The two-hop interference untrusted-relay channel with confidential messages
暂无分享,去创建一个
[1] Navin Kashyap,et al. Lattice coding for strongly secure compute-and-forward in a bidirectional relay , 2013, ISIT.
[2] Syed Ali Jafar. Capacity With Causal and Noncausal Side Information: A Unified View , 2006, IEEE Transactions on Information Theory.
[3] H. Vincent Poor,et al. The Wiretap Channel With Feedback: Encryption Over the Channel , 2007, IEEE Transactions on Information Theory.
[4] Michael Gastpar,et al. Secure transmission using an untrusted relay with scaled compute-and-forward , 2015, 2015 IEEE Information Theory Workshop (ITW).
[5] Sennur Ulukus,et al. Secrecy in Cooperative Relay Broadcast Channels , 2008, IEEE Transactions on Information Theory.
[6] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[7] Michael Gastpar,et al. Multiple Access via Compute-and-Forward , 2014, ArXiv.
[8] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[9] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[10] Aylin Yener,et al. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay , 2013, IEEE Transactions on Information Theory.
[11] Yasutada Oohama,et al. Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).
[12] Michael Gastpar,et al. Asymmetric Compute-and-Forward with CSIT , 2014, ArXiv.
[13] Aylin Yener,et al. Providing Secrecy With Structured Codes: Two-User Gaussian Channels , 2014, IEEE Transactions on Information Theory.
[14] Aylin Yener,et al. The multiple access channel with an untrusted relay , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).
[15] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[16] Aylin Yener,et al. End-to-End Secure Multi-Hop Communication with Untrusted Relays , 2008, IEEE Transactions on Wireless Communications.
[17] Aylin Yener,et al. Multi-terminal networks with an untrusted relay , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).