X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (222) 222
Publication (36) 36
Conference Proceeding (30) 30
Newspaper Article (19) 19
Magazine Article (8) 8
Book Chapter (4) 4
Book / eBook (2) 2
Dissertation (2) 2
Newsletter (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
engineering, electrical & electronic (145) 145
telecommunications (78) 78
receivers (77) 77
computer science, information systems (69) 69
channels (67) 67
transmitters (59) 59
physical layer security (57) 57
security (50) 50
information theory (48) 48
interference (47) 47
broadcast channels (43) 43
secrecy (39) 39
computer science - information theory (38) 38
wiretap channel (38) 38
capacity (36) 36
communication (36) 36
jamming (35) 35
multiple access (34) 34
multiple-access (34) 34
optimization (34) 34
wiretapping (34) 34
access control (31) 31
wireless communication (30) 30
wireless networks (30) 30
encoding (29) 29
computer science (26) 26
decoding (26) 26
messages (26) 26
fading channels (25) 25
networks (25) 25
physical-layer security (24) 24
secrecy capacity (24) 24
analysis (23) 23
research (23) 23
access (22) 22
algorithms (22) 22
mimo (22) 22
relay (22) 22
usage (22) 22
confidential messages (21) 21
gaussian (21) 21
transmission (21) 21
computer science, theory & methods (20) 20
computer simulation (20) 20
gaussian multiple-access (20) 20
privacy (20) 20
wiretap channels (20) 20
eavesdropping (19) 19
information (19) 19
mathematical analysis (19) 19
secrecy capacity region (19) 19
cooperative jamming (18) 18
noise (18) 18
non-orthogonal multiple access (18) 18
artificial noise (17) 17
codes (17) 17
engineering (17) 17
internet (17) 17
laws, regulations and rules (17) 17
random variables (17) 17
communication system security (16) 16
design (16) 16
electronic surveillance (16) 16
geheimhaltung (16) 16
signal to noise ratio (16) 16
antennas (15) 15
channel models (15) 15
internet access (15) 15
nonorthogonal multiple-access (15) 15
relays (15) 15
systems (14) 14
communications engineering, networks (13) 13
cooperation (13) 13
energy harvesting (13) 13
feedback (13) 13
interference alignment (13) 13
region (13) 13
upper bound (13) 13
wireless communications (13) 13
cognitive radio (12) 12
electronics (12) 12
fading (12) 12
multiple access channel (12) 12
noise measurement (12) 12
noma (12) 12
secure degrees of freedom (12) 12
signal processing (12) 12
studies (12) 12
telecommunication (12) 12
coding (11) 11
computer information security (11) 11
computer security (11) 11
interference channels (11) 11
multiple-access wiretap channel (11) 11
performance (11) 11
relay selection (11) 11
resource management (11) 11
wire-tap channel (11) 11
wireless communication systems (11) 11
code division multiple access (10) 10
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE Transactions on Information Theory, ISSN 0018-9448, 08/2019, Volume 65, Issue 8, pp. 5125 - 5143
Journal Article
by Bin Dai and Zheng Ma
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 09/2015, Volume 10, Issue 9, pp. 1835 - 1849
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 11/2014, Volume 60, Issue 11, pp. 6844 - 6869
Journal Article
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 05/2019, Volume 14, Issue 5, pp. 1224 - 1239
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 01/2017, Volume 63, Issue 1, pp. 496 - 508
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 08/2019, Volume 65, Issue 8, pp. 4979 - 4996
An analogy framework between wiretap channels (WTCs) and state-dependent point-to-point channels with non-causal encoder channel state information (referred to... 
Analogy | state-dependent channel | wiretap channel | physical layer security | broadcast channel | Gelfand-Pinsker channel | SECRECY | CAPACITY | INFORMATION | COMPUTER SCIENCE, INFORMATION SYSTEMS | RELIABILITY | REGION | ENGINEERING, ELECTRICAL & ELECTRONIC | MULTIPLE-ACCESS | DUALITY
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 04/2011, Volume 57, Issue 4, pp. 2083 - 2114
Journal Article
IEEE Journal on Selected Areas in Communications, ISSN 0733-8716, 02/2016, Volume 34, Issue 2, pp. 278 - 291
Journal Article
Journal Article
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 03/2017, Volume 12, Issue 3, pp. 746 - 760
Journal Article
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 03/2018, Volume 64, Issue 3, pp. 2093 - 2103
Journal Article
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 09/2011, Volume 6, Issue 3, pp. 595 - 605
We consider the problem of secure communications over the two-way wiretap channel under a strong secrecy criterion. We improve existing results by developing... 
strong secrecy | Transmitters | Noise | Interference | Key generation | Encoding | Random variables | secure communications | Cryptography | two-way wiretap channel | Jamming | resolvability | CAPACITY | COMMON RANDOMNESS | MULTIPLE-ACCESS | COMPUTER SCIENCE, THEORY & METHODS | ENGINEERING, ELECTRICAL & ELECTRONIC | Cooperation | Strategy | Gaussian | Terminals | Computer information security | Channels | Gain
Journal Article
IEEE Access, ISSN 2169-3536, 2018, Volume 6, pp. 21731 - 21744
In this paper, we consider the problem of polar coding for secure communications over the two-way wiretap channel, where two legitimate users communicate with... 
coded cooperative jamming | Interference | Encoding | Complexity theory | Reliability | Channel models | Indexes | two-way wiretap channel | Jamming | Polar codes | physical-layer security | SECRECY CAPACITY | MULTIPLE-ACCESS | CODES | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.