The Two-Way Wiretap Channel: Achievable Regions and Experimental Results
暂无分享,去创建一个
[1] Alexandre J. Pierrot,et al. Strongly Secure Communications Over the Two-Way Wiretap Channel , 2010, IEEE Transactions on Information Forensics and Security.
[2] H. Vincent Poor,et al. The Wiretap Channel With Feedback: Encryption Over the Channel , 2007, IEEE Transactions on Information Theory.
[3] Ender Tekin,et al. Achievable Rates for Two-Way Wire-Tap Channels , 2007, 2007 IEEE International Symposium on Information Theory.
[4] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[5] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[6] Onur Ozan Koyluoglu,et al. On the secrecy rate region for the interference channel , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.
[7] F. Jiang,et al. Exploiting the capture effect for collision detection and recovery , 2005, The Second IEEE Workshop on Embedded Networked Sensors, 2005. EmNetS-II..
[8] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[9] Ender Tekin,et al. Correction to: "the Gaussian multiple access wire-tap channel" and "the general Gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming" , 2010, IEEE Trans. Inf. Theory.
[10] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[11] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[12] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[13] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[14] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[15] P. Levis,et al. RSSI is Under Appreciated , 2006 .
[16] Robert Szewczyk,et al. System architecture directions for networked sensors , 2000, ASPLOS IX.
[17] Moustafa Youssef,et al. Practical Provably Secure Communication for Half-Duplex Radios , 2011, 2011 IEEE International Conference on Communications (ICC).
[18] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[19] Abbas El Gamal,et al. Lecture Notes on Network Information Theory , 2010, ArXiv.
[20] Aylin Yener,et al. The Role of Feedback in Two-Way Secure Communications , 2009, IEEE Transactions on Information Theory.
[21] G. S. Vernam,et al. Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications , 1926, Transactions of the American Institute of Electrical Engineers.