The Gaussian multiple access wiretap channel when the eavesdropper can arbitrarily jam
暂无分享,去创建一个
[1] Sennur Ulukus,et al. Achievable secrecy rates in the multiple access wiretap channel with deviating users , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[2] Moritz Wiese,et al. A Channel Under Simultaneous Jamming and Eavesdropping Attack—Correlated Random Coding Capacities Under Strong Secrecy Criteria , 2014, IEEE Transactions on Information Theory.
[3] Philip A. Whiting,et al. Rate-splitting multiple access for discrete memoryless channels , 2001, IEEE Trans. Inf. Theory.
[4] Moritz Wiese,et al. The Arbitrarily Varying Wiretap Channel - Secret Randomness, Stability, and Super-Activation , 2016, IEEE Trans. Inf. Theory.
[5] Imre Csiszár,et al. Capacity of the Gaussian arbitrarily varying channel , 1991, IEEE Trans. Inf. Theory.
[6] J. Nicholas Laneman,et al. Arbitrary jamming can preclude secure communication , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[7] Amin Gohari,et al. Achievability Proof via Output Statistics of Random Binning , 2014, IEEE Trans. Inf. Theory.
[8] George T. Amariucai,et al. Half-Duplex Active Eavesdropping in Fast-Fading Channels: A Block-Markov Wyner Secrecy Encoding Scheme , 2012, IEEE Transactions on Information Theory.
[9] Ender Tekin,et al. The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.
[10] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[11] Holger Boche,et al. Capacity Results for Arbitrarily Varying Wiretap Channels , 2012, Information Theory, Combinatorics, and Search Theory.
[12] A. Lee Swindlehurst,et al. Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper , 2010, IEEE Transactions on Signal Processing.
[13] Holger Boche,et al. Capacity results and super-activation for wiretap channels with active wiretappers , 2013, IEEE Transactions on Information Forensics and Security.
[14] S. Ulukus,et al. On the secrecy of multiple access wiretap channel , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[15] Remi A. Chou,et al. Polar coding for the multiple access wiretap channel via rate-splitting and cooperative jamming , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[16] Aylin Yener,et al. MIMO Wiretap Channels With Unknown and Varying Eavesdropper Channel States , 2014, IEEE Transactions on Information Theory.
[17] Can Emre Koksal,et al. On the Secrecy Capacity of Block Fading Channels With a Hybrid Adversary , 2013, IEEE Transactions on Information Theory.
[18] Himanshu Tyagi,et al. Explicit capacity-achieving coding scheme for the Gaussian wiretap channel , 2014, 2014 IEEE International Symposium on Information Theory.
[19] Matthieu R. Bloch,et al. Strong Secrecy From Channel Resolvability , 2011, IEEE Transactions on Information Theory.
[20] Haim H. Permuter,et al. Arbitrarily Varying Wiretap Channels with Type Constrained States , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).
[21] Richard J. La,et al. DIMACS Series in Discrete Mathematics and Theoretical Computer Science A Game-theoretic Look at the Gaussian Multiaccess Channel , 2022 .