Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Schaefer, Rafael F.
Amarasuriya, Gayan
and
Poor, H. Vincent
2017.
Physical layer security in massive MIMO systems.
p.
3.
Al-Hraishawi, Hayder
Baduge, Gayan
and
Schaefer, Rafael
2017.
Artificial Noise-Aided Physical Layer Security in Underlay Cognitive Massive MIMO Systems with Pilot Contamination.
Entropy,
Vol. 19,
Issue. 7,
p.
349.
Grigorescu, Andrea
Boche, Holger
and
Schaefer, Rafael
2017.
Robust Biometric Authentication from an Information Theoretic Perspective.
Entropy,
Vol. 19,
Issue. 9,
p.
480.
Schaefer, Rafael F.
Khisti, Ashish
and
Poor, H. Vincent
2018.
Secure Broadcasting Using Independent Secret Keys.
IEEE Transactions on Communications,
Vol. 66,
Issue. 2,
p.
644.
Baur, Sebastian
and
Boche, Holger
2018.
Robust Secure Authentication and Data Storage with Perfect Secrecy.
Cryptography,
Vol. 2,
Issue. 2,
p.
8.
Tavangaran, Nima
Schaefer, Rafael F.
Poor, H. Vincent
and
Boche, Holger
2018.
Secret-Key Generation and Convexity of the Rate Region Using Infinite Compound Sources.
IEEE Transactions on Information Forensics and Security,
Vol. 13,
Issue. 8,
p.
2075.
Mansour, Ahmed S.
Boche, Holger
and
Schaefer, Rafael F.
2018.
Secrecy Capacity Under List Decoding For A Channel with A Passive Eavesdropper and an Active Jammer.
p.
1972.
Boche, Holger
Schaefer, Rafael F.
and
Poor, H. Vincent
2018.
Performance Evaluation of Secure Communication Systems on Turing Machines.
p.
1.
Timilsina, Santosh
Aruma Baduge, Gayan Amarasuriya
and
Schaefer, Rafael F.
2018.
Secure Communication in Spectrum-Sharing Massive MIMO Systems With Active Eavesdropping.
IEEE Transactions on Cognitive Communications and Networking,
Vol. 4,
Issue. 2,
p.
390.
Boche, Holger
Schaefer, Rafael F.
and
Vincent Poor, H.
2019.
On the Computability of the Secret Key Capacity under Rate Constraints.
p.
2427.
Baur, Sebastian
Deppe, Christian
and
Boche, Holger
2019.
Secure Storage for Identification; Random Resources and Privacy Leakage.
IEEE Transactions on Information Forensics and Security,
Vol. 14,
Issue. 8,
p.
2013.
Alferov, V. P.
Drovnikova, I. G.
Obukhova, L. A.
and
Rogozin, E. A.
2019.
VERBAL MODEL OF MANAGEMENT OF A VULNERABLE PROCESS OF DEDICATING THE ACCESS OF USERS TO THE SOFTWARE OF THE ELECTRONIC DOCUMENT SYSTEM.
Herald of Dagestan State Technical University. Technical Sciences,
Vol. 46,
Issue. 2,
p.
37.
Boche, Holger
Schaefer, Rafael F.
Baur, Sebastian
and
Poor, H. Vincent
2019.
On the Algorithmic Computability of the Secret Key and Authentication Capacity Under Channel, Storage, and Privacy Leakage Constraints.
IEEE Transactions on Signal Processing,
Vol. 67,
Issue. 17,
p.
4636.
Endo, Hiroyuki
Fujiwara, Mikio
Kitamura, Mitsuo
Tsuzuki, Orie
Shimizu, Ryosuke
Takeoka, Masahiro
Sasaki, Masahide
Stein, Karin U.
and
Gladysz, Szymon
2019.
Free-space optical secret key agreement with post-selection based on channel state information.
p.
20.
Schaefer, Rafael F.
Boche, Holger
and
Poor, H. Vincent
2019.
Turing Meets Shannon: On the Algorithmic Computability of the Capacities of Secure Communication Systems (Invited Paper).
p.
1.
Bitar, Rawad
and
Jaggi, Sidharth
2020.
Communication Efficient Secret Sharing in the Presence of Malicious Adversary.
p.
548.
Boche, Holger
Schaefer, Rafael F.
and
Poor, H. Vincent
2020.
Denial-of-Service Attacks on Communication Systems: Detectability and Jammer Knowledge.
IEEE Transactions on Signal Processing,
Vol. 68,
Issue. ,
p.
3754.
Zhao, Bing-Qing
Wang, Hui-Ming
and
Jiang, Jia-Cheng
2020.
Safeguarding Backscatter RFID Communication against Proactive Eavesdropping.
p.
1.
Zhao, Bing-Qing
Wang, Hui-Ming
and
Liu, Peng
2020.
Safeguarding RFID Wireless Communication Against Proactive Eavesdropping.
IEEE Internet of Things Journal,
Vol. 7,
Issue. 12,
p.
11587.
Amarasuriya, Gayan
Schaefer, Rafael F.
and
Vincent Poor, H.
2020.
Linear Precoder Design for Physical Layer Security via Reconfigurable Intelligent Surfaces.
p.
1.