Secure transmission over the wiretap channel using polar codes and artificial noise
暂无分享,去创建一个
Zhen Yang | Aijun Liu | Yingxian Zhang | YuLong Zou | A. Liu | Yulong Zou | Zhen Yang | Yingxian Zhang
[1] Toshiyuki Tanaka,et al. Performance of polar codes with the construction using density evolution , 2009, IEEE Communications Letters.
[2] Marco Baldi,et al. Non-systematic codes for physical layer security , 2010, 2010 IEEE Information Theory Workshop.
[3] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[4] Mounir Ghogho,et al. Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.
[5] Erdal Arikan. Channel combining and splitting for cutoff rate improvement , 2006, IEEE Transactions on Information Theory.
[6] Ruoheng Liu,et al. Application of LDGM-LDPC codes to secrecy coding for the type-II binary symmetric wiretap channel , 2010, 2010 IEEE Information Theory Workshop on Information Theory (ITW 2010, Cairo).
[7] Alexander Vardy,et al. A new polar coding scheme for strong security on wiretap channels , 2013, 2013 IEEE International Symposium on Information Theory.
[8] Aijun Liu,et al. A Practical Construction Method for Polar Codes , 2014, IEEE Communications Letters.
[9] Hossein Pishro-Nik,et al. A practical approach to polar codes , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[10] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..
[11] Emre Telatar,et al. On the rate of channel polarization , 2008, 2009 IEEE International Symposium on Information Theory.
[12] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[13] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[14] Frédérique E. Oggier,et al. Lattice Codes for the Wiretap Gaussian Channel: Construction and Analysis , 2016, IEEE Trans. Inf. Theory.
[15] Cong Ling,et al. Semantically Secure Lattice Codes for the Gaussian Wiretap Channel , 2012, IEEE Transactions on Information Theory.
[16] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[17] Erdal Arikan,et al. Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.
[18] Ling Liu,et al. Polar lattices for strong secrecy over the mod-Λ Gaussian wiretap channel , 2014, 2014 IEEE International Symposium on Information Theory.
[19] U. Maurer. The Strong Secret Key Rate of Discrete Random Triples , 1994 .
[20] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[21] E. Arkan,et al. A performance comparison of polar codes and Reed-Muller codes , 2008, IEEE Communications Letters.
[22] Shlomo Shamai,et al. Secrecy-Achieving Polar-Coding for Binary-Input Memoryless Symmetric Wire-Tap Channels , 2010, ArXiv.
[23] Alexander Vardy,et al. Achieving the secrecy capacity of wiretap channels using Polar codes , 2010, ISIT.
[24] Byung-Jae Kwak,et al. LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.
[25] A. Robert Calderbank,et al. Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.
[26] Mikael Skoglund,et al. Nested Polar Codes for Wiretap and Relay Channels , 2010, IEEE Communications Letters.
[27] Aijun Liu,et al. A Modified Belief Propagation Polar Decoder , 2014, IEEE Communications Letters.
[28] A. Robert Calderbank,et al. On achieving capacity on the wire tap channel using LDPC codes , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[29] Marco Baldi,et al. Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis , 2012, IEEE Transactions on Information Forensics and Security.
[30] Onur Ozan Koyluoglu,et al. Polar coding for secure transmission and key agreement , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.