On the Secrecy Capacity of Block Fading Channels With a Hybrid Adversary
暂无分享,去创建一个
Can Emre Koksal | Yuksel Ozan Basciftci | Füsun Özgüner | Onur Güngör | C. E. Koksal | F. Özgüner | Onur Güngör | Y. O. Basciftci
[1] Suhas N. Diggavi,et al. The worst additive noise under a covariance constraint , 2001, IEEE Trans. Inf. Theory.
[2] Xiangyun Zhou,et al. Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.
[3] Mohamed-Slim Alouini,et al. Ergodic Secret Message Capacity of the Wiretap Channel with Finite-Rate Feedback , 2012, IEEE Transactions on Wireless Communications.
[4] Imre Csiszár,et al. Capacity of the Gaussian arbitrarily varying channel , 1991, IEEE Trans. Inf. Theory.
[5] A. Lee Swindlehurst,et al. Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper , 2010, IEEE Transactions on Signal Processing.
[6] J. Nicholas Laneman,et al. Arbitrary jamming can preclude secure communication , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[7] H. Vincent Poor,et al. On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.
[8] Giuseppe Caire,et al. The throughput of hybrid-ARQ protocols for the Gaussian collision channel , 2001, IEEE Trans. Inf. Theory.
[9] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[10] Prakash Narayan,et al. Reliable Communication Under Channel Uncertainty , 1998, IEEE Trans. Inf. Theory.
[11] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[12] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[13] Reihaneh Safavi-Naini,et al. A Model for Adversarial Wiretap Channel , 2013, ArXiv.
[14] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[15] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[16] Can Emre Koksal,et al. To obtain or not to obtain CSI in the presence of hybrid adversary , 2013, 2013 IEEE International Symposium on Information Theory.
[17] Ashish Khisti,et al. Secret-Key Agreement Over Non-Coherent Block-Fading Channels With Public Discussion , 2016, IEEE Transactions on Information Theory.
[18] Holger Boche,et al. Capacity results and super-activation for wiretap channels with active wiretappers , 2013, IEEE Transactions on Information Forensics and Security.
[19] D. Blackwell,et al. The Capacities of Certain Channel Classes Under Random Coding , 1960 .
[20] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[21] Holger Boche,et al. Strong secrecy in arbitrarily varying wiretap channels , 2012, 2012 IEEE Information Theory Workshop.
[22] George T. Amariucai,et al. Half-Duplex Active Eavesdropping in Fast-Fading Channels: A Block-Markov Wyner Secrecy Encoding Scheme , 2012, IEEE Transactions on Information Theory.
[23] Ness B. Shroff,et al. Secrecy outage capacity of fading channels , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).
[24] Sheldon M. Ross,et al. Stochastic Processes , 2018, Gauge Integral Structures for Stochastic Calculus and Quantum Electrodynamics.