Secure network coding for wireless routing
暂无分享,去创建一个
[1] Robert G. Gallager,et al. Basic limits on protocol information in data communication networks , 1976, IEEE Trans. Inf. Theory.
[2] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[3] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[4] Jon Feldman,et al. On the Capacity of Secure Network Coding , 2004 .
[5] H. Vincent Poor,et al. Channel Coding Rate in the Finite Blocklength Regime , 2010, IEEE Transactions on Information Theory.
[6] Anthony Ephremides,et al. On the throughput, capacity, and stability regions of random multiple access , 2005, IEEE Transactions on Information Theory.
[7] H. Vincent Poor,et al. Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.
[8] Rudolf Ahlswede,et al. Multi-way communication channels , 1973 .
[10] Abbas El Gamal,et al. Capacity theorems for the relay channel , 1979, IEEE Trans. Inf. Theory.
[11] Tracey Ho,et al. Byzantine Modification Detection in Multicast Networks With Random Network Coding , 2008, IEEE Transactions on Information Theory.
[12] Liang Chen. Wireless network coding with physical-layer security , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[13] Anthony Ephremides,et al. Information Theory and Communication Networks: An Unconsummated Union , 1998, IEEE Trans. Inf. Theory.
[14] R. Gallager,et al. The Gaussian parallel relay network , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).
[15] Ender Tekin,et al. Correction to: "the Gaussian multiple access wire-tap channel" and "the general Gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming" , 2010, IEEE Trans. Inf. Theory.
[16] Ning Cai,et al. Secure Network Coding on a Wiretap Network , 2011, IEEE Transactions on Information Theory.
[17] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[18] Tracey Ho,et al. Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[19] Roy D. Yates,et al. Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.
[20] Yasutada Oohama,et al. Capacity Theorems for Relay Channels with Confidential Messages , 2007, 2007 IEEE International Symposium on Information Theory.
[21] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[22] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[23] Kamal Jain. Security based on network topology against the wiretapping attack , 2004, IEEE Wireless Communications.
[25] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[26] Dimitri P. Bertsekas,et al. Data Networks , 1986 .
[27] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[28] Sennur Ulukus,et al. Secrecy in Cooperative Relay Broadcast Channels , 2011, IEEE Trans. Inf. Theory.
[29] R. Yeung,et al. Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.
[30] Emina Soljanin,et al. On Wiretap Networks II , 2007, 2007 IEEE International Symposium on Information Theory.
[31] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[32] Amir K. Khandani,et al. Secrecy capacity region of Gaussian broadcast channel , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.