Several security models of multiple-access channel (MAC) are investigated. First, we study the degraded MAC with confidential messages, where two users transmit their confidential messages (no common message) to a destination, and each user obtains a degraded version of the output of the MAC. Each user views the other user as a eavesdropper, and wishes to keep its confidential message as secret as possible from the other user. Measuring each user’s uncertainty about the other user’s confidential message by equivocation, the inner and outer bounds on the capacity-equivocation region for this model have been provided. The result is further explained via the binary and Gaussian examples. Second, the discrete memoryless multiple-access wiretap ...
A wiretap channel is a communication channel between a transmitter Alice and a legitimate receiver B...
Wire-Tap Channel (GGMAC-WT). In this scenario, multiple users communicate with an intended receiver ...
We study the security of communication between a single transmitter and many receivers in the prese...
In this paper, some new results on the multiple-access wiretap channel (MAC-WT) are provided. Specif...
Communication networks have had a transformative impact on our society as they have revolutionized a...
In this paper, we investigate the effects of an additional trusted relay node on the secrecy of mult...
International audienceWe study the two-transmitter two-receiver channel with confidential messages c...
1 Abstract—In this paper, we study the problem of secret com-munication over a Compound Multiple Acc...
International audienceWe study a special case of Willems's two-user multi-access channel with partia...
We study a special case of Willems’s two-user multi-access channel with partially cooperating encode...
Abstract—Shannon theoretic secret key generation by several parties is considered for models in whic...
It is commonly known that physical layer security is achieved with a trade-off in terms of the achie...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
The secrecy capacity of the multi-antenna wiretap channel was recently characterized independently b...
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple antennas at t...
A wiretap channel is a communication channel between a transmitter Alice and a legitimate receiver B...
Wire-Tap Channel (GGMAC-WT). In this scenario, multiple users communicate with an intended receiver ...
We study the security of communication between a single transmitter and many receivers in the prese...
In this paper, some new results on the multiple-access wiretap channel (MAC-WT) are provided. Specif...
Communication networks have had a transformative impact on our society as they have revolutionized a...
In this paper, we investigate the effects of an additional trusted relay node on the secrecy of mult...
International audienceWe study the two-transmitter two-receiver channel with confidential messages c...
1 Abstract—In this paper, we study the problem of secret com-munication over a Compound Multiple Acc...
International audienceWe study a special case of Willems's two-user multi-access channel with partia...
We study a special case of Willems’s two-user multi-access channel with partially cooperating encode...
Abstract—Shannon theoretic secret key generation by several parties is considered for models in whic...
It is commonly known that physical layer security is achieved with a trade-off in terms of the achie...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
The secrecy capacity of the multi-antenna wiretap channel was recently characterized independently b...
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple antennas at t...
A wiretap channel is a communication channel between a transmitter Alice and a legitimate receiver B...
Wire-Tap Channel (GGMAC-WT). In this scenario, multiple users communicate with an intended receiver ...
We study the security of communication between a single transmitter and many receivers in the prese...