We consider reliable and secure communication over intersymbol interference wiretap channels (ISI-WTCs). In particular, we first examine the setup where the source at the input of an ISI-WTC is unconstrained and then, based on a general achievability result for arbitrary wiretap channels, we derive an achievable secure rate for this ISI-WTC. Afterwards, we examine the setup where the source at the input of an ISI-WTC is constrained to be a finite-state machine source (FSMS) of a certain order and structure. Optimizing the parameters of this FSMS toward maximizing the secure rate is a computationally intractable problem in general, and so, toward finding a local maximum, we propose an iterative algorithm that at every iteration replaces the ...
This paper investigates the maximization of the secrecy-achievable rate region for the Gaussian broa...
We propose a low complexity transmit signal design scheme for achieving information-theoretic secrec...
peer reviewedInterference usually is an adverse phenomenon in wireless networks. However, the inter...
The Gaussian wiretap channel with rate-limited help, available at the legitimate receiver (Rx) or/an...
International audienceIn this paper, we investigate the limitations of capacity-based random code co...
PhD ThesisSecure communications between legitimate users have received considerable attention recen...
We design new secure on-off transmission schemes in wiretap channels with outdated channel state in...
We analyze and optimize the secrecy performance of artificial noise (AN) in multi-input single-outp...
It is commonly known that physical layer security is achieved with a trade-off in terms of the achie...
We study secure transmission considering the practical scenario where only outdated knowledge of th...
We consider the MIMO wiretap channel, that is a MIMO broadcast channel where the transmitter sends s...
Despite several works on secrecy coding for fading and MIMO wiretap channels from an error probabili...
Abstract—This paper studies the problem of secure communica-tion over a wiretap channel with...
In this paper, we consider the problem of power allocation in MIMO wiretap channel for secrecy in th...
In this paper, we consider the problem of power allocation in MIMO wiretap channel for secrecy in th...
This paper investigates the maximization of the secrecy-achievable rate region for the Gaussian broa...
We propose a low complexity transmit signal design scheme for achieving information-theoretic secrec...
peer reviewedInterference usually is an adverse phenomenon in wireless networks. However, the inter...
The Gaussian wiretap channel with rate-limited help, available at the legitimate receiver (Rx) or/an...
International audienceIn this paper, we investigate the limitations of capacity-based random code co...
PhD ThesisSecure communications between legitimate users have received considerable attention recen...
We design new secure on-off transmission schemes in wiretap channels with outdated channel state in...
We analyze and optimize the secrecy performance of artificial noise (AN) in multi-input single-outp...
It is commonly known that physical layer security is achieved with a trade-off in terms of the achie...
We study secure transmission considering the practical scenario where only outdated knowledge of th...
We consider the MIMO wiretap channel, that is a MIMO broadcast channel where the transmitter sends s...
Despite several works on secrecy coding for fading and MIMO wiretap channels from an error probabili...
Abstract—This paper studies the problem of secure communica-tion over a wiretap channel with...
In this paper, we consider the problem of power allocation in MIMO wiretap channel for secrecy in th...
In this paper, we consider the problem of power allocation in MIMO wiretap channel for secrecy in th...
This paper investigates the maximization of the secrecy-achievable rate region for the Gaussian broa...
We propose a low complexity transmit signal design scheme for achieving information-theoretic secrec...
peer reviewedInterference usually is an adverse phenomenon in wireless networks. However, the inter...