Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks
暂无分享,去创建一个
Rajarathnam Chandramouli | K. P. Subbalakshmi | Chetan Nanjunda Mathur | M. A. Haleem | Mohamed A. Haleem | C. N. Mathur | K.P. Subbalakshmi | R. Chandramouli
[1] Douglas R. Stinson. Cryptography: Theory and Practice, Third Edition , 2005 .
[2] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[3] L. Litwin,et al. Error control coding , 2001 .
[4] L. Sennott. Stochastic Dynamic Programming and the Control of Queueing Systems , 1998 .
[5] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[6] Dimitri P. Bertsekas,et al. Dynamic Programming and Optimal Control, Two Volume Set , 1995 .
[7] Pravin Varaiya,et al. Capacity of fading channels with channel side information , 1997, IEEE Trans. Inf. Theory.
[8] Rajarathnam Chandramouli,et al. Battery power optimized encryption , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[9] John B. Kam,et al. Structured Design of Substitution-Permutation Encryption Networks , 1979, IEEE Transactions on Computers.
[10] Andrea J. Goldsmith,et al. Variable-rate variable-power MQAM for fading channels , 1997, IEEE Trans. Commun..
[11] Ronald L. Rivest,et al. Introduction to Algorithms, Second Edition , 2001 .
[12] Mohsen Guizani,et al. Optimal stream-based cipher feedback mode in error channel , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[13] Shlomo Shamai,et al. Information theoretic considerations for cellular mobile radio , 1994 .
[14] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[15] Norman C. Beaulieu,et al. On first-order Markov modeling for the Rayleigh fading channel , 2000, IEEE Trans. Commun..
[16] David G. Messerschmitt,et al. End-to-end confidentiality for continuous-media applications in wireless systems , 2001 .
[17] Zukang Shen,et al. Short range wireless channel prediction using local information , 2003, The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 2003.
[18] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[19] Sinem Coleri Ergen,et al. Channel estimation techniques based on pilot arrangement in OFDM systems , 2002, IEEE Trans. Broadcast..
[20] B.L. Evans,et al. Long range channel prediction for adaptive OFDM systems , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..
[21] Daniel J. Costello,et al. Error Control Coding, Second Edition , 2004 .
[22] Seymour Stein,et al. Fading Channel Issues in System Engineering , 1987, IEEE J. Sel. Areas Commun..
[23] Lars K. Rasmussen,et al. Linear interference cancellation in CDMA based on iterative techniques for linear equation systems , 2000, IEEE Trans. Commun..
[24] Wade Trappe,et al. Introduction to Cryptography with Coding Theory , 2002 .
[25] Andrea Goldsmith,et al. Variable- Power MQAM for )Fading Channels , 1996 .
[26] Xiaolin Wu,et al. Joint image/video compression and encryption via high-order conditional entropy coding of wavelet coefficients , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[27] W. C. Jakes,et al. Microwave Mobile Communications , 1974 .
[28] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[29] A. Goldsmith,et al. Variable-rate variable-power MQAM for fading channels , 1996, Proceedings of Vehicular Technology Conference - VTC.
[30] Hong Shen Wang,et al. Finite-state Markov channel-a useful model for radio communication channels , 1995 .
[31] David G. Messerschmitt,et al. The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over IP Networks , 2001, MMNS.