dc.identifier.citation |
[1] I. Csiszar, J. Korner, “Broadcast Channels with Confidential Messages,”IEEE Trans. Info. Theory, pp. 339-348, May 1978. [2] U. M. Maurer, S. Wolf, “Unconditionally Secure Key Agreement and the Intrinsic Conditional Information,” IEEE Trans. Info. Theory, vol. 45, no. 2, pp. 499-514, March 1999. [3] U. M. Maurer, “Secret Key Agreement by Public Discussion from Common Information,” IEEE Trans. Info. Theory, vol. 39, no. 3, pp .733-742, May 1993. [4] A. E. Hero, “Secure Space-Time Communication,” IEEE Trans. Info.Theory, pp. 3235-3249, December 2003. [5] H. Koorapaty, A. A. Hassan, S. Chennakeshu “Secure Information Transmission for Mobile Radio,” IEEE Trans. Wireless Communications, pp. 52-55, July 2003. [6] G. J. Foschini, M. J. Gans “On limits of wireless communications in a fading environment when using multiple antennas,” Wireless Personal Commun.: Kluwer Academic Press, no 6, pp. 311-335, 1998. [7] G. J. Foschini, D. Chizhik, M. J. Gans, C. Papadias, R. A. Valenzuela, “Analysis and Performance of Some Basic Space-Time Architectures,” IEEE J. Select. Areas Comm., vol. 21, no. 3, pp. 303-320, April 2003. [8] Thomas.M.Cover, Joy.A.Thomas Elements Of Information Theory, Second Edition, Wiley-Interscience [9] C. Shannon, “Communication theory of secrecy systems,” Bell System Technical Journal, vol. 29, pp. 656–715, 1949. [10] M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wireless information-theoretic security,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515–2534,2008. [11] P. Parada and R. Blahut, “Secrecy capacity of SIMO and slow fading channels,” in Proc. IEEE Int. Symp. Inform. Theory (ISIT05), 2005, pp. 2152–2155. [12] A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas: The MISOME wiretap channel,” Arxiv preprint arXiv:0708.4219,2007. [13] F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretap channel,” Arxiv preprint arXiv:0710.1920, 2007. [14] P. Wang, G. Yu, and Z. Zhang, “On the secrecy capacity of fading wireless channel with multiple eavesdroppers,” in Proc. IEEE Int. Symp. Inform. Theory (ISIT2007), Nice, France, 2007, pp. 1301–1305. [15] H. Suzuki, “A statistical model for urban radio propagation,” IEEE Transactions on Communications, vol. COM-25, no. 7, pp. 673–680, 1977. [16] A. Shahzadi, M. G. Madiseh, and A. A. B. Shirazi, “Secret key capacity for wireless nakagami and suzuki fading channels,” IJCSNS International Journal of Computer Science and Network Security, vol. 7, no. 3, pp. 296–303, 2007. [17] F. Zheng and T. Kaiser, “On the channel capacity of multiantenna systems with Nakagami fading,” EURASIP Journal on Applied Signal Processing, vol. 2006, pp. 1–11, Article ID 39436. |
en_US |