On Channel-Aware Secure HARQ-IR
暂无分享,去创建一个
[1] Zhi Ding,et al. On Secrecy Rate Analysis of MIMO Wiretap Channels Driven by Finite-Alphabet Input , 2011, IEEE Transactions on Communications.
[2] Giuseppe Caire,et al. Incremental redundancy hybrid ARQ schemes based on low-density parity-check codes , 2004, IEEE Transactions on Communications.
[3] Carles Padró,et al. Information Theoretic Security , 2013, Lecture Notes in Computer Science.
[4] H. Vincent Poor,et al. On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.
[5] Nicola Laurenti,et al. Secrecy Transmission on Parallel Channels: Theoretical Limits and Performance of Practical Codes , 2014, IEEE Transactions on Information Forensics and Security.
[6] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[7] Marco Baldi,et al. Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis , 2012, IEEE Transactions on Information Forensics and Security.
[8] Jinho Choi,et al. A Robust Beamforming Approach to Guarantee Instantaneous Secrecy Rate , 2016, IEEE Transactions on Wireless Communications.
[9] Onur Ozan Koyluoglu,et al. Polar coding for secure transmission and key agreement , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.
[10] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[11] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[12] Cong Ling,et al. Semantically Secure Lattice Codes for the Gaussian Wiretap Channel , 2012, IEEE Transactions on Information Theory.
[13] Björn E. Ottersten,et al. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.
[14] Robert W. Heath,et al. Antenna Subset Modulation for secure millimeter-wave wireless communication , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[15] Harald Niederreiter,et al. Probability and computing: randomized algorithms and probabilistic analysis , 2006, Math. Comput..
[16] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..
[17] Nicola Laurenti,et al. Secure HARQ With Multiple Encoding Over Block Fading Channels: Channel Set Characterization and Outage Analysis , 2014, IEEE Transactions on Information Forensics and Security.
[18] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[19] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[20] Eli Upfal,et al. Probability and Computing: Randomized Algorithms and Probabilistic Analysis , 2005 .
[21] Hyuckjae Lee,et al. Bounds on Secrecy Capacity Over Correlated Ergodic Fading Channels at High SNR , 2011, IEEE Transactions on Information Theory.
[22] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[23] Andrew Thangaraj,et al. Error-Control Coding for Physical-Layer Secrecy , 2015, Proceedings of the IEEE.
[24] Matthieu R. Bloch,et al. Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.
[25] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[26] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[27] S. Wicker. Error Control Systems for Digital Communication and Storage , 1994 .
[28] Jinho Choi,et al. Secret key agreement under an active attack in MU-TDD systems with large antenna arrays , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[29] Giuseppe Caire,et al. The throughput of hybrid-ARQ protocols for the Gaussian collision channel , 2001, IEEE Trans. Inf. Theory.
[30] Byung-Jae Kwak,et al. LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.
[31] A. Robert Calderbank,et al. Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.
[32] Jinho Choi,et al. On Large Deviations of HARQ with Incremental Redundancy over Fading Channels , 2012, IEEE Communications Letters.
[33] Nicola Laurenti,et al. Secret message transmission by HARQ with multiple encoding , 2014, 2014 IEEE International Conference on Communications (ICC).
[34] Alexander Vardy,et al. Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes , 2010, IEEE Transactions on Information Theory.
[35] Wade Trappe,et al. Introduction to Cryptography with Coding Theory , 2002 .
[36] A. Goldsmith,et al. Capacity of Rayleigh fading channels under different adaptive transmission and diversity-combining techniques , 1999, IEEE Transactions on Vehicular Technology.