Author:
Chen Zhao,Yin Liuguo,Pei Yukui,Lu Jianhua
Publisher
Springer Science and Business Media LLC
Reference31 articles.
1. Liang Y, Poor H V, Shamai S. Information theoretic security. Found Trends Commun Inf Theory, 2009, 5: 355–580
2. Wang B, Mu P C, Yang P Z, et al. Two-step transmission with artificial noise for secure wireless SIMO communications. Sci China Inf Sci, 2015, 58: 042308
3. Barkan E, Biham E. Conditional estimators: an effective attack on A5/1. In: Selected Areas in Cryptography. Berlin: Springer, 2006, 3897: 1–19
4. Wyner A D. The wire-tap channel. Bell Syst Tech J, 1975, 54: 1355–1387
5. Thangaraj A, Dihidar S, Calderbank A R, et al. Applications of LDPC codes to the wiretap channel. IEEE Trans Inf Theory, 2007, 53: 2933–2945
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献