1 |
A. O. Hero, 'Secure space-time communication,' IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235–3249, Dec. 2003
DOI
ScienceOn
|
2 |
X. Li and J. Hwu, 'Using antenna array redundancy and channel diversity for secure wireless transmissions,' J. Commun., vol. 2, no. 3, pp. 24–32, May 2007
DOI
|
3 |
E. Tekin and A. Yener, 'The general Gaussian multiple-access and twoway wire-tap channels: Achievable rates and cooperative jamming,' IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735–2751, June 2008
DOI
ScienceOn
|
4 |
L. Lai, H. El Gamal and H. V. Poor, The Wiretap Channel with Feedback: Encryption over the Channel, [Online]. Available: http://www.ece.osu. edu/helgamal/publications.html
|
5 |
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. McLaughlin, and J. M. Merolla, 'Applications of LDPC codes to the wiretap channel,' IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933–2945, Aug. 2007
DOI
ScienceOn
|
6 |
M. Nloch, J. Barros and M. R. D. Rodrigues, 'Wireless information theoretic security,' IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515–2534, June 2008
DOI
ScienceOn
|
7 |
R. G. Gallager, Low Density Parity Check Codes. Cambridge, MA: MIT Press, 1963
|
8 |
M. Yuksel and E. Erkip, 'The relay channel with a wire-tapper,' in Proc. 41st Annual. CISS, Mar. 2007
|
9 |
D. J. C. MacKay, 'Good error-correcting codes based on very sparse matrices,' IEEE Trans. Inf. Theory, vol. 45, pp. 399–431, Mar. 1999
DOI
ScienceOn
|
10 |
J. Muramatsu, 'Secret key agreement from correlated source outputs using low density parity check matrices,' IEICE Trans. Fund. Elec. Comm. Comp., vol. E89-A, no. 7, pp. 2036–2046, July 2006
DOI
ScienceOn
|
11 |
I. Csiszar and J. Korner, 'Broadcast channels with confidential messages,' IEEE Trans. Inf. Theory, vol. 24, pp. 339–348, May 1978
DOI
|
12 |
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, pp. 733–742, Mar. 1993
DOI
ScienceOn
|
13 |
I. Csiszar and P. Narayan, 'Common randomness in information theory and cryptography, part I: Secret sharing,' IEEE Trans. Inf. Theory, vol. 39, pp. 1121–1132, July 1993
DOI
ScienceOn
|
14 |
C. E. Shannon, 'Communication theory of secrecy systems,' Bell Syst. Tech. J., vol. 29, pp. 656–715, 1949
|
15 |
C. Berrou, A. Glavieux, and P. Thitimajshima, 'Near Shannon limit error correcting coding and decoding: Turbo codes,' in Proc. IEEE ICC, (Geneva, Switzerland), 1993, pp. 1064–1070
DOI
|
16 |
H. Kim and J. D. Villasenor, 'Secure MIMO communcications in a system with equal numbers of transmit and receive antennas,' IEEE Commun. Lett., vol. 12, no. 5, pp. 386–388, May 2008
DOI
ScienceOn
|
17 |
S.Wolf, 'Theoretically and computationally secure key agreement in cryptography', Ph.D. Dissertation, 1999
|
18 |
B. Marco, C. iovanni, and C. Franco, 'Variable rate LDPC codes for wireless applications,' in Proc. Soft COM, 2006, pp. 301–305
DOI
|
19 |
A. D.Wyner, 'The wire-tap channel,' Bell Syst. Tech. J., vol. 54, pp. 1355–1387, Oct. 1975
DOI
|
20 |
L. Bazzi, T. J. Richardson, and R. L. Urbanke, "Exact thresholds and optimal codes for the binary-symmetric channel and gallager's decoding algorithm A," IEEE Trans. Inf. Theory, vol. 50, no. 9, pp. 2010–2021, Sept. 2004
DOI
ScienceOn
|