[图书][B] Lattice Coding for Signals and Networks: A Structured Coding Approach to Quantization, Modulation, and Multiuser Information Theory

R Zamir - 2014 - books.google.com
Unifying information theory and digital communication through the language of lattice codes,
this book provides a detailed overview for students, researchers and industry practitioners. It …

Providing secrecy with structured codes: Two-user Gaussian channels

X He, A Yener - IEEE Transactions on Information Theory, 2014 - ieeexplore.ieee.org
Recent results have shown that structured codes can be used to construct good channel
codes, source codes, and physical layer network codes for Gaussian channels. For …

The magic of superposition: A survey on simultaneous transmission based wireless systems

U Altun, GK Kurt, E Ozdemir - IEEE Access, 2022 - ieeexplore.ieee.org
In conventional communication systems, any interference between two communicating
points is regarded as unwanted noise since it distorts the received signals. On the other …

Multi-terminal two-hop untrusted-relay networks with hierarchical security guarantees

AA Zewail, A Yener - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
We consider a two-source two-destination two-hop relay network, where all data
communication must be kept secret from the relay node. The model considered is the …

The two-hop interference untrusted-relay channel with confidential messages

AA Zewail, A Yener - 2015 IEEE Information Theory Workshop …, 2015 - ieeexplore.ieee.org
This paper considers the two-user interference relay channel where each source wishes to
communicate to its destination a message that is confidential from the other destination …

Two-hop untrusted relay channel with an external eavesdropper under layered secrecy constraints

AA Zewail, A Yener - 2016 IEEE Global Communications …, 2016 - ieeexplore.ieee.org
We consider a Gaussian network consisting of a source that aims to communicate to its
legitimate destination via an untrusted relay node in the presence of an external …

On the security of lattice-based physical-layer network coding against wiretap attacks

V Forutan, RFH Fischer - SCC 2015; 10th International ITG …, 2015 - ieeexplore.ieee.org
We consider Gaussian-channel networks that employ lattice-based physical-layer network
coding (PNC) as their routing strategy. Under the assumption that the communication is …

Achieving perfect secrecy capacity of an asymmetric bidirectional relay channel

Y Meziti, H Wang - … on Personal, Indoor, and Mobile Radio …, 2017 - ieeexplore.ieee.org
In this paper, we propose a perfectly secure transmission scheme for an asymmetric
bidirectional relay channel. The scheme is based on nested lattice coding with keys …

[图书][B] Secrecy Guarantees in Emerging Networks

AA Zewail - 2019 - search.proquest.com
Traditional network resources management will be insufficient to handle the expected
increase in the demand for high rate services. New communication techniques, eg, ad-hoc …

[PDF][PDF] Lattice Codes for Secure Communication and Secret Key Generation

S Vatedka, N Kashyap - 2016 - eecs.iisc.ac.in
Lattices and Lattice Codes• v1, v2,..., vn a basis for R n. Then, Λ={∑ ni= 1 ai vi: ai∈ Z} is a
lattice.• Lattice code: All lattice points within a shaping region S.• Nested lattices:(Λ, Λ0) …