LDPC-based coded cooperative jamming codes
暂无分享,去创建一个
[1] Xiang He,et al. On the role of feedback in two-way secure communication , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.
[2] Alexandre J. Pierrot,et al. Strongly Secure Communications Over the Two-Way Wiretap Channel , 2010, IEEE Transactions on Information Forensics and Security.
[3] Kenta Kasai,et al. Spatially coupled codes over the multiple access channel , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[4] Rüdiger L. Urbanke,et al. Modern Coding Theory , 2008 .
[5] Mikael Skoglund,et al. Rate-equivocation optimal spatially coupled LDPC codes for the BEC wiretap channel , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[6] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[7] Moustafa Youssef,et al. The Two-Way Wiretap Channel: Achievable Regions and Experimental Results , 2011 .
[8] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[9] Kamil Sh. Zigangirov,et al. Time-varying periodic convolutional codes with low-density parity-check matrix , 1999, IEEE Trans. Inf. Theory.
[10] John M. Shea,et al. LDPC code design for the BPSK-constrained Gaussian wiretap channel , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).
[11] Andrew Thangaraj,et al. Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes , 2010, IEEE Transactions on Information Forensics and Security.
[12] Mikael Skoglund,et al. Equivocation of eve using two edge type LDPC codes for the binary erasure wiretap channel , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.
[13] Rüdiger L. Urbanke,et al. Threshold Saturation via Spatial Coupling: Why Convolutional LDPC Ensembles Perform So Well over the BEC , 2010, IEEE Transactions on Information Theory.
[14] Byung-Jae Kwak,et al. LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.
[15] Alexander Vardy,et al. Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes , 2010, IEEE Transactions on Information Theory.
[16] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .