Secure degrees of freedom of the Gaussian wiretap channel with helpers
暂无分享,去创建一个
[1] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[2] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[3] Aylin Yener,et al. Providing Secrecy With Structured Codes: Tools and Applications to Two-User Gaussian Channels , 2009, ArXiv.
[4] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[5] Sennur Ulukus,et al. Secrecy in Cooperative Relay Broadcast Channels , 2008, IEEE Transactions on Information Theory.
[6] Roy D. Yates,et al. Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.
[7] Amir K. Khandani,et al. Real Interference Alignment with Real Numbers , 2009, ArXiv.
[8] Raef Bassily,et al. Ergodic Secret Alignment , 2010, IEEE Transactions on Information Theory.
[9] Elza Erkip,et al. The Relay Channel with a Wire-tapper , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[10] Sennur Ulukus,et al. Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper , 2009, EURASIP J. Wirel. Commun. Netw..
[11] Aylin Yener,et al. K-user interference channels: Achievable secrecy rate and degrees of freedom , 2009, 2009 IEEE Information Theory Workshop on Networking and Information Theory.
[12] Shlomo Shamai,et al. Compound Wiretap Channels , 2009, EURASIP J. Wirel. Commun. Netw..
[13] Jianwei Xie,et al. On the sum secure degrees of freedom of two-unicast layered wireless networks , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[14] Syed Ali Jafar,et al. On the secure degrees of freedom of wireless X networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[15] Andrew Thangaraj,et al. Confidential messages to a cooperative relay , 2008, 2008 IEEE Information Theory Workshop.
[16] Ender Tekin,et al. The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.
[17] Aylin Yener,et al. A new outer bound for the gaussian interference channel with confidential messages , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.
[18] Xiang He,et al. Cooperation and information theoretic security in wireless networks. , 2011 .
[19] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[20] Yasutada Oohama,et al. Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).
[21] Amir K. Khandani,et al. Real Interference Alignment: Exploiting the Potential of Single Antenna Systems , 2009, IEEE Transactions on Information Theory.
[22] H. Vincent Poor,et al. The Gaussian wiretap channel with a helping interferer , 2008, 2008 IEEE International Symposium on Information Theory.
[23] H. Vincent Poor,et al. Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.
[24] Sennur Ulukus,et al. Cooperative Secrecy in Wireless Communications , 2009 .
[25] Ruoheng Liu,et al. Securing Wireless Communications at the Physical Layer , 2014 .
[26] Onur Ozan Koyluoglu,et al. Cooperative Encoding for Secrecy in Interference Channels , 2011, IEEE Transactions on Information Theory.
[27] Amir K. Khandani,et al. On the Secure Degrees-of-Freedom of the Multiple-Access-Channel , 2010, ArXiv.
[28] Gregory W. Wornell,et al. Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.
[29] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[30] Ashish Khisti,et al. Interference Alignment for the Multiantenna Compound Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[31] Sennur Ulukus,et al. Secure broadcasting using multiple antennas , 2010, Journal of Communications and Networks.
[32] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[33] S. Ulukus,et al. On the secrecy of multiple access wiretap channel , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[34] Onur Ozan Koyluoglu,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Transactions on Information Theory.
[35] Sennur Ulukus,et al. Degraded Compound Multi-Receiver Wiretap Channels , 2009, IEEE Transactions on Information Theory.
[36] Aylin Yener,et al. Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[37] Jin Xu,et al. Capacity Bounds for Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.
[38] H. Vincent Poor,et al. Interference Alignment for Secrecy , 2008, IEEE Transactions on Information Theory.
[39] A.K. Khandani,et al. Secure broadcasting : The secrecy rate region , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[40] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[41] Ashish Khisti,et al. Artificial-Noise Alignment for Secure Multicast using Multiple Antennas , 2012, IEEE Communications Letters.
[42] Jianwei Xie,et al. Real interference alignment for the K-user Gaussian interference compound wiretap channel , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[43] Yasutada Oohama. Relay Channels with Confidential Messages , 2006, ArXiv.