Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Schaefer, Rafael F.
Amarasuriya, Gayan
and
Poor, H. Vincent
2017.
Physical layer security in massive MIMO systems.
p.
3.
Schaefer, Rafael F.
Khisti, Ashish
and
Poor, H. Vincent
2018.
Secure Broadcasting Using Independent Secret Keys.
IEEE Transactions on Communications,
Vol. 66,
Issue. 2,
p.
644.
Tavangaran, Nima
Schaefer, Rafael F.
Poor, H. Vincent
and
Boche, Holger
2018.
Secret-Key Generation and Convexity of the Rate Region Using Infinite Compound Sources.
IEEE Transactions on Information Forensics and Security,
Vol. 13,
Issue. 8,
p.
2075.
Timilsina, Santosh
Aruma Baduge, Gayan Amarasuriya
and
Schaefer, Rafael F.
2018.
Secure Communication in Spectrum-Sharing Massive MIMO Systems With Active Eavesdropping.
IEEE Transactions on Cognitive Communications and Networking,
Vol. 4,
Issue. 2,
p.
390.
Boche, Holger
Schaefer, Rafael F.
and
Poor, H. Vincent
2018.
Performance Evaluation of Secure Communication Systems on Turing Machines.
p.
1.
Mansour, Ahmed S.
Boche, Holger
and
Schaefer, Rafael F.
2018.
Secrecy Capacity Under List Decoding For A Channel with A Passive Eavesdropper and an Active Jammer.
p.
1972.
Boche, Holger
Schaefer, Rafael F.
Baur, Sebastian
and
Poor, H. Vincent
2019.
On the Algorithmic Computability of the Secret Key and Authentication Capacity Under Channel, Storage, and Privacy Leakage Constraints.
IEEE Transactions on Signal Processing,
Vol. 67,
Issue. 17,
p.
4636.
Baur, Sebastian
Deppe, Christian
and
Boche, Holger
2019.
Secure Storage for Identification; Random Resources and Privacy Leakage.
IEEE Transactions on Information Forensics and Security,
Vol. 14,
Issue. 8,
p.
2013.
Schaefer, Rafael F.
Boche, Holger
and
Poor, H. Vincent
2019.
Turing Meets Shannon: On the Algorithmic Computability of the Capacities of Secure Communication Systems (Invited Paper).
p.
1.
Boche, Holger
Schaefer, Rafael F.
and
Vincent Poor, H.
2019.
On the Computability of the Secret Key Capacity under Rate Constraints.
p.
2427.
Alferov, V. P.
Drovnikova, I. G.
Obukhova, L. A.
and
Rogozin, E. A.
2019.
VERBAL MODEL OF MANAGEMENT OF A VULNERABLE PROCESS OF DEDICATING THE ACCESS OF USERS TO THE SOFTWARE OF THE ELECTRONIC DOCUMENT SYSTEM.
Herald of Dagestan State Technical University. Technical Sciences,
Vol. 46,
Issue. 2,
p.
37.
Endo, Hiroyuki
Fujiwara, Mikio
Kitamura, Mitsuo
Tsuzuki, Orie
Shimizu, Ryosuke
Takeoka, Masahiro
Sasaki, Masahide
Stein, Karin U.
and
Gladysz, Szymon
2019.
Free-space optical secret key agreement with post-selection based on channel state information.
p.
20.
Zhao, Bing-Qing
Wang, Hui-Ming
and
Liu, Peng
2020.
Safeguarding RFID Wireless Communication Against Proactive Eavesdropping.
IEEE Internet of Things Journal,
Vol. 7,
Issue. 12,
p.
11587.
Boche, Holger
Schaefer, Rafael F.
and
Poor, H. Vincent
2020.
Denial-of-Service Attacks on Communication Systems: Detectability and Jammer Knowledge.
IEEE Transactions on Signal Processing,
Vol. 68,
Issue. ,
p.
3754.
Zhao, Bing-Qing
Wang, Hui-Ming
and
Jiang, Jia-Cheng
2020.
Safeguarding Backscatter RFID Communication against Proactive Eavesdropping.
p.
1.
Baur, Sebastian
Boche, Holger
Schaefer, Rafael F.
and
Poor, H. Vincent
2020.
Secure Storage Capacity Under Rate Constraints—Continuity and Super Activation.
IEEE Transactions on Information Forensics and Security,
Vol. 15,
Issue. ,
p.
959.
Bitar, Rawad
and
Jaggi, Sidharth
2020.
Communication Efficient Secret Sharing in the Presence of Malicious Adversary.
p.
548.
Boche, Holger
Schaefer, Rafael F.
and
Poor, H. Vincent
2020.
Secure Communication and Identification Systems — Effective Performance Evaluation on Turing Machines.
IEEE Transactions on Information Forensics and Security,
Vol. 15,
Issue. ,
p.
1013.
Amarasuriya, Gayan
Schaefer, Rafael F.
and
Vincent Poor, H.
2020.
Linear Precoder Design for Physical Layer Security via Reconfigurable Intelligent Surfaces.
p.
1.
Fang, Song
and
Zhu, Quanyan
2021.
Fundamental Limits of Obfuscation for Linear Gaussian Dynamical Systems: An Information-Theoretic Approach.
p.
4574.