. Springer, 1997, pp. 79-127.
-
(1997)
Communications, Computation, Control, and Signal Processing.
, pp. 79-127
-
-
Cioffi, J.M.1
Forney, G.D.2
-
25
-
-
0033708873
-
An efficient square-root algorithm for BLAST
-
Istanbul, Turkey, Jun
-
B. Hassibi, "An efficient square-root algorithm for BLAST," in Proc. IEEE Int. Conf. Acoust. Speech Sig. Proc. (ICASSP), vol. 2. Istanbul, Turkey, Jun. 2000, pp. 737-740.
-
(2000)
Proc. IEEE Int. Conf. Acoust. Speech Sig. Proc. (ICASSP)
, vol.2
, pp. 737-740
-
-
Hassibi, B.1
-
26
-
-
0020752342
-
Writing on dirty paper
-
May
-
M. H. M. Costa, "Writing on dirty paper," IEEE Trans. Inf. Theory, vol. 29, no. 3, pp. 439-441, May 1983.
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.3
, pp. 439-441
-
-
Costa, M.H.M.1
-
27
-
-
84928533143
-
Joint unitary triangularization for Gaussian multi-user MIMO networks
-
May
-
A. Khina, I. Livni, A. Hitron, and U. Erez, "Joint unitary triangularization for Gaussian multi-user MIMO networks," IEEE Trans. Inf. Theory, vol. 61, no. 5, pp. 2662-2692, May 2015.
-
(2015)
IEEE Trans. Inf. Theory
, vol.61
, Issue.5
, pp. 2662-2692
-
-
Khina, A.1
Livni, I.2
Hitron, A.3
Erez, U.4
-
28
-
-
38849178360
-
MIMO transceiver design via majorization theory
-
Nov
-
D. P. Palomar and Y. Jiang, "MIMO transceiver design via majorization theory," Found. Trends Commun. Inf. Theory, vol. 3, nos. 4-5, pp. 331-551, Nov. 2006.
-
(2006)
Found. Trends Commun. Inf. Theory
, vol.3
, Issue.4-5
, pp. 331-551
-
-
Palomar, D.P.1
Jiang, Y.2
-
29
-
-
0004236492
-
-
3rd ed. Baltimore, MD, USA: The Johns Hopkins Univ. Press
-
G. H. Golub and C. F. Van Loan, Matrix Computations, 3rd ed. Baltimore, MD, USA: The Johns Hopkins Univ. Press, 1996.
-
(1996)
Matrix Computations
-
-
Golub, G.H.1
Van Loan, C.F.2
-
30
-
-
0000142609
-
Inequalities between two kinds of eigenvalues of a linear transformation
-
May
-
H. Weyl, "Inequalities between two kinds of eigenvalues of a linear transformation," Proc. Nat. Acad. Sci. USA, vol. 35, no. 7, pp. 408-411, May 1949.
-
(1949)
Proc. Nat. Acad. Sci. USA
, vol.35
, Issue.7
, pp. 408-411
-
-
Weyl, H.1
-
31
-
-
0012031757
-
On constructing unit triangular matrices with prescribed singular values
-
May
-
P. Kosowski and A. Smoktunowicz, "On constructing unit triangular matrices with prescribed singular values," Computing, vol. 64, no. 3, pp. 279-285, May 2000.
-
(2000)
Computing
, vol.64
, Issue.3
, pp. 279-285
-
-
Kosowski, P.1
Smoktunowicz, A.2
-
32
-
-
42349101336
-
The generalized triangular decompostion
-
Oct
-
Y. Jiang, W. W. Hager, and J. Li, "The generalized triangular decompostion," Math. Comput., vol. 77, no. 262, pp. 1037-1056, Oct. 2008.
-
(2008)
Math. Comput.
, vol.77
, Issue.262
, pp. 1037-1056
-
-
Jiang, Y.1
Hager, W.W.2
Li, J.3
-
33
-
-
51849127674
-
-
Dept. Elect. Comp. Eng., McMaster Univ., Hamilton, ON, Canada, Tech. Rep. [Online]. Available
-
J.-K. Zhang and K. M. Wong, "Fast QRS decomposition of matrix and its applications to numerical optimization," Dept. Elect. Comp. Eng., McMaster Univ., Hamilton, ON, Canada, Tech. Rep. [Online]. Available: http://www.ece.mcmaster.ca/~jkzhang/papers/sam-qrs.pdf
-
Fast QRS Decomposition of Matrix and its Applications to Numerical Optimization
-
-
Zhang, J.-K.1
Wong, K.M.2
-
34
-
-
33746374167
-
On the eigenvalues of a matrix with prescribed singular values
-
Feb
-
A. Horn, "On the eigenvalues of a matrix with prescribed singular values," in Proc. Amer. Math. Soc., vol. 5, no. 1, pp. 4-7, Feb. 1954.
