On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries
暂无分享,去创建一个
Rajarathnam Chandramouli | K. P. Subbalakshmi | Chetan Nanjunda Mathur | M. A. Haleem | Mohamed A. Haleem | C. N. Mathur | K.P. Subbalakshmi | R. Chandramouli
[1] Thomas M. Cover,et al. Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing) , 2006 .
[2] Shlomo Shamai,et al. Information theoretic considerations for cellular mobile radio , 1994 .
[3] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[4] Mohsen Guizani,et al. Optimal stream-based cipher feedback mode in error channel , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[5] Clifford Stein,et al. Introduction to Algorithms, 2nd edition. , 2001 .
[6] R. K. Shyamasundar,et al. Introduction to algorithms , 1996 .
[7] Ronald L. Rivest,et al. Introduction to Algorithms, Second Edition , 2001 .
[8] Seymour Stein,et al. Fading Channel Issues in System Engineering , 1987, IEEE J. Sel. Areas Commun..
[9] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[10] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[11] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[12] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[13] Rajarathnam Chandramouli,et al. Battery power optimized encryption , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).