Amanote Research
Register
Sign In
Wiretap-Channels Under Constrained Active and Passive Attacks
doi 10.1109/cns.2015.7346805
Full Text
Open PDF
Abstract
Available in
full text
Date
September 1, 2015
Authors
Carsten Rudolf Janda
Moritz Wiese
Janis Notzel
Holger Boche
Eduard A. Jorswieck
Publisher
IEEE
Related search
Capacity Results and Super-Activation for Wiretap Channels With Active Wiretappers
IEEE Transactions on Information Forensics and Security
Risk
Computer Networks
Communications
Reliability
Safety
Quality
Overcoming Limitations of Secret Key Generation in Block Fading Channels Under Active Attacks
Capacity Results for Compound Wiretap Channels
On the Continuity of the Secrecy Capacity of Wiretap Channels Under Channel Uncertainty
Perception and Motion Under Passive or Active Conditions
Equilibrium Research
Otorhinolaryngology
Neurology
Lattice-Based Identification Schemes Secure Under Active Attacks
Physical Layer Security for Massive MIMO: An Overview on Passive Eavesdropping and Active Attacks
IEEE Communications Magazine
Computer Networks
Electronic Engineering
Computer Science Applications
Electrical
Communications
Optimal Transmit Strategies for Gaussian MISO Wiretap Channels
IEEE Transactions on Information Forensics and Security
Risk
Computer Networks
Communications
Reliability
Safety
Quality
Conditional Adjacency Anonymity in Social Graphs Under Active Attacks
Knowledge and Information Systems
Information Systems
Human-Computer Interaction
Hardware
Architecture
Artificial Intelligence
Software