-
(1954)
Proc. Amer. Math. Soc.
, vol.5
, Issue.1
, pp. 4-7
-
-
Horn, A.1
-
35
-
-
12444260781
-
Equal-diagonal QR decomposition and its application to precoder design for successivecancellation detection
-
Jan
-
J.-K. Zhang, A. Kavcíc, and K. M. Wong, "Equal-diagonal QR decomposition and its application to precoder design for successivecancellation detection," IEEE Trans. Inf. Theory, vol. 51, no. 1, pp. 154-172, Jan. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.1
, pp. 154-172
-
-
Zhang, J.-K.1
Kavcíc, A.2
Wong, K.M.3
-
36
-
-
11144291018
-
The geometric mean decomposition
-
Feb
-
Y. Jiang, W. W. Hager, and J. Li, "The geometric mean decomposition," Lin. Algebra Appl., vol. 396, pp. 373-384, Feb. 2005.
-
(2005)
Lin. Algebra Appl.
, vol.396
, pp. 373-384
-
-
Jiang, Y.1
Hager, W.W.2
Li, J.3
-
37
-
-
0016926423
-
Generalizing the singular value decomposition
-
Mar
-
C. F. Van Loan, "Generalizing the singular value decomposition," SIAM J. Numer., vol. 13, no. 1, pp. 76-83, Mar. 1976.
-
(1976)
SIAM J. Numer.
, vol.13
, Issue.1
, pp. 76-83
-
-
Van Loan, C.F.1
-
38
-
-
0042121944
-
-
Univ. Minnesota, Minneapolis, MN, USA, Tech. Rep., Apr
-
Z. Bai, "The CSD, GSVD, their applications and computations," Univ. Minnesota, Minneapolis, MN, USA, Tech. Rep., Apr. 1992.
-
(1992)
The CSD, GSVD, their Applications and Computations
-
-
Bai, Z.1
-
39
-
-
0001129014
-
Towards a generalized singular value decomposition
-
Jun
-
C. C. Paige and M. A. Saunders, "Towards a generalized singular value decomposition," SIAM J. Numer. Anal., vol. 18, no. 3, pp. 398-405, Jun. 1981.
-
(1981)
SIAM J. Numer. Anal.
, vol.18
, Issue.3
, pp. 398-405
-
-
Paige, C.C.1
Saunders, M.A.2
-
40
-
-
0029391812
-
MMSE decision-feedback equalizers and coding. I. Equalization results
-
Oct
-
J. M. Cioffi, G. P. Dudevoir, M. V. Eyuboglu, and G. D. Forney, Jr., "MMSE decision-feedback equalizers and coding. I. Equalization results," IEEE Trans. Commun., vol. 43, no. 10, pp. 2582-2594, Oct. 1995.
-
(1995)
IEEE Trans. Commun.
, vol.43
, Issue.10
, pp. 2582-2594
-
-
Cioffi, J.M.1
Dudevoir, G.P.2
Eyuboglu, M.V.3
Forney, G.D.4
-
41
-
-
27744577109
-
Uniform channel decomposition for MIMO communications
-
Nov
-
Y. Jiang, J. Li, and W. M. Hager, "Uniform channel decomposition for MIMO communications," IEEE Trans. Signals Process., vol. 53, no. 11, pp. 4283-4294, Nov. 2005.
-
(2005)
IEEE Trans. Signals Process.
, vol.53
, Issue.11
, pp. 4283-4294
-
-
Jiang, Y.1
Li, J.2
Hager, W.M.3
-
42
-
-
2942653060
-
Lattice coding and decoding achieve the optimal diversity-multiplexing tradeoff of MIMO channels
-
Jun
-
H. El Gamal, G. Caire, and M. O. Damen, "Lattice coding and decoding achieve the optimal diversity-multiplexing tradeoff of MIMO channels," IEEE Trans. Inf. Theory, vol. 50, no. 6, pp. 968-985, Jun. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.6
, pp. 968-985
-
-
El Gamal, H.1
Caire, G.2
Damen, M.O.3
-
43
-
-
84889587094
-
Strong secrecy from channel resolvability
-
Dec
-
M. R. Bloch and J. N. Laneman, "Strong secrecy from channel resolvability," IEEE Trans. Inf. Theory, vol. 59, no. 12, pp. 8077-8098, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.12
, pp. 8077-8098
-
-
Bloch, M.R.1
Laneman, J.N.2
-
45
-
-
0034443459
-
A multi-user precoding scheme achieving crosstalk cancellation with application to DSL systems
-
Pacific Grove, CA, USA, Oct./Nov
-
J. M. Cioffi and G. Ginis, "A multi-user precoding scheme achieving crosstalk cancellation with application to DSL systems," in Proc. Asilomar Conf. Sig., Syst. Comput., vol. 2. Pacific Grove, CA, USA, Oct./Nov. 2000, pp. 1627-1631.
