521 | -- | 522 | Wade Trappe, H. Vincent Poor, Hisato Iwai, Aylin Yener, Paul R. Prucnal, João Barros. Guest Editorial Special Issue on Using the Physical Layer for Securing the Next Generation of Communication Systems |
523 | -- | 531 | Motohiko Isaka, Seiya Kawata. Signal Sets for Secret Key Agreement With Public Discussion Based on Gaussian and Fading Channels |
532 | -- | 540 | Demijan Klinc, Jeongseok Ha, Steven W. McLaughlin, João Barros, Byung-Jae Kwak. LDPC Codes for the Gaussian Wiretap Channel |
541 | -- | 550 | Shun Watanabe, Yasutada Oohama. Secret Key Agreement From Vector Gaussian Sources by Rate Limited Public Communication |
551 | -- | 564 | Chan Wong Wong, Tan F. Wong, John M. Shea. Secret-Sharing LDPC Codes for the BPSK-Constrained Gaussian Wiretap Channel |
565 | -- | 574 | Anurag Agrawal, Zouheir Rezki, Ashish Khisti, Mohamed-Slim Alouini. Noncoherent Capacity of Secret-Key Agreement With Public Discussion |
575 | -- | 584 | Willie K. Harrison, João Almeida, Steven W. McLaughlin, João Barros. Coding for Cryptographic Security Enhancement Using Stopping Sets |
585 | -- | 594 | Arunkumar Subramanian, Andrew Thangaraj, Matthieu R. Bloch, Steven W. McLaughlin. Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes |
595 | -- | 605 | Alexandre J. Pierrot, Matthieu R. Bloch. Strongly Secure Communications Over the Two-Way Wiretap Channel |
606 | -- | 615 | Paul L. Yu, Brian M. Sadler. MIMO Authentication via Deliberate Fingerprinting at the Physical Layer |
616 | -- | 627 | João P. Vilela, Pedro C. Pinto, João Barros. Position-Based Jamming for Enhanced Wireless Secrecy |
628 | -- | 639 | Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar. Secure Wireless Communication and Optimal Power Control Under Statistical Queueing Constraints |
640 | -- | 649 | S. Ali. A. Fakoorian, A. Lee Swindlehurst. MIMO Interference Channel With Confidential Messages: Achievable Secrecy Rates and Precoder Design |
650 | -- | 660 | Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka. Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems |
661 | -- | 671 | Jiang Lei, Zhu Han, Maria Angeles Vázquez-Castro, Are Hjørungnes. Secure Satellite Communication Systems Design With Individual Secrecy Rate Constraints |
672 | -- | 681 | Ashish Khisti, Suhas N. Diggavi, Gregory W. Wornell. Secret-Key Agreement With Channel State Information at the Transmitter |
682 | -- | 692 | Yingbin Liang, H. Vincent Poor, Lei Ying. Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization |
693 | -- | 702 | Xiaowei Wang, Meixia Tao, Jianhua Mo, Youyun Xu. Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks |
703 | -- | 711 | Mari Kobayashi, Pablo Piantanida, Sheng Yang, Shlomo Shamai. On the Secrecy Degrees of Freedom of the Multiantenna Block Fading Wiretap Channels |
712 | -- | 724 | Satashu Goel, Vaneet Aggarwal, Aylin Yener, A. Robert Calderbank. The Effect of Eavesdroppers on Network Connectivity: A Secrecy Graph Approach |
725 | -- | 736 | Mable P. Fok, Zhenxing Wang, Zhexing Deng, Paul R. Prucnal. Optical Layer Security in Fiber-Optic Networks |
737 | -- | 751 | Yara Abdallah, Mohamed Abdel Latif, Moustafa Youssef, Ahmed Sultan, Hesham El Gamal. Keys Through ARQ: Theory and Practice |
752 | -- | 762 | Suhas Mathur, Wade Trappe. BIT-TRAPS: Building Information-Theoretic Traffic Privacy Into Packet Streams |
763 | -- | 774 | Hyoungsuk Jeon, Daesung Hwang, Jinho Choi 0001, Hyuckjae Lee, Jeongseok Ha. Secure Type-Based Multiple Access |
775 | -- | 790 | Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref, Jovan Dj. Golic. Key Agreement Over Multiple Access Channel |
791 | -- | 802 | Neal Patwari, Joey Wilson. Spatial Models for Human Motion-Induced Signal Strength Variance on Static Links |
803 | -- | 817 | Ehsan Vahedi, Vahid Shah-Mansouri, Vincent W. S. Wong, Ian F. Blake, Rabab K. Ward. Probabilistic Analysis of Blocking Attack in RFID Systems |
818 | -- | 830 | Melda Yuksel, Xi Liu, Elza Erkip. A Secure Communication Game With a Relay Helping the Eavesdropper |
831 | -- | 842 | Yongle Wu, K. J. Ray Liu. An Information Secrecy Game in Cognitive Radio Networks |
843 | -- | 852 | Saurabh U. Pawar, John F. Doherty. Modulation Recognition in Continuous Phase Modulation Using Approximate Entropy |
853 | -- | 860 | Vinay Uday Prabhu, Miguel R. D. Rodrigues. On Wireless Channels With varepsilon-Outage Secrecy Capacity |
861 | -- | 867 | Jiangyuan Li, Athina P. Petropulu. Ergodic Secrecy Rate for Multiple-Antenna Wiretap Channels With Rician Fading |