The secrecy capacity of relay channels with orthogonal components is studied in the presence of an additional passive eavesdropper node. The relay and destination receive signals from the source on two orthogonal channels such that the destination also receives transmissions from the relay on its channel. The eavesdropper can overhear either one or both of the orthogonal channels. Inner and outer bounds on the secrecy capacity are developed for both the discrete memoryless and the Gaussian channel models. For the discrete memoryless case, the secrecy capacity is shown to be achieved by a partial decode-and-forward (PDF) scheme when the eavesdropper can overhear only one of the two orthogonal channels. Two new outer bounds are presented for ...
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple antennas at t...
We study the capacity of a class of state-controlled relay channels with orthogonal channels from th...
Secure transmission of information over wireless channels in the presence of an eavesdropper has att...
We investigate the effects of an additional relay node on the secrecy of broadcast channels by consi...
International audienceWe investigate the problem of secure communication over parallel relay channel...
We investigate the problem of secure communication over parallel relay channel in the presence of a ...
We study the security of communication between a single transmitter and many receivers in the presen...
We study a four terminal parallel relay-eavesdropper channel which consists of multiple independent ...
This thesis examines the challenges of information-theoretic secret communication that exploits the ...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
8 pages, Presented at the Forty-Eighth Annual Allerton Conference on Communication, Control, and Com...
Abstract—We study information-theoretic security for discrete memoryless interference and broadcast ...
Abstract—We study the secrecy capacity of fast fading channels under imperfect main channel (between...
We establish upper and lower bounds on the secrecy capacity of the degraded Gaussian diamond-wiretap...
In this paper, we investigate the effects of an additional trusted relay node on the secrecy of mult...
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple antennas at t...
We study the capacity of a class of state-controlled relay channels with orthogonal channels from th...
Secure transmission of information over wireless channels in the presence of an eavesdropper has att...
We investigate the effects of an additional relay node on the secrecy of broadcast channels by consi...
International audienceWe investigate the problem of secure communication over parallel relay channel...
We investigate the problem of secure communication over parallel relay channel in the presence of a ...
We study the security of communication between a single transmitter and many receivers in the presen...
We study a four terminal parallel relay-eavesdropper channel which consists of multiple independent ...
This thesis examines the challenges of information-theoretic secret communication that exploits the ...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
8 pages, Presented at the Forty-Eighth Annual Allerton Conference on Communication, Control, and Com...
Abstract—We study information-theoretic security for discrete memoryless interference and broadcast ...
Abstract—We study the secrecy capacity of fast fading channels under imperfect main channel (between...
We establish upper and lower bounds on the secrecy capacity of the degraded Gaussian diamond-wiretap...
In this paper, we investigate the effects of an additional trusted relay node on the secrecy of mult...
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple antennas at t...
We study the capacity of a class of state-controlled relay channels with orthogonal channels from th...
Secure transmission of information over wireless channels in the presence of an eavesdropper has att...