Secure transmission using an untrusted relay with scaled compute-and-forward
暂无分享,去创建一个
[1] Uri Erez,et al. Achieving 1/2 log (1+SNR) on the AWGN channel with lattice encoding and decoding , 2004, IEEE Transactions on Information Theory.
[2] Michael Gastpar,et al. Compute-and-Forward: Harnessing Interference Through Structured Codes , 2009, IEEE Transactions on Information Theory.
[3] Michael Gastpar,et al. Multiple Access via Compute-and-Forward , 2014, ArXiv.
[4] Aylin Yener,et al. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay , 2013, IEEE Transactions on Information Theory.
[5] Michael Gastpar,et al. Asymmetric Compute-and-Forward with CSIT , 2014, ArXiv.
[6] Abbas El Gamal,et al. Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).
[7] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[8] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[9] Aylin Yener,et al. End-to-End Secure Multi-Hop Communication with Untrusted Relays , 2008, IEEE Transactions on Wireless Communications.
[10] Thomas M. Cover,et al. Network Information Theory , 2001 .
[11] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.