Abstract—We study the secrecy capacity of fast fading channels under imperfect main channel (between the transmitter and the legitimate receiver) estimation at the transmitter. Lower and upper bounds on the ergodic secrecy capacity are derived for a class of independent identically distributed (i.i.d.) fading channels. The achievable rate follows from a standard wiretap code in which a simple on-off power control is employed along with a Gaussian input. The upper bound is obtained using an appropriate correlation scheme of the main and the eavesdropper channels, and is the best known upper bound so far. The upper and the lower bounds coincide with recently derived ones in case of perfect main CSI. Furthermore, the upper bound is tight in ca...
Abstract—We consider the fast Rayleigh fading wiretap chan-nel, over which a legitimate transmitter ...
We study the security of communication between a single transmitter and many receivers in the prese...
The secure transmission of information over wireless systems in the presence of an eavesdropper has ...
Abstract—We study the secret message capacity of an ergodic block fading wiretap channel with partia...
Wireless security has become an important issue for modern wireless networks. Due to the broadcast n...
Wireless security has become an important issue for modern wireless networks. Due to the broadcast n...
In this paper, we study the multiple-input multiple-output multiple-eavesdropper wiretap channel in ...
In this paper, we study the multiple-input multiple-output multiple-eavesdropper wiretap channel in ...
Abstract—In this paper, the delay limited secrecy capacity of the flat fading channel is investigate...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
Secure transmission of information over wireless channels in the presence of an eavesdropper has att...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
It is known that for a slow fading Gaussian wiretap channel without channel state information at the...
We study the security of communication between a single transmitter and many receivers in the presen...
Abstract—We consider the fast Rayleigh fading wiretap chan-nel, over which a legitimate transmitter ...
We study the security of communication between a single transmitter and many receivers in the prese...
The secure transmission of information over wireless systems in the presence of an eavesdropper has ...
Abstract—We study the secret message capacity of an ergodic block fading wiretap channel with partia...
Wireless security has become an important issue for modern wireless networks. Due to the broadcast n...
Wireless security has become an important issue for modern wireless networks. Due to the broadcast n...
In this paper, we study the multiple-input multiple-output multiple-eavesdropper wiretap channel in ...
In this paper, we study the multiple-input multiple-output multiple-eavesdropper wiretap channel in ...
Abstract—In this paper, the delay limited secrecy capacity of the flat fading channel is investigate...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
Secure transmission of information over wireless channels in the presence of an eavesdropper has att...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
It is known that for a slow fading Gaussian wiretap channel without channel state information at the...
We study the security of communication between a single transmitter and many receivers in the presen...
Abstract—We consider the fast Rayleigh fading wiretap chan-nel, over which a legitimate transmitter ...
We study the security of communication between a single transmitter and many receivers in the prese...
The secure transmission of information over wireless systems in the presence of an eavesdropper has ...