Interleaved Coding for Secrecy with a Hidden Key
暂无分享,去创建一个
[1] Andrew Thangaraj,et al. Error-Control Coding for Physical-Layer Secrecy , 2015, Proceedings of the IEEE.
[2] Matthieu R. Bloch,et al. Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.
[3] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[4] Alexander Vardy,et al. Achieving the secrecy capacity of wiretap channels using Polar codes , 2010, ISIT.
[5] Byung-Jae Kwak,et al. LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.
[6] A. Robert Calderbank,et al. Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.
[7] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[8] Marco Baldi,et al. Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis , 2012, IEEE Transactions on Information Forensics and Security.
[9] Matthieu R. Bloch,et al. Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.
[10] H. Vincent Poor,et al. Secrecy Throughput of MANETs Under Passive and Active Attacks , 2011, IEEE Transactions on Information Theory.
[11] Marco Gomes,et al. Interleaved Concatenated Coding for Secrecy in the Finite Blocklength Regime , 2016, IEEE Signal Processing Letters.
[12] Cong Ling,et al. Semantically Secure Lattice Codes for the Gaussian Wiretap Channel , 2012, IEEE Transactions on Information Theory.
[13] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[14] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.