Secure Communications with Limited Common Randomness at Transmitters
暂无分享,去创建一个
[1] Aylin Yener,et al. Secure degrees of freedom for the MIMO wiretap channel with a multiantenna cooperative jammer , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).
[2] Jinyuan Chen. New results on the secure capacity of symmetric two-user interference channels , 2016, 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[3] Fan Li,et al. Adding a Helper Can Totally Remove the Secrecy Constraints in a Two-User Interference Channel , 2019, IEEE Transactions on Information Forensics and Security.
[4] Roy D. Yates,et al. Secret communication on interference channels , 2008, 2008 IEEE International Symposium on Information Theory.
[5] Chandra R. Murthy,et al. Outer bounds on the secrecy rate of the 2-user symmetric deterministic interference channel with transmitter cooperation , 2014, 2014 Twentieth National Conference on Communications (NCC).
[6] Aylin Yener,et al. Interference channels with strong secrecy , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[7] H. Vincent Poor,et al. Fading Cognitive Multiple-Access Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.
[8] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[9] Aylin Yener,et al. MIMO multiple access channel with an arbitrarily varying eavesdropper , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[10] Pritam Mukherjee,et al. Secure Degrees of Freedom of One-Hop Wireless Networks With No Eavesdropper CSIT , 2014, IEEE Transactions on Information Theory.
[11] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[12] Aylin Yener,et al. Degrees of freedom of the single antenna gaussian wiretap channel with a helper irrespective of the number of antennas at the eavesdropper , 2013, 2013 IEEE Global Conference on Signal and Information Processing.
[13] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[14] Jinyuan Chen. Secure Communication over Interference Channel: To Jam or Not to Jam? , 2018, 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[15] Shlomo Shamai,et al. Capacity of Cognitive Interference Channels With and Without Secrecy , 2009, IEEE Transactions on Information Theory.
[16] Suhas Diggavi,et al. On noise insertion strategies for wireless network secrecy , 2009, 2009 Information Theory and Applications Workshop.
[17] Syed Ali Jafar,et al. On the Optimality of Treating Interference as Noise , 2015, IEEE Transactions on Information Theory.
[18] Ming Xiao,et al. Strong Secrecy for Interference Channels Based on Channel Resolvability , 2018, IEEE Transactions on Information Theory.
[19] Roy D. Yates,et al. Secrecy capacity region of a class of one-sided interference channel , 2008, 2008 IEEE International Symposium on Information Theory.
[20] Aylin Yener,et al. A new outer bound for the gaussian interference channel with confidential messages , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.
[21] Fan Li,et al. How to Break the Limits of Secrecy Constraints in Communication Networks? , 2019, 2019 IEEE International Symposium on Information Theory (ISIT).
[22] Ashish Khisti,et al. The Wiretapped Diamond-Relay Channel , 2016, IEEE Transactions on Information Theory.
[23] H. Vincent Poor,et al. Interference Alignment for Secrecy , 2008, IEEE Transactions on Information Theory.
[24] Fan Li,et al. Adding Common Randomness Can Remove the Secrecy Constraints in Communication Networks , 2019, ArXiv.
[25] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[26] Chandra R. Murthy,et al. On the Capacity of the Two-User Symmetric Interference Channel With Transmitter Cooperation and Secrecy Constraints , 2016, IEEE Transactions on Information Theory.
[27] Syed Ali Jafar,et al. Secure GDoF of $K$-User Gaussian Interference Channels: When Secrecy Incurs No Penalty , 2015, IEEE Communications Letters.
[28] Jin Xu,et al. Capacity Bounds for Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.
[29] Syed Ali Jafar,et al. On the Symmetric 2-User Deterministic Interference Channel with Confidential Messages , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[30] Roy D. Yates,et al. Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.
[31] H. Vincent Poor,et al. Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.
[32] Amir K. Khandani,et al. On the Secure Degrees-of-Freedom of the Multiple-Access-Channel , 2010, ArXiv.
[33] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[34] Gregory W. Wornell,et al. Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.
[35] Amir K. Khandani,et al. The Secrecy Capacity Region of the Gaussian MIMO Broadcast Channel , 2009, IEEE Transactions on Information Theory.
[36] Sanjay Karmakar,et al. Approximate secrecy capacity region of an asymmetric MAC wiretap channel within 1/2 bits , 2015, 2015 IEEE 14th Canadian Workshop on Information Theory (CWIT).
[37] Shlomo Shamai,et al. Multiple-Input Multiple-Output Gaussian Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.
[38] Abbas El Gamal,et al. Three-Receiver Broadcast Channels With Common and Confidential Messages , 2012, IEEE Transactions on Information Theory.
[39] Gerhard Wunder,et al. On Multiuser Gain and the Constant-Gap Sum Capacity of the Gaussian Interfering Multiple Access Channel , 2017, ArXiv.
[40] Aylin Yener,et al. The Gaussian Many-to-One Interference Channel With Confidential Messages , 2009, IEEE Transactions on Information Theory.
[41] Chunhua Geng,et al. Optimal Secure GDoF of Symmetric Gaussian Wiretap Channel with a Helper , 2019, 2019 IEEE International Symposium on Information Theory (ISIT).
[42] Ender Tekin,et al. The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.
[43] H. Vincent Poor,et al. Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.
[44] Jianwei Xie,et al. Secure degrees of freedom of the Gaussian wiretap channel with helpers , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[45] Jianwei Xie,et al. Secure Degrees of Freedom of $K$ -User Gaussian Interference Channels: A Unified View , 2013, IEEE Transactions on Information Theory.