1 |
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
DOI
ScienceOn
|
2 |
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wiretap channel," IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451-456, Jul. 1978.
|
3 |
R. J. McEliece, "A Public-Key Cryptosystem Based On Algebraic Coding Theory," Jep Propulsion Lab, 1978, pp. 114-116, DSN Progress Report 44
|
4 |
D. Klinc, J. Ha, S. McLaughlin, J. Barros, and B.- J. Kwak, "LDPC codes for the Gaussian wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 532-540, Sep, 2011.
DOI
ScienceOn
|
5 |
D. Klinc, J. Ha, S. McLaughlin, J. Barros, and B.- J. Kwak, "LDPC codes for physical layer security," in Proc. IEEE Global Telecommunications Conf. (GLOBECOM 2009), Honolulu, HI, Nov. 2009.
|
6 |
C. W. Wong, T. F. Wong, and J. M. Shea, "LDPC code design for the BPSK-constrained Gaussian wiretap channel," in Proc. IEEE GLOBECOM Workshops 2011, Houston, TX, Dec. 2011.
|
7 |
C. W. Wong, T. F. Wong, and J. M. Shea, "Secretsharing LDPC codes for the BPSK-constrained Gaussian wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 551-564, Sep. 2011.
DOI
ScienceOn
|
8 |
M. Baldi, M. Bianchi, and F. Chiaraluce, "Nonsystematic codes for physical layer security," in Proc. IEEE Information Theory Workshop (ITW 2010), Dublin, Ireland, Aug. 2010.
|
9 |
M. Baldi, M. Bianchi, and F. Chiaraluce, "Coding with Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp.883-894, Jun, 2012.
DOI
ScienceOn
|
10 |
3GPP, "3GPP TS 36.212 v8.7.0 3rd generation partnership project; technical specification group radio access network; evolved universal terrestrial radio access; multiplexing and channel coding (release 8)," 3rd Generation Partnership Project, Tech. Rep., May. 2009.
|
11 |
Shu Lin, and Danial J. Costello, "Error Control Coding: Fundamentals and Applications," 2nd Ed. Pearson Prentice Hall., 2004
|
12 |
L. Bahl, J. Cocke, F. Jelinek, and J. Raviv, "Optimal decoding of linear codes for minimizing symbol error rate," IEEE Trans. Inf. Theory, vol. IT-20, pp. 284-287, Mar. 1974.
|
13 |
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, Oct. 1949.
DOI
|