Ergodic Secret Message Capacity of the Wiretap Channel with Finite-Rate Feedback
暂无分享,去创建一个
[1] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[2] Ueli Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[3] Wei Shi,et al. Robust beamforming for MISO wiretap channel by optimizing the worst-case secrecy capacity , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.
[4] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[5] A. Lee Swindlehurst,et al. Ensuring Secrecy in MIMO Wiretap Channels with Imperfect CSIT: A Beamforming Approach , 2010, 2010 IEEE International Conference on Communications.
[6] Zhi Ding,et al. Linear Precoding for Finite-Alphabet Signaling Over MIMOME Wiretap Channels , 2012, IEEE Transactions on Vehicular Technology.
[7] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[8] Pravin Varaiya,et al. Capacity of fading channels with channel side information , 1997, IEEE Trans. Inf. Theory.
[9] Nihar Jindal. MIMO broadcast channels with finite rate feedback , 2005, GLOBECOM.
[10] Chong-Yung Chi,et al. On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise: The Noise Leakage Problem , 2011, IEEE Trans. Wirel. Commun..
[11] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[12] Mohamed-Slim Alouini,et al. On the ergodic secrecy capacity of the wiretap channel under imperfect main channel estimation , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[13] Mikael Skoglund,et al. On the Expected Rate of Slowly Fading Channels with Quantized Side Information , 2005, ASILOMAR 2005.
[14] Shuai Ma,et al. Outage Constrained Robust Secure Transmission for MISO Wiretap Channels , 2013, IEEE Transactions on Wireless Communications.
[15] Mohamed-Slim Alouini,et al. Ergodic Secret Message Capacity of the Wiretap Channel with Finite-Rate Feedback , 2014 .
[16] G. Caire,et al. On the capacity of some channels with channel state information , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[17] Robert W. Heath,et al. An overview of limited feedback in wireless communication systems , 2008, IEEE Journal on Selected Areas in Communications.
[18] J. Nicholas Laneman,et al. Information-spectrum methods for information-theoretic security , 2009, 2009 Information Theory and Applications Workshop.
[19] Suhas N. Diggavi,et al. Creating shared secrets out of thin air , 2012, HotNets-XI.
[20] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[21] Yi Hong,et al. Wiretap channel with finite-rate feedback , 2015, 2015 22nd International Conference on Telecommunications (ICT).
[22] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[23] Sergio Verdú,et al. Spectral efficiency in the wideband regime , 2002, IEEE Trans. Inf. Theory.
[24] Hamid Sharif,et al. Impact of channel estimation errors on effectiveness of Eigenvector-based jamming for physical layer security in wireless networks , 2011, 2011 IEEE 16th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).
[25] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[26] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[27] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[28] Russell Davidson,et al. Testing for Restricted Stochastic Dominance: Some Further Results , 2009, Review of Economic Analysis.
[29] Moustafa Youssef,et al. Keys Through ARQ: Theory and Practice , 2011, IEEE Transactions on Information Forensics and Security.
[30] Anders Forsgren,et al. Interior Methods for Nonlinear Optimization , 2002, SIAM Rev..
[31] Eduard A. Jorswieck,et al. Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.
[32] Xiangyun Zhou,et al. Two-Way Training for Discriminatory Channel Estimation in Wireless MIMO Systems , 2011, IEEE Transactions on Signal Processing.
[33] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[34] Mohamed-Slim Alouini,et al. A Threshold-Based Channel State Feedback Algorithm for Modern Cellular Systems , 2007, IEEE Transactions on Wireless Communications.
[35] Matthieu R. Bloch,et al. Exploiting Partial Channel State Information for Secrecy over Wireless Channels , 2013, IEEE Journal on Selected Areas in Communications.
[36] Athina P. Petropulu,et al. Explicit Solution of Worst-Case Secrecy Rate for MISO Wiretap Channels With Spherical Uncertainty , 2011, IEEE Transactions on Signal Processing.
[37] Thomas M. Cover,et al. Elements of information theory (2. ed.) , 2006 .
[38] Rohit U. Nabar,et al. Introduction to Space-Time Wireless Communications , 2003 .