Bases bibliographiques Pascal et Francis

Aide

Résultats de votre recherche

Votre recherche

cc.\*:("001D04B02C")

Type de document [dt]

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Année de publication [py]

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Discipline (document) [di]

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Langue

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Pays auteur

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Résultats 1 à 25 sur 684

  • Page / 28
Export

Sélection :

  • et

A High Data Rate Wireless Communication System With Improved Secrecy: Full Duplex BeamformingCEPHELI, Özge; TEDIK, Semiha; KURT, Güneş Karabulut et al.IEEE communications letters. 2014, Vol 18, Num 6, pp 1075-1078, issn 1089-7798, 4 p.Article

Joint Beamforming and User Selection in Multicast Downlink Channel under Secrecy-Outage ConstraintXIN LIU; FEIFEI GAO; GONGPU WANG et al.IEEE communications letters. 2014, Vol 18, Num 1, pp 82-85, issn 1089-7798, 4 p.Article

Joint Cooperative Beamforming and Artificial Noise Design for Secrecy Sum Rate Maximization in Two-Way AF Relay NetworksMEILU LIN; JIANHUA GE; YE YANG et al.IEEE communications letters. 2014, Vol 18, Num 2, pp 380-383, issn 1089-7798, 4 p.Article

Multiterminal Secret Key AgreementCHUNG CHAN; LIZHONG ZHENG.IEEE transactions on information theory. 2014, Vol 60, Num 6, pp 3379-3412, issn 0018-9448, 34 p.Article

Orthogonal curved-line Gabor filter for fast fingerprint enhancementYUAN MEI; BO ZHAO; YU ZHOU et al.Electronics letters. 2014, Vol 50, Num 3, pp 175-177, issn 0013-5194, 3 p.Article

Some Results Related to the Conjecture by Belfiore and SoléERNVALL-HYTÖNEN, Anne-Maria.IEEE transactions on information theory. 2014, Vol 60, Num 5, pp 2805-2812, issn 0018-9448, 8 p.Article

Wirelessly lockpicking a smart card readerGARCIA, Flavio D; GANS, Gerhard de Koning; VERDULT, Roel et al.International journal of information security (Print). 2014, Vol 13, Num 5, pp 403-420, issn 1615-5262, 18 p.Article

Steganalysis of prediction mode modulated data-hiding algorithms in H.264/AVC video streamSONGBIN LI; HAOJIANG DENG; HUI TIAN et al.Annales des télécommunications. 2014, Vol 69, Num 7-8, pp 461-473, issn 0003-4347, 13 p.Article

Anti-collusive self-healing key distributions for wireless networksDUTTA, Ratna.International journal of wireless and mobile computing (Print). 2014, Vol 7, Num 4, pp 362-377, issn 1741-1084, 16 p.Article

Communication With Disturbance ConstraintsBANDEMER, Bernd; EL GAMAL, Abbas.IEEE transactions on information theory. 2014, Vol 60, Num 8, pp 4488-4502, issn 0018-9448, 15 p.Conference Paper

An Error Probability Approach to MIMO Wiretap ChannelsBELFIORE, Jean-Claude; OGGIER, Frédérique.IEEE transactions on communications. 2013, Vol 61, Num 8, pp 3396-3403, issn 0090-6778, 8 p.Article

FADE: Forwarding Assessment Based Detection of Collaborative Grey Hole Attacks in WMNsQIANG LIU; JIANPING YIN; LEUNG, Victor C. M et al.IEEE transactions on wireless communications. 2013, Vol 12, Num 10, pp 5124-5137, issn 1536-1276, 14 p.Article

How to Make Content Centric Network (CCN) More Robust against DoS/DDoS AttackKIM, Daeyoub; LEE, Jihoon.IEICE transactions on communications. 2013, Vol 96, Num 1, pp 313-316, issn 0916-8516, 4 p.Article

One-to-Many Chaotic Synchronization with Application in Wireless Sensor NetworkLEISHENG JIN; YAN ZHANG; LIJIE LI et al.IEEE communications letters. 2013, Vol 17, Num 9, pp 1782-1785, issn 1089-7798, 4 p.Article

Performance Analysis and Design of Two Edge-Type LDPC Codes for the BEC Wiretap ChannelRATHI, Vishwambhar; ANDERSSON, Mattias; THOBABEN, Ragnar et al.IEEE transactions on information theory. 2013, Vol 59, Num 2, pp 1048-1064, issn 0018-9448, 17 p.Article

Secrecy Outage Capacity of Fading ChannelsGUNGOR, Onur; JIAN TAN; KOKSAL, Can Emre et al.IEEE transactions on information theory. 2013, Vol 59, Num 9, pp 5379-5397, issn 0018-9448, 19 p.Article

Secure Communication of the Multi-Antenna Channel Using Cooperative Relaying and JammingHAIYAN XU; QIAN TIAN; JIANHUI WU et al.IEICE transactions on communications. 2013, Vol 96, Num 4, pp 948-955, issn 0916-8516, 8 p.Article

Tight Exponential Analysis of Universally Composable Privacy Amplification and Its ApplicationsHAYASHI, Masahito.IEEE transactions on information theory. 2013, Vol 59, Num 11, pp 7728-7746, issn 0018-9448, 19 p.Article

Truthful Mechanisms for Secure Communication in Wireless Cooperative SystemJUN DENG; RONGQING ZHANG; LINGYANG SONG et al.IEEE transactions on wireless communications. 2013, Vol 12, Num 9, pp 4236-4245, issn 1536-1276, 10 p.Article

Strong Secrecy From Channel ResolvabilityBLOCH, Matthieu R; LANEMAN, J. Nicholas.IEEE transactions on information theory. 2013, Vol 59, Num 12, pp 8077-8098, issn 0018-9448, 22 p.Article

Subscription-Period-Aware Key Management for Secure Vehicular Multicast Communications : VEHICULAR NETWORKS AND COMMUNICATION SYSTEMS: FROM LABORATORY INTO REALITYDONGHYUN JE; CHOI, Yoon-Ho; SEO, Seung-Woo et al.IEEE transactions on vehicular technology. 2013, Vol 62, Num 9, pp 4213-4227, issn 0018-9545, 15 p.Article

The Role of Feedback in Two-Way Secure CommunicationsXIANG HE; YENER, Aylin.IEEE transactions on information theory. 2013, Vol 59, Num 12, pp 8115-8130, issn 0018-9448, 16 p.Article

A Closed-Form Power Allocation for Minimizing Secrecy Outage Probability for MISO Wiretap Channels via Masked BeamformingJUN XIONG; WONG, Kai-Kit; DONGTANG MA et al.IEEE communications letters. 2012, Vol 16, Num 9, pp 1496-1499, issn 1089-7798, 4 p.Article

A framework for avoiding steganography usage over HTTPBLASCO, Jorge; HERNANDEZ-CASTRO, Julio Cesar; DE FUENTES, José Maria et al.Journal of network and computer applications. 2012, Vol 35, Num 1, pp 491-501, issn 1084-8045, 11 p.Article

Batch Verification of Short SignaturesCAMENISCH, Jan; HOHENBERGER, Susan; ØSTERGAARD PEDERSEN, Michael et al.Journal of cryptology. 2012, Vol 25, Num 4, pp 723-747, issn 0933-2790, 25 p.Article

  • Page / 28