On Gaussian wiretap channels with M-PAM inputs
暂无分享,去创建一个
[1] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[2] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[3] Antonia Maria Tulino,et al. Optimum power allocation for parallel Gaussian channels with arbitrary input distributions , 2006, IEEE Transactions on Information Theory.
[5] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[6] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[7] Marten van Dijk. On a special class of broadcast channels with confidential messages , 1997, IEEE Trans. Inf. Theory.
[8] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[9] Shlomo Shamai,et al. Estimation of non-Gaussian random variables in Gaussian noise: Properties of the MMSE , 2008, 2008 IEEE International Symposium on Information Theory.
[10] H. Vincent Poor,et al. Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.
[11] Antonia Maria Tulino,et al. Optimum Power Allocation for Multiuser OFDM with Arbitrary Signal Constellations , 2008, IEEE Transactions on Communications.
[12] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[13] Shlomo Shamai,et al. Mutual information and minimum mean-square error in Gaussian channels , 2004, IEEE Transactions on Information Theory.
[14] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[15] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.
[16] Shlomo Shamai,et al. Estimation in Gaussian Noise: Properties of the Minimum Mean-Square Error , 2010, IEEE Transactions on Information Theory.
[17] Daniel Pérez Palomar,et al. Gradient of mutual information in linear vector Gaussian channels , 2005, ISIT.
[18] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[19] John E. Dennis,et al. Numerical methods for unconstrained optimization and nonlinear equations , 1983, Prentice Hall series in computational mathematics.