Browse > Article

물리계층 보안을 위한 보안 전처리 기법의 설계 방법  

Gwon, Gyeong-Hun (고려대학교)
Heo, Jun (고려대학교)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.   DOI   ScienceOn
2 S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wiretap channel," IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451-456, Jul. 1978.
3 R. J. McEliece, "A Public-Key Cryptosystem Based On Algebraic Coding Theory," Jep Propulsion Lab, 1978, pp. 114-116, DSN Progress Report 44
4 D. Klinc, J. Ha, S. McLaughlin, J. Barros, and B.- J. Kwak, "LDPC codes for the Gaussian wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 532-540, Sep, 2011.   DOI   ScienceOn
5 D. Klinc, J. Ha, S. McLaughlin, J. Barros, and B.- J. Kwak, "LDPC codes for physical layer security," in Proc. IEEE Global Telecommunications Conf. (GLOBECOM 2009), Honolulu, HI, Nov. 2009.
6 C. W. Wong, T. F. Wong, and J. M. Shea, "LDPC code design for the BPSK-constrained Gaussian wiretap channel," in Proc. IEEE GLOBECOM Workshops 2011, Houston, TX, Dec. 2011.
7 C. W. Wong, T. F. Wong, and J. M. Shea, "Secretsharing LDPC codes for the BPSK-constrained Gaussian wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 551-564, Sep. 2011.   DOI   ScienceOn
8 M. Baldi, M. Bianchi, and F. Chiaraluce, "Nonsystematic codes for physical layer security," in Proc. IEEE Information Theory Workshop (ITW 2010), Dublin, Ireland, Aug. 2010.
9 M. Baldi, M. Bianchi, and F. Chiaraluce, "Coding with Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp.883-894, Jun, 2012.   DOI   ScienceOn
10 3GPP, "3GPP TS 36.212 v8.7.0 3rd generation partnership project; technical specification group radio access network; evolved universal terrestrial radio access; multiplexing and channel coding (release 8)," 3rd Generation Partnership Project, Tech. Rep., May. 2009.
11 Shu Lin, and Danial J. Costello, "Error Control Coding: Fundamentals and Applications," 2nd Ed. Pearson Prentice Hall., 2004
12 L. Bahl, J. Cocke, F. Jelinek, and J. Raviv, "Optimal decoding of linear codes for minimizing symbol error rate," IEEE Trans. Inf. Theory, vol. IT-20, pp. 284-287, Mar. 1974.
13 C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, Oct. 1949.   DOI