-
(2000)
Proc. Asilomar Conf. Sig., Syst. Comput.
, vol.2
, pp. 1627-1631
-
-
Cioffi, J.M.1
Ginis, G.2
-
46
-
-
0038105207
-
On the achievable throughput of a multiantenna Gaussian broadcast channel
-
Jul
-
G. Caire and S. Shamai (Shitz), "On the achievable throughput of a multiantenna Gaussian broadcast channel," IEEE Trans. Inf. Theory, vol. 49, no. 7, pp. 1649-1706, Jul. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.7
, pp. 1649-1706
-
-
Caire, G.1
Shamai, S.2
-
47
-
-
33646073724
-
An achievable region for the Gaussian wiretap channel with side information
-
May
-
C. Mitrpant, A. J. H. Vinck, and Y. Luo, "An achievable region for the Gaussian wiretap channel with side information," IEEE Trans. Inf. Theory, vol. 52, no. 5, pp. 2181-2190, May 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.5
, pp. 2181-2190
-
-
Mitrpant, C.1
Vinck, A.J.H.2
Luo, Y.3
-
48
-
-
38349115043
-
Wiretap channel with side information
-
Jan
-
Y. Chen and A. J. H. Vinck, "Wiretap channel with side information," IEEE Trans. Inf. Theory, vol. 54, no. 1, pp. 395-402, Jan. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.1
, pp. 395-402
-
-
Chen, Y.1
Vinck, A.J.H.2
-
49
-
-
84865478919
-
Semantic security for the wiretap channel
-
Berlin, Germany: Springer
-
M. Bellare, S. Tessaro, and A. Vardy, "Semantic security for the wiretap channel," in Advances in Cryptology (Lecture Notes in Computer Science), R. Safavi-Naini and R. Canetti, Eds., vol. 7417. Berlin, Germany: Springer, 2012, pp. 294-311.
-
(2012)
Advances in Cryptology (Lecture Notes in Computer Science), R. Safavi-Naini and R. Canetti, Eds.
, vol.7417
, pp. 294-311
-
-
Bellare, M.1
Tessaro, S.2
Vardy, A.3
-
50
-
-
77955671723
-
Construction of wiretap codes from ordinary channel codes
-
Austin, TX, USA, Jun
-
M. Hayashi and R. Matsumoto, "Construction of wiretap codes from ordinary channel codes," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Austin, TX, USA, Jun. 2010, pp. 2538-2542.
-
(2010)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 2538-2542
-
-
Hayashi, M.1
Matsumoto, R.2
-
51
-
-
84929324824
-
From ordinary AWGN codes to optimal MIMO wiretap schemes
-
Hobart, TAS, Australia, Oct./Nov
-
A. Khina, Y. Kochman, and A. Khisti, "From ordinary AWGN codes to optimal MIMO wiretap schemes," in Proc. IEEE Inf. Theory Workshop (ITW), Hobart, TAS, Australia, Oct./Nov. 2014, pp. 632-636.
-
(2014)
Proc. IEEE Inf. Theory Workshop (ITW)
, pp. 632-636
-
-
Khina, A.1
Kochman, Y.2
Khisti, A.3
-
52
-
-
79955509473
-
Interference networks with point-to-point codes
-
May
-
F. Baccelli, A. El Gamal, and D. N. C. Tse, "Interference networks with point-to-point codes," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 2582-2596, May 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.5
, pp. 2582-2596
-
-
Baccelli, F.1
El Gamal, A.2
Tse, D.N.C.3
-
53
-
-
84876767902
-
On the robustness of lattice interference alignment
-
May
-
O. Ordentlich and U. Erez, "On the robustness of lattice interference alignment," IEEE Trans. Inf. Theory, vol. 59, no. 5, pp. 2735-2759, May 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.5
, pp. 2735-2759
-
-
Ordentlich, O.1
Erez, U.2
-
54
-
-
70349230836
-
Derivatives of generalized eigen systems with applications
-
Los Angeles, CA, USA, Tech. Rep., Dec
-
J. de Leeuw, "Derivatives of generalized eigen systems with applications," Dept. Statist., UCLA, Los Angeles, CA, USA, Tech. Rep., Dec. 2007.
-
(2007)
Dept. Statist., UCLA
-
-
De Leeuw, J.1
-
56
-
-
84860234449
-
Three-receiver broadcast channels with common and confidential messages
-
May
-
Y.-K. Chia and A. El Gamal, "Three-receiver broadcast channels with common and confidential messages," IEEE Trans. Inf. Theory, vol. 58, no. 5, pp. 2748-2765, May 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.5
, pp. 2748-2765
-
-
Chia, Y.-K.1
El Gamal, A.2
|