Sciweavers

26 search results - page 4 / 6
» Providing Secrecy Irrespective of Eavesdropper's Channel Sta...
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...
TIT
2010
146views Education» more  TIT 2010»
13 years 3 months ago
Cooperation with an untrusted relay: a secrecy perspective
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario...
Xiang He, Aylin Yener
CISS
2008
IEEE
14 years 2 months ago
Diversity-multiplexing tradeoff for the multiple-antenna wire-tap channel
In this paper the fading multiple antenna (MIMO) wire-tap channel is investigated under short term power constraints. The secret diversity gain and the secret multiplexing gain ar...
Melda Yuksel, Elza Erkip
CORR
2010
Springer
184views Education» more  CORR 2010»
13 years 8 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
TIT
2010
133views Education» more  TIT 2010»
13 years 3 months ago
Secure transmission with multiple antennas I: the MISOME wiretap channel
Abstract--The role of multiple antennas for secure communication is investigated within the framework of Wyner's wiretap channel. We characterize the secrecy capacity in terms...
Ashish Khisti, Gregory W. Wornell