Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Secure communication under channel uncertainty and adversarial attacks

RF Schaefer, H Boche, HV Poor - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
Information theoretic approaches to security have been examined as a promising
complement to current cryptographic techniques. Such information theoretic approaches …

Polar coding for the broadcast channel with confidential messages: A random binning analogy

RA Chou, MR Bloch - IEEE Transactions on Information Theory, 2016 - ieeexplore.ieee.org
We develop a low-complexity polar coding scheme for the discrete memoryless broadcast
channel with confidential messages under strong secrecy and randomness constraints. Our …

Universal polarization

E Şaşoğlu, L Wang - IEEE Transactions on Information Theory, 2016 - ieeexplore.ieee.org
A method to polarize channels universally is introduced. The method is based on combining
channels of unequal capacities in each polarization step, as opposed to the standard …

Polar coding for the multiple access wiretap channel via rate-splitting and cooperative jamming

RA Chou, A Yener - IEEE Transactions on Information Theory, 2018 - ieeexplore.ieee.org
We consider strongly secure communication over a discrete memoryless multiple access
wiretap channel with two transmitters. No degradation or symmetry assumptions are made …

[图书][B] Channel coding techniques for network communication

L Wang - 2015 - search.proquest.com
Next-generation wireless networks aim to enable order-of-magnitude increases in
connectivity, capacity, and speed. Such a goal can be achieved in part by utilizing larger …

Explicit wiretap channel codes via source coding, universal hashing, and distribution approximation, when the channels' statistics are uncertain

RA Chou - IEEE Transactions on Information Forensics and …, 2022 - ieeexplore.ieee.org
We consider wiretap channels with uncertainty on the eavesdropper channel under (i) noisy
blockwise type II,(ii) compound, or (iii) arbitrarily varying models. We present explicit wiretap …

Robust biometric authentication from an information theoretic perspective

A Grigorescu, H Boche, RF Schaefer - Entropy, 2017 - mdpi.com
Robust biometric authentication is studied from an information theoretic perspective.
Compound sources are used to account for uncertainty in the knowledge of the source …

[图书][B] Polar codes for data storage and communication network applications

KN Tunuguntula - 2022 - search.proquest.com
UNIVERSITY OF CALIFORNIA SAN DIEGO Polar Codes for Data Storage and
Communication Network Applications A dissertation submitted Page 1 UNIVERSITY OF …

Computable or Not Computable: Algorithmic Aspects of Channel Capacity

AL Grigorescu Vlass - 2024 - mediatum.ub.tum.de
The advent of 6G technology is set to expand the accessibility of Internet of Things (IoT) and
Tactile Internet applications, necessitating a highly reliable, secure, and efficient …