暂无分享,去创建一个
George K. Karagiannidis | Vasileios M. Kapinas | Alexandros-Apostolos A. Boulogeorgos | Dimitrios S. Karas | Sotirios K. Mihos | G. Karagiannidis
[1] Xiaoming Chen,et al. Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF? , 2015, IEEE Transactions on Wireless Communications.
[2] Shengmei Zhao,et al. A concatenation scheme of Polar codes and space-time block codes in multiple-input multiple-output channels , 2013, 2013 6th International Congress on Image and Signal Processing (CISP).
[3] Tobias J. Oechtering,et al. Polar Coding for Bidirectional Broadcast Channels with Common and Confidential Messages , 2013, IEEE Journal on Selected Areas in Communications.
[4] Young-Sik Kim,et al. A Secure Information Transmission Scheme With a Secret Key Based on Polar Coding , 2014, IEEE Communications Letters.
[5] Andrew Thangaraj,et al. Robustness of Physical Layer Security Primitives Against Attacks on Pseudorandom Generators , 2014, IEEE Transactions on Communications.
[6] Fredrik Rusek,et al. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.
[7] C.-C. Jay Kuo,et al. Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.
[8] U. Maurer. The Strong Secret Key Rate of Discrete Random Triples , 1994 .
[9] Matthieu R. Bloch,et al. Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.
[10] Emre Telatar,et al. On the rate of channel polarization , 2008, 2009 IEEE International Symposium on Information Theory.
[11] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[12] Walid Saad,et al. On the Physical Layer Security of Backscatter Wireless Systems , 2014, IEEE Transactions on Wireless Communications.
[13] Liang Zhang,et al. On the polar codes for MIMO , 2013, 2013 International Conference on Wireless Communications and Signal Processing.
[14] Iain B. Collings,et al. Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.
[15] Mikael Skoglund,et al. Nested Polar Codes for Wiretap and Relay Channels , 2010, IEEE Communications Letters.
[16] M. Lavanya,et al. Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection with outdated CSI , 2017 .
[17] Erdal Arikan,et al. Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.
[18] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[19] H. Luetkepohl. The Handbook of Matrices , 1996 .
[20] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[21] Alexander Vardy,et al. Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes , 2010, IEEE Transactions on Information Theory.
[22] Jeffrey G. Andrews,et al. Secure Wireless Network Connectivity with Multi-Antenna Transmission , 2011, IEEE Transactions on Wireless Communications.
[23] Mounir Ghogho,et al. Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.
[24] Sennur Ulukus,et al. Polar coding for the general wiretap channel , 2014, 2015 IEEE Information Theory Workshop (ITW).
[25] Meixia Tao,et al. Polar Coding for Secure Transmission in MISO Fading Wiretap Channels , 2014, ArXiv.
[26] W. W. Peterson,et al. Cyclic Codes for Error Detection , 1961, Proceedings of the IRE.
[27] W. W. PETERSONt,et al. Cyclic Codes for Error Detection * , 2022 .
[28] Rüdiger L. Urbanke,et al. Polar Codes for Channel and Source Coding , 2009, ArXiv.
[29] Ueli Maurer,et al. Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.
[30] Trung Quang Duong,et al. Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection With Outdated CSI , 2015, IEEE Transactions on Communications.
[31] Manuel Blum,et al. A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..
[32] Alexander Vardy,et al. Achieving the secrecy capacity of wiretap channels using Polar codes , 2010, ISIT.
[33] Yongming Huang,et al. Energy-Efficient Precoder Design for MIMO Wiretap Channels , 2014, IEEE Communications Letters.
[34] Vincent Rijmen,et al. ECRYPT yearly report on algorithms and keysizes , 2009 .
[35] Kai Chen,et al. Space-Time Polar Coded Modulation , 2013, ArXiv.
[36] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.