A zero-sum power allocation game in the parallel Gaussian wiretap channel with an unfriendly jammer
暂无分享,去创建一个
[1] Robert J. McEliece,et al. Communication in the Presence of Jamming-An Information-Theoretic Approach , 1983 .
[2] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[3] Samuel Karlin,et al. Mathematical Methods and Theory in Games, Programming, and Economics , 1961 .
[4] A. Lee Swindlehurst,et al. Equilibrium Outcomes of Dynamic Games in MIMO Channels with Active Eavesdroppers , 2010, 2010 IEEE International Conference on Communications.
[5] Matthew S. Grob,et al. CDMA/HDR: a bandwidth-efficient high-speed wireless data service for nomadic users , 2000, IEEE Commun. Mag..
[6] Alan R. Washburn,et al. Two-Person Zero-Sum Games , 2003 .
[7] Matthieu R. Bloch,et al. Friendly Jamming for Wireless Secrecy , 2010, 2010 IEEE International Conference on Communications.
[8] Elza Erkip,et al. A secure communication game with a relay helping the eavesdropper , 2009 .
[9] Roy D. Yates,et al. Secrecy capacity of independent parallel channels , 2009 .
[10] Antonia Maria Tulino,et al. Multiple-antenna capacity in the low-power regime , 2003, IEEE Trans. Inf. Theory.
[11] Elza Erkip,et al. A Secure Communication Game With a Relay Helping the Eavesdropper , 2009, IEEE Transactions on Information Forensics and Security.
[12] Samuel Karlin,et al. Mathematical Methods and Theory in Games, Programming, and Economics , 1961 .
[13] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[14] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[15] Sennur Ulukus,et al. Mutual Information Games in Multi-user Channels with Correlated Jamming , 2006, ArXiv.
[16] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[17] David Tse,et al. Shannon Meets Nash on the Interference Channel , 2010, IEEE Transactions on Information Theory.
[18] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[19] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..