Wireless physical-layer security: The challenges ahead
暂无分享,去创建一个
[1] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[2] Sennur Ulukus,et al. Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.
[3] A. Robert Calderbank,et al. Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.
[4] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[5] Shlomo Shamai,et al. Secured Communication over Frequency-Selective Fading Channels: A Practical Vandermonde Precoding , 2009, EURASIP J. Wirel. Commun. Netw..
[6] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[7] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[8] Kai-Kit Wong,et al. Three-receiver broadcast channel with confidential messages , 2008 .
[9] Shlomo Shamai,et al. An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009, 2009 IEEE International Symposium on Information Theory.
[10] Roy D. Yates,et al. Secrecy capacity of independent parallel channels , 2009 .
[11] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[12] Amitabh Mishra. Security and Quality of Service in Ad Hoc Wireless Networks , 2008 .
[13] Akbar M. Sayeed,et al. Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[14] Amir K. Khandani,et al. Secrecy capacity region of Gaussian broadcast channel , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.
[15] Richard E. Blahut,et al. Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[16] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[17] Roy D. Yates,et al. Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.
[18] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[19] Ami Wiesel,et al. On the Gaussian MIMO Wiretap Channel , 2007, 2007 IEEE International Symposium on Information Theory.
[20] Amir K. Khandani,et al. The Secrecy Rate Region of the Broadcast Channel , 2008, ArXiv.
[21] Gregory W. Wornell,et al. Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.
[22] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[23] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[24] Sennur Ulukus,et al. Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper , 2009, EURASIP J. Wirel. Commun. Netw..
[25] Shlomo Shamai,et al. MIMO Gaussian broadcast channels with confidential messages , 2009, 2009 IEEE International Symposium on Information Theory.
[26] Zixiang Xiong,et al. Compression of binary sources with side information at the decoder using LDPC codes , 2002, IEEE Communications Letters.
[27] David Tse,et al. Channel Identification: Secret Sharing using Reciprocity in Ultrawideband Channels , 2007 .
[28] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[29] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[30] M. Debbah,et al. Mobile Flexible Networks: The challenges ahead , 2008, 2008 International Conference on Advanced Technologies for Communications.
[31] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.
[32] H. Vincent Poor,et al. Nested codes for secure transmission , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.
[33] Gregory W. Wornell,et al. The MIMOME Channel , 2007, ArXiv.
[34] Sennur Ulukus,et al. The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel , 2009, IEEE Transactions on Information Theory.
[35] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[36] Yingbin Liang,et al. MIMO broadcasting with common, private and confidential messages , 2008, 2008 International Symposium on Information Theory and Its Applications.
[37] David Tse,et al. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.
[38] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[39] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[40] R. A. McDonald,et al. Noiseless Coding of Correlated Information Sources , 1973 .
[41] Xiaodai Dong,et al. Secure Key Generation and Agreement in UWB Communication , 2009 .
[42] Vinod M. Prabhakaran,et al. The secrecy capacity of a class of parallel Gaussian compound wiretap channels , 2008, 2008 IEEE International Symposium on Information Theory.
[43] Renato Renner,et al. New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction , 2003, EUROCRYPT.