11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

122 BIBLIOGRAPHY<br />

[33] J.W. Wallace <strong>and</strong> R.K. Sharma, “Automatic Secret Keys From Reciprocal MIMO<br />

<strong>Wireless</strong> Channels: Measurement <strong>and</strong> Analysis,” IEEE Tran. Information Forensics<br />

<strong>and</strong> Security, vol. 5, no. 3, pp. 381-391, Sep. 2010.<br />

[34] J. Wallace, “Secure <strong>Physical</strong> Layer Key Generation Schemes: Performance amd Information<br />

Theoretic Limits,” IEEE Int. Conf. Communications, Dresden, Jun. 2009.<br />

[35] K. Bhattad <strong>and</strong> K.R. Narayanan, “Weakly Secure <strong>Network</strong> <strong>Coding</strong>,” in Proc. NetCod<br />

2005, Riva del Garda, Apr. 2005.<br />

[36] K. Hassan <strong>and</strong> W. Henkel, “UEP MIMO-OFDM with Beamforming-Combining for<br />

Imperfect Channel Information,” OFDM-Workshop 2007, Hamburg, Aug. 2007.<br />

[37] K. Hassan <strong>and</strong> W. Henkel, “UEP with Eigen Beamforming for Partial Channel Information<br />

MIMO-OFDM,” 2007 IEEE Sarnoff Symposium, Princeton, Apr.-May 2007.<br />

[38] L.H. Ozarow <strong>and</strong> A.D. Wyner, “Wire-Tap Channel II,” AT&T Bell Laboratories<br />

technical journal, vol. 63, no. 10, pp. 2135-2157, 1984.<br />

[39] L.M. Ausubel, “An Efficient Ascending-bid Auction for Multiple Objects,” The<br />

American Economic Review, vol. 94, no. 5, pp. 1452-1475, Dec. 2004.<br />

[40] L. Rizzo, “Effective Erasure Codes for Reliable Computer Communication Protocols,”<br />

Computer Communication Review, Apr. 1997.<br />

[41] L. Sassatelli, W. Henkel, <strong>and</strong> D. Declercq, “Check-Irregular LDPC Codes for Unequal<br />

Error Protection under Iterative Decoding,” 4th Int. Symp. Turbo Codes & Related<br />

Topics in connection with the 6th Int. ITG-Conf. on Source <strong>and</strong> Channel <strong>Coding</strong>,<br />

Munich, April 4-7, 2006.<br />

[42] M. Bloch, J. Barros, M.R.D. Rodrigues, <strong>and</strong> S.W. McLaughlin, “<strong>Wireless</strong><br />

Information-Theoretic Security,” IEEE Trans. Information Theory, vol. 54, no. 6,<br />

pp. 2515-2534, Jun. 2008.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!