From ordinary AWGN codes to optimal MIMO wiretap schemes
暂无分享,去创建一个
[1] H. Vincent Poor,et al. Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages , 2007, IEEE Transactions on Information Theory.
[2] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[3] Henry Herng-Jiunn Liao,et al. Multiple access channels (Ph.D. Thesis abstr.) , 1973, IEEE Trans. Inf. Theory.
[4] Ender Tekin,et al. The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.
[5] Frédérique E. Oggier,et al. Lattice Codes for the Wiretap Gaussian Channel: Construction and Analysis , 2016, IEEE Trans. Inf. Theory.
[6] Babak Hassibi,et al. An efficient square-root algorithm for BLAST , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).
[7] Rudolf Ahlswede,et al. Multi-way communication channels , 1973 .
[8] Yuval Kochman,et al. Decomposing the MIMO wiretap channel , 2014, 2014 IEEE International Symposium on Information Theory.
[9] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.
[10] François Baccelli,et al. Interference Networks With Point-to-Point Codes , 2011, IEEE Transactions on Information Theory.
[11] Alexander Vardy,et al. Semantic Security for the Wiretap Channel , 2012, CRYPTO.
[12] Alexander Vardy,et al. Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes , 2010, IEEE Transactions on Information Theory.
[13] G. Forney,et al. Generalized Decision-Feedback Equalization for Packet Transmission with ISI and Gaussian Noise , 1997 .
[14] Himanshu Tyagi,et al. Explicit capacity-achieving coding scheme for the Gaussian wiretap channel , 2014, 2014 IEEE International Symposium on Information Theory.
[15] Matsumoto Ryutaroh,et al. Construction of wiretap codes from ordinary channel codes , 2010 .
[16] Byung-Jae Kwak,et al. LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.
[17] Mattias Andersson,et al. Coding for the Wiretap Channel , 2011 .
[18] Gregory W. Wornell,et al. Rateless Coding for Gaussian Channels , 2007, IEEE Transactions on Information Theory.
[19] Yuval Kochman,et al. Joint Unitary Triangularization for MIMO Networks , 2012, IEEE Transactions on Signal Processing.
[20] Reinaldo A. Valenzuela,et al. V-BLAST: an architecture for realizing very high data rates over the rich-scattering wireless channel , 1998, 1998 URSI International Symposium on Signals, Systems, and Electronics. Conference Proceedings (Cat. No.98EX167).
[21] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[22] Rüdiger L. Urbanke,et al. A rate-splitting approach to the Gaussian multiple-access channel , 1996, IEEE Trans. Inf. Theory.
[23] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[24] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[25] Uri Erez,et al. On the Robustness of Lattice Interference Alignment , 2013, IEEE Transactions on Information Theory.