A Rateless Approach to Physical-Layer Security
暂无分享,去创建一个
[1] Andrew Thangaraj,et al. Error-Control Coding for Physical-Layer Secrecy , 2015, Proceedings of the IEEE.
[2] Matthieu R. Bloch,et al. Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.
[3] Steven W. McLaughlin,et al. Coding for Cryptographic Security Enhancement Using Stopping Sets , 2011, IEEE Transactions on Information Forensics and Security.
[4] Lajos Hanzo,et al. Reconfigurable Rateless Codes , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[5] Michael Luby,et al. LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[6] Lajos Hanzo,et al. Myths and realities of rateless coding , 2011, IEEE Communications Magazine.
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Luming Tan,et al. Future internet: The Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[9] Lajos Hanzo,et al. Low-Density Parity-Check Codes and Their Rateless Relatives , 2011, IEEE Communications Surveys & Tutorials.
[10] Alexander Vardy,et al. A Cryptographic Treatment of the Wiretap Channel , 2012, IACR Cryptol. ePrint Arch..
[11] Toshiaki Koike-Akino,et al. Secret Key Sharing and Rateless Coding for Practical Secure Wireless Transmission , 2011 .
[12] Cong Ling,et al. Semantically Secure Lattice Codes for the Gaussian Wiretap Channel , 2012, IEEE Transactions on Information Theory.
[13] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[14] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[15] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[16] Li Xiong. Harnessing personal data from Internet of Things: Privacy enhancing dynamic information monitoring , 2015, 2015 International Conference on Collaboration Technologies and Systems (CTS).
[17] G. Grimmett,et al. Probability and random processes , 2002 .
[18] Alberto Leon-Garcia,et al. Probability and Random Processes For EE's (3rd Edition) , 2007 .
[19] Alexander Vardy,et al. Semantic Security for the Wiretap Channel , 2012, CRYPTO.
[20] Onur Ozan Koyluoglu,et al. Polar coding for secure transmission and key agreement , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.
[21] Jonathan S. Yedidia,et al. Rateless codes on noisy channels , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[22] Alfred V. Aho,et al. The Design and Analysis of Computer Algorithms , 1974 .