How to Break the Limits of Secrecy Constraints in Communication Networks?
暂无分享,去创建一个
[1] Hua Wang,et al. Gaussian Interference Channel Capacity to Within One Bit , 2007, IEEE Transactions on Information Theory.
[2] Ulukus Sennur,et al. MIMO one hop networks with no eve CSIT , 2016 .
[3] Chunhua Geng,et al. Optimal Secure GDoF of Symmetric Gaussian Wiretap Channel with a Helper , 2019, 2019 IEEE International Symposium on Information Theory (ISIT).
[4] Ender Tekin,et al. The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.
[5] Fan Li,et al. Adding Common Randomness Can Remove the Secrecy Constraints in Communication Networks , 2019, ArXiv.
[6] Sanjay Karmakar,et al. Approximate secrecy capacity region of an asymmetric MAC wiretap channel within 1/2 bits , 2015, 2015 IEEE 14th Canadian Workshop on Information Theory (CWIT).
[7] H. Vincent Poor,et al. Interference Alignment for Secrecy , 2008, IEEE Transactions on Information Theory.
[8] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[9] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[10] Panagiotis Papadimitratos,et al. Finite-SNR regime analysis of the Gaussian wiretap multiple-access channel , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[11] Jinyuan Chen. Secure Communication over Interference Channel: To Jam or Not to Jam? , 2018, 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[12] Shlomo Shamai,et al. Capacity of Cognitive Interference Channels With and Without Secrecy , 2009, IEEE Transactions on Information Theory.
[13] Syed Ali Jafar,et al. On the Symmetric 2-User Deterministic Interference Channel with Confidential Messages , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[14] Roy D. Yates,et al. Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.
[15] Chandra R. Murthy,et al. On the Capacity of the Two-User Symmetric Interference Channel With Transmitter Cooperation and Secrecy Constraints , 2016, IEEE Transactions on Information Theory.
[16] Fan Li,et al. Adding a Helper Can Totally Remove the Secrecy Constraints in a Two-User Interference Channel , 2019, IEEE Transactions on Information Forensics and Security.
[17] Jianwei Xie,et al. Secure Degrees of Freedom of $K$ -User Gaussian Interference Channels: A Unified View , 2013, IEEE Transactions on Information Theory.
[18] Aylin Yener,et al. MIMO Multiple Access Channel With an Arbitrarily Varying Eavesdropper: Secrecy Degrees of Freedom , 2013, IEEE Trans. Inf. Theory.