Secrecy in the two-way untrusted relay channel with compute-and-forward
暂无分享,去创建一个
[1] Wen Chen,et al. Compute-and-Forward Network Coding Design over Multi-Source Multi-Relay Channels , 2012, IEEE Transactions on Wireless Communications.
[2] Ender Tekin,et al. Correction to: "the Gaussian multiple access wire-tap channel" and "the general Gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming" , 2010, IEEE Trans. Inf. Theory.
[3] Eduard A. Jorswieck,et al. Physical layer security vs. network layer secrecy: Who wins on the untrusted two-way relay channel? , 2013, 2013 IEEE 18th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).
[4] Jean-Claude Belfiore. Lattice codes for the compute-and-forward protocol: The flatness factor , 2011, 2011 IEEE Information Theory Workshop.
[5] Eduard A. Jorswieck,et al. An efficient branch-and-bound algorithm for compute-and-forward , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).
[6] R. Zamir. Lattices are everywhere , 2009, 2009 Information Theory and Applications Workshop.
[7] Aylin Yener,et al. Providing Secrecy With Structured Codes: Two-User Gaussian Channels , 2014, IEEE Transactions on Information Theory.
[8] Cong Ling,et al. Achievable Rates for Lattice Coded Gaussian Wiretap Channels , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).
[9] Cong Ling,et al. Semantically Secure Lattice Codes for the Gaussian Wiretap Channel , 2012, IEEE Transactions on Information Theory.
[10] Michael Gastpar,et al. Reliable Physical Layer Network Coding , 2011, Proceedings of the IEEE.
[11] Michael Gastpar,et al. Compute-and-Forward: Harnessing Interference Through Structured Codes , 2009, IEEE Transactions on Information Theory.
[12] Soung Chang Liew,et al. Hot topic: physical-layer network coding , 2006, MobiCom '06.
[13] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[14] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[15] Cong Ling,et al. Lattice codes achieving strong secrecy over the mod-Λ Gaussian Channel , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[17] Aylin Yener,et al. Providing secrecy with lattice codes , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[18] Tobias J. Oechtering,et al. Broadcast Capacity Region of Two-Phase Bidirectional Relaying , 2007, IEEE Transactions on Information Theory.
[19] Aylin Yener,et al. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay , 2013, IEEE Transactions on Information Theory.
[20] Uri Erez,et al. Achieving 1/2 log (1+SNR) on the AWGN channel with lattice encoding and decoding , 2004, IEEE Transactions on Information Theory.
[21] Shashank Vatedka,et al. Secure Compute-and-Forward in a Bidirectional Relay , 2012, IEEE Transactions on Information Theory.
[22] Simon Litsyn,et al. Lattices which are good for (almost) everything , 2005, IEEE Transactions on Information Theory.
[23] Thomas C. Hales. Sphere packings, I , 1997, Discret. Comput. Geom..
[24] Frédérique E. Oggier,et al. Secrecy gain: A wiretap lattice code design , 2010, 2010 International Symposium On Information Theory & Its Applications.
[25] Alexandre J. Pierrot,et al. Strongly Secure Communications Over the Two-Way Wiretap Channel , 2010, IEEE Transactions on Information Forensics and Security.
[26] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[27] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[28] Jean-Claude Belfiore,et al. Lattice Codes for the Wiretap Gaussian Channel: Construction and Analysis , 2011, IEEE Transactions on Information Theory.