Secure transmission scheme for parallel relay channels based on polar coding
暂无分享,去创建一个
Zesong Fei | Dai Jia | Ce Sun | Xinyi Wang | Congzhe Cao
[1] Sriram Vishwanath,et al. Achieving secrecy without any instantaneous CSI: polar coding for fading wiretap channels , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[2] Jianhua Lu,et al. CodeHop: physical layer error correction and encryption with LDPC-based code hopping , 2016, Science China Information Sciences.
[3] Erdal Arikan,et al. Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.
[4] Jinhong Yuan,et al. Low complexity list successive cancellation decoding of polar codes , 2014, IET Commun..
[5] Young-Sik Kim,et al. A Secure Information Transmission Scheme With a Secret Key Based on Polar Coding , 2014, IEEE Communications Letters.
[6] Jianhua Lu,et al. Hamming Distortion Based Secrecy Systems: To Foil the Eavesdropper With Finite Shared Key , 2015, IEEE Communications Letters.
[7] Kai Chen,et al. Practical polar code construction over parallel channels , 2013, IET Commun..
[8] Sriram Vishwanath,et al. Hierarchical Polar Coding for Achieving Secrecy Over State-Dependent Wiretap Channels Without Any Instantaneous CSI , 2016, IEEE Transactions on Communications.
[9] Luc Vandendorpe,et al. Secure Communication Over Parallel Relay Channel , 2010, IEEE Transactions on Information Forensics and Security.
[10] Helmut Bölcskei,et al. Fading relay channels: performance limits and space-time signal design , 2004, IEEE Journal on Selected Areas in Communications.
[11] Alexander Vardy,et al. A new polar coding scheme for strong security on wiretap channels , 2013, 2013 IEEE International Symposium on Information Theory.
[12] Alexander Vardy,et al. Fast List Decoders for Polar Codes , 2015, IEEE Journal on Selected Areas in Communications.
[13] Kai Chen,et al. Polar codes: Primary concepts and practical decoding algorithms , 2014, IEEE Communications Magazine.
[14] Il-Min Kim,et al. Cooperative jamming polar codes for multiple-access wiretap channels , 2016, IET Commun..
[15] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[16] Mohammad Reza Aref,et al. Secret key cryptosystem based on polar codes over Binary Erasure Channel , 2013, 2013 10th International ISC Conference on Information Security and Cryptology (ISCISC).
[17] Onur Ozan Koyluoglu,et al. Polar coding for secure transmission and key agreement , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.
[18] Mohammad Reza Aref,et al. Physical layer encryption scheme using finite-length polar codes , 2015, IET Commun..
[19] Toshiyuki Tanaka,et al. Performance of polar codes with the construction using density evolution , 2009, IEEE Communications Letters.
[20] A. Robert Calderbank,et al. Secrecy Capacity of a Class of Orthogonal Relay Eavesdropper Channels , 2009, 2009 Information Theory and Applications Workshop.
[21] Zhen Yang,et al. Secure transmission over the wiretap channel using polar codes and artificial noise , 2017, IET Commun..
[22] Sennur Ulukus,et al. Polar coding for the general wiretap channel , 2014, 2015 IEEE Information Theory Workshop (ITW).
[23] Frank R. Kschischang,et al. A Simplified Successive-Cancellation Decoder for Polar Codes , 2011, IEEE Communications Letters.