2018
Big Data Meet Cyber-Physical Systems: A Panoramic Survey.
IEEE Access, 2018
A Simple Relaxation Scheme for Polar Codes.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018
A Polar Code Hybrid Rate Matching Scheme.
Proceedings of the 2018 European Conference on Networks and Communications, 2018
2012
Secret Key and Private Key Constructions for Simple Multiterminal Source Models.
IEEE Trans. Inf. Theory, 2012
Performance Analysis of Different Types of Sensor Networks for Cognitive Radios.
J. Electr. Comput. Eng., 2012
Preliminary performance evaluation of sensor network with intermediate fusion helper for cognitive radios.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012
2010
Exploiting the physical layer for enhanced security.
IEEE Wirel. Commun., 2010
Secret Key Generation for a Pairwise Independent Network Model.
IEEE Trans. Inf. Theory, 2010
Information-theoretically secret key generation for fading wireless channels.
IEEE Trans. Inf. Forensics Secur., 2010
Performance Analysis of Exponential Increase Exponential Decrease Back-Off Algorithm.
Proceedings of the Global Communications Conference, 2010
PHY-Authentication Protocol for Spoofing Detection in Wireless Networks.
Proceedings of the Global Communications Conference, 2010
A simple secret key construction system for broadcasting model.
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010
2009
Perfect secrecy, perfect omniscience and steiner tree packing.
Proceedings of the IEEE International Symposium on Information Theory, 2009
2008
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel.
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008
Common Randomness, Multiuser Secrecy and Tree Packing.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008
2007
On the Secrecy Capabilities of ITU Channels.
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007
Group Secret Key Generation Algorithms.
Proceedings of the IEEE International Symposium on Information Theory, 2007
2006
Extracting Secrecy from Jointly Gaussian Random Variables.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
2005
Information Theoretic Generation of Multiple Secret Keys.
PhD thesis, 2005
The secret key~private key capacity region for three terminals.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
2004
The private key capacity region for three terminals.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
2002
A simple upper bound on the redundancy of Huffman codes.
IEEE Trans. Inf. Theory, 2002
2001
Some basic properties of fix-free codes.
IEEE Trans. Inf. Theory, 2001