共 22 条
- [1] Massey J.L., An introduction to contemporary cryptology, Proceedings of the IEEE, 76, 5, pp. 533-549, (1988)
- [2] Schneier B., Cryptographic design vulnerabilities, Computer, 31, 9, pp. 29-33, (1998)
- [3] Shannon C.E., Communication theory of secrecy systems, Bell System Technical Journal, 28, 4, pp. 656-715, (1949)
- [4] Wyner A.D., The wire-tap channel, Bell System Technical Journal, 54, 8, pp. 1355-1387, (1975)
- [5] Leung-Yan-Cheong S., Hellman M.E., The Gaussian wire-tap channel, Information Theory, IEEE Transactions on, 24, 4, pp. 451-456, (1978)
- [6] Csiszar I., Korner J., Broadcast channels with confidential messages, Information Theory, IEEE Transactions on, 24, 3, pp. 339-348, (1978)
- [7] Li Z., Yates R., Trappe W., Secret communication with a fading eavesdropper channel, Information Theory, 2007. ISIT 2007. IEEE International Symposium on, pp. 1296-1300, (2007)
- [8] Li Z., Yates R., Trappe W., Secrecy capacity of independent parallel channels, Proceedings of Proc. 44th Annu. Allerton Conf., pp. 841-848, (2006)
- [9] Hero A.O., Secure space-time communication, Information Theory, IEEE Transactions on, 49, 12, pp. 3235-3249, (2003)
- [10] Pei Y., Liang Y.C., Teh K.C., Et al., Secure communication in multiantenna cognitive radio networks with imperfect channel state information, Signal Processing, IEEE Transactions on, 59, 4, pp. 1683-1693, (2011)