A Secure Turbo Codes Design on Physical Layer Security Based on Interleaving and Puncturing
暂无分享,去创建一个
[1] Κωνσταντίνος Μονογιός,et al. Μετακβαντικοί κρυπτογραφικοί αλγόριθμοι (Post-Quantum Cryptography) , 2019 .
[2] Haji M. Furqan,et al. Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.
[3] Can Zhang,et al. Joint Channel-Encryption Coding Based on Interleaver and Multiplexer in Turbo Codes , 2018, 2018 IEEE 4th International Conference on Computer and Communications (ICCC).
[4] Dennis Hui,et al. Channel Coding in 5G New Radio: A Tutorial Overview and Performance Comparison with 4G LTE , 2018, IEEE Vehicular Technology Magazine.
[5] Archana Bhise,et al. Performance analysis of encrypted structured random interleaver , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[6] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[7] Christian Schlegel,et al. Trellis and Turbo Coding: Iterative and Graph-Based Error Control Coding , 2015 .
[8] Alexandros Katsiotis,et al. Secure encoder designs based on turbo codes , 2015, 2015 IEEE International Conference on Communications (ICC).
[9] V. Vakili,et al. Enhanced Secure Error Correction Code Schemes in Time Reversal UWB Systems , 2012, Wirel. Pers. Commun..
[10] Can Zhang,et al. Joint channel-security coding based on interleaver and puncturer in Turbo code , 2011, 2011 3rd Symposium on Web Society.
[11] Mohammad Reza Aref,et al. Adaptive random puncturing based secure block turbo coding , 2010, 2010 5th International Symposium on Telecommunications.
[12] Volkan Ozduran,et al. A COMBINED ENCRYPTION AND ERROR CORRECTION SCHEME:AES-TURBO , 2009 .
[13] Daniel J. Bernstein,et al. Introduction to post-quantum cryptography , 2009 .
[14] M. Ahmadian,et al. A Secure Channel Coding Scheme for Efficient Transmission of Remote Sensing Data over the LEO Satellite Channels , 2007, 2007 3rd International Conference on Recent Advances in Space Technologies.
[15] Mahmoud Ahmadian,et al. Adaptive secure channel coding based on punctured turbo codes , 2006 .
[16] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[17] Jacqueline Grennon. , 2nd Ed. , 2002, The Journal of nervous and mental disease.
[18] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[19] A. Glavieux,et al. Near Shannon limit error-correcting coding and decoding: Turbo-codes. 1 , 1993, Proceedings of ICC '93 - IEEE International Conference on Communications.
[20] T. R. N. Rao,et al. Private-key algebraic-code encryptions , 1989, IEEE Trans. Inf. Theory.
[21] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .