[图书][B] Physical-layer security: from information theory to security engineering
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …
implementation, challenges and benefits of a groundbreaking new model for secure …
Strongly secure communications over the two-way wiretap channel
AJ Pierrot, MR Bloch - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
We consider the problem of secure communications over the two-way wiretap channel
under a strong secrecy criterion. We improve existing results by developing an achievable …
under a strong secrecy criterion. We improve existing results by developing an achievable …
Secret communication with feedback
Secure communication with feedback is studied. An achievability scheme in which the
backward channel is used to generate a shared secret key is proposed. The scenario of …
backward channel is used to generate a shared secret key is proposed. The scenario of …
The role of feedback in two-way secure communications
X He, A Yener - IEEE Transactions on Information Theory, 2013 - ieeexplore.ieee.org
Most practical communication links are bidirectional. In these models, since the source node
also receives signals, its encoder has the option of computing its output based on the …
also receives signals, its encoder has the option of computing its output based on the …
On the role of feedback in two-way secure communication
X He, A Yener - 2008 42nd Asilomar Conference on Signals …, 2008 - ieeexplore.ieee.org
For bi-directional communication, the most general form of encoders should consider the
signals received in the past as inputs. However, in practice, it would also be highly desirable …
signals received in the past as inputs. However, in practice, it would also be highly desirable …
[图书][B] Cooperation and information theoretic security in wireless networks
X He - 2010 - search.proquest.com
This dissertation studies the fundamental rate limits of wireless communication systems
through which confidential messages can be transmitted without being intercepted by an …
through which confidential messages can be transmitted without being intercepted by an …
Feedback-based collaborative secrecy encoding over binary symmetric channels
GT Amariucai, S Wei - IEEE transactions on information theory, 2012 - ieeexplore.ieee.org
In this paper, we propose a feedback scheme for transmitting secret messages between two
legitimate parties, over an eavesdropped communication link. Relative to Wyner's traditional …
legitimate parties, over an eavesdropped communication link. Relative to Wyner's traditional …
Enhancing physical layer security via channel feedback: a survey
Physical layer security (PLS), which is based on information-theoretic principles of message
confidentiality, has attracted considerable attention in recent years. This paper provides a …
confidentiality, has attracted considerable attention in recent years. This paper provides a …
[PDF][PDF] The Role of Feedback in Two-way Secure Communications
XHA Yener - arXiv preprint arXiv:0911.4432, 2009 - Citeseer
Most practical communication links are bi-directional. In these models, since the source
node also receives signals, its encoder has the option of computing its output based on the …
node also receives signals, its encoder has the option of computing its output based on the …
[PDF][PDF] Secret Communication with Feedback Deniz Gündüz, D. Richard Brown III and H. Vincent Poor
D Gündüz - spinlab.wpi.edu
Secure communication with feedback is studied. An achievability scheme in which the
backward channel is used to generate a shared secret key is proposed. The scenario of …
backward channel is used to generate a shared secret key is proposed. The scenario of …