Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
122 BIBLIOGRAPHY<br />
[33] J.W. Wallace <strong>and</strong> R.K. Sharma, “Automatic Secret Keys From Reciprocal MIMO<br />
<strong>Wireless</strong> Channels: Measurement <strong>and</strong> Analysis,” IEEE Tran. Information Forensics<br />
<strong>and</strong> Security, vol. 5, no. 3, pp. 381-391, Sep. 2010.<br />
[34] J. Wallace, “Secure <strong>Physical</strong> Layer Key Generation Schemes: Performance amd Information<br />
Theoretic Limits,” IEEE Int. Conf. Communications, Dresden, Jun. 2009.<br />
[35] K. Bhattad <strong>and</strong> K.R. Narayanan, “Weakly Secure <strong>Network</strong> <strong>Coding</strong>,” in Proc. NetCod<br />
2005, Riva del Garda, Apr. 2005.<br />
[36] K. Hassan <strong>and</strong> W. Henkel, “UEP MIMO-OFDM with Beamforming-Combining for<br />
Imperfect Channel Information,” OFDM-Workshop 2007, Hamburg, Aug. 2007.<br />
[37] K. Hassan <strong>and</strong> W. Henkel, “UEP with Eigen Beamforming for Partial Channel Information<br />
MIMO-OFDM,” 2007 IEEE Sarnoff Symposium, Princeton, Apr.-May 2007.<br />
[38] L.H. Ozarow <strong>and</strong> A.D. Wyner, “Wire-Tap Channel II,” AT&T Bell Laboratories<br />
technical journal, vol. 63, no. 10, pp. 2135-2157, 1984.<br />
[39] L.M. Ausubel, “An Efficient Ascending-bid Auction for Multiple Objects,” The<br />
American Economic Review, vol. 94, no. 5, pp. 1452-1475, Dec. 2004.<br />
[40] L. Rizzo, “Effective Erasure Codes for Reliable Computer Communication Protocols,”<br />
Computer Communication Review, Apr. 1997.<br />
[41] L. Sassatelli, W. Henkel, <strong>and</strong> D. Declercq, “Check-Irregular LDPC Codes for Unequal<br />
Error Protection under Iterative Decoding,” 4th Int. Symp. Turbo Codes & Related<br />
Topics in connection with the 6th Int. ITG-Conf. on Source <strong>and</strong> Channel <strong>Coding</strong>,<br />
Munich, April 4-7, 2006.<br />
[42] M. Bloch, J. Barros, M.R.D. Rodrigues, <strong>and</strong> S.W. McLaughlin, “<strong>Wireless</strong><br />
Information-Theoretic Security,” IEEE Trans. Information Theory, vol. 54, no. 6,<br />
pp. 2515-2534, Jun. 2008.