Secrecy over Multiple-Access Channel: A Game of Competition and Cooperation
暂无分享,去创建一个
[1] H. Vincent Poor,et al. Multiple Access Channels with Generalized Feedback and Confidential Messages , 2007, 2007 IEEE Information Theory Workshop.
[2] Remi A. Chou,et al. The Gaussian multiple access wiretap channel when the eavesdropper can arbitrarily jam , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[3] Aydano B. Carleial,et al. Multiple-access channels with different generalized feedback signals , 1982, IEEE Trans. Inf. Theory.
[4] Masoud Salehi,et al. Multiple access channels with arbitrarily correlated sources , 1980, IEEE Trans. Inf. Theory.
[5] Moritz Wiese,et al. Strong Secrecy for Multiple Access Channels , 2012, Information Theory, Combinatorics, and Search Theory.
[6] Jack K. Wolf,et al. The capacity region of a multiple-access discrete memoryless channel can increase with feedback (Corresp.) , 1975, IEEE Trans. Inf. Theory.
[7] G. H. Khachatrian,et al. Code Construction for the T-User Noiseless Adder Channel , 1998, IEEE Trans. Inf. Theory.
[8] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[9] Mohammad Reza Aref,et al. Multiple Access Wiretap channels with strong secrecy , 2010, 2010 IEEE Information Theory Workshop.
[10] H. Vincent Poor,et al. Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.
[11] Cyril Leung,et al. An achievable rate region for the multiple-access channel with feedback , 1981, IEEE Trans. Inf. Theory.
[12] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[13] Frans M. J. Willems. The feedback capacity region of a class of discrete memoryless multiple access channels , 1982, IEEE Trans. Inf. Theory.
[14] Edward C. van der Meulen,et al. A survey of multi-way channels in information theory: 1961-1976 , 1977, IEEE Trans. Inf. Theory.
[15] D. Slepian,et al. A coding theorem for multiple access channels with correlated sources , 1973 .
[16] Andries P. Hekstra,et al. Dependence balance bounds for single-output two-way channels , 1989, IEEE Trans. Inf. Theory.
[17] A. J. Han Vinck,et al. On the capacity of the two-user M -ary multiple-access channel with feedback , 1985, IEEE Trans. Inf. Theory.
[18] Amos Lapidoth,et al. An improved achievable region for the discrete memoryless two-user multiple-access channel with noiseless feedback , 2005, IEEE Transactions on Information Theory.
[19] Onur Ozan Koyluoglu,et al. On secure communication over the multiple access channel , 2016, 2016 International Symposium on Information Theory and Its Applications (ISITA).
[20] Ramji Venkataramanan,et al. A New Achievable Rate Region for the Multiple-Access Channel With Noiseless Feedback , 2011, IEEE Transactions on Information Theory.
[21] A. J. Han Vinck,et al. Collective Secrecy Over the $K$ -Transmitter Multiple Access Channel , 2018, IEEE Transactions on Information Forensics and Security.