TY - JOUR AU - Shannon, C. E. PY - 1949 DA - 1949// TI - Communication theory of secrecy systems JO - Bell Systems Technical Journal VL - 29 UR - https://doi.org/10.1002/j.1538-7305.1949.tb00928.x DO - 10.1002/j.1538-7305.1949.tb00928.x ID - Shannon1949 ER - TY - JOUR AU - Wyner, A. D. PY - 1975 DA - 1975// TI - The wire-tap channel JO - Bell Systems Technical Journal VL - 54 UR - https://doi.org/10.1002/j.1538-7305.1975.tb02040.x DO - 10.1002/j.1538-7305.1975.tb02040.x ID - Wyner1975 ER - TY - JOUR AU - Csiszar, I. AU - Korner, J. PY - 1978 DA - 1978// TI - Broadcast channels with confidential messages JO - IEEE Transactions on Information Theory VL - 24 UR - https://doi.org/10.1109/TIT.1978.1055892 DO - 10.1109/TIT.1978.1055892 ID - Csiszar1978 ER - TY - JOUR AU - Leung-Yan-Cheong, S. K. AU - Hellman, M. E. PY - 1978 DA - 1978// TI - The Gaussian wiretap channel JO - IEEE Transactions on Information Theory VL - 24 UR - https://doi.org/10.1109/TIT.1978.1055917 DO - 10.1109/TIT.1978.1055917 ID - Leung-Yan-Cheong1978 ER - TY - JOUR AU - Maurer, U. M. PY - 1993 DA - 1993// TI - Secret key agreement by public discussion from common information JO - IEEE Transactions on Information Theory VL - 39 UR - https://doi.org/10.1109/18.256484 DO - 10.1109/18.256484 ID - Maurer1993 ER - TY - CHAP AU - Maurer, U. M. PY - 1997 DA - 1997// TI - Information-theoretically secure secret-key agreement by NOT authenticated public discussion BT - Advances in Cryptology—EUROCRYPT '97, Lecture Notes in Computer Science PB - Springer CY - Heidelberg, Germany ID - Maurer1997 ER - TY - CHAP AU - Maurer, U. M. PY - 2000 DA - 2000// TI - Information-theoretic key agreement: from weak to strong secrecy for free BT - Advances in Cryptology—EUROCRYPT 2000, Lecture Notes in Computer Science PB - Springer CY - Heidelberg, Germany ID - Maurer2000 ER - TY - JOUR AU - Maurer, U. AU - Wolf, S. PY - 2003 DA - 2003// TI - Secret-key agreement over unauthenticated public channels—part I: definitions and a completeness result JO - IEEE Transactions on Information Theory VL - 49 UR - https://doi.org/10.1109/TIT.2003.809563 DO - 10.1109/TIT.2003.809563 ID - Maurer2003 ER - TY - CHAP AU - Barros, J. AU - Rodrigues, M. R. D. PY - 2006 DA - 2006// TI - Secrecy capacity of wireless channels BT - Proceedings of IEEE International Symposium on Information Theory (ISIT '06) ID - Barros2006 ER - TY - JOUR AU - Bloch, M. AU - Barros, J. AU - Rodrigues, M. R. D. AU - McLaughlin, S. W. PY - 2008 DA - 2008// TI - Wireless information-theoretic security JO - IEEE Transactions on Information Theory VL - 54 UR - https://doi.org/10.1109/TIT.2008.921908 DO - 10.1109/TIT.2008.921908 ID - Bloch2008 ER - TY - CHAP AU - Bloch, M. AU - Thangaraj, A. AU - McLaughlin, S. W. AU - Merolla, J. -. M. PY - 2006 DA - 2006// TI - LDPC-based Gaussian key reconciliation BT - Proceedings of IEEE Information Theory Workshop (ITW '06) ID - Bloch2006 ER - TY - JOUR AU - Richardson, T. J. AU - Shokrollahi, M. A. AU - Urbanke, R. L. PY - 2001 DA - 2001// TI - Design of capacity-approaching irregular low-density parity-check codes JO - IEEE Transactions on Information Theory VL - 47 UR - https://doi.org/10.1109/18.910578 DO - 10.1109/18.910578 ID - Richardson2001 ER - TY - BOOK AU - Rappaport, T. PY - 2001 DA - 2001// TI - Wireless Communications: Principles and Practice PB - Prentice Hall CY - Upper Saddle River, NJ, USA ID - Rappaport2001 ER - TY - BOOK AU - Parsons, J. D. PY - 2000 DA - 2000// TI - The Mobile Radio Propagation Channel PB - Wiley Interscience CY - Hoboken, NJ, USA UR - https://doi.org/10.1002/0470841524 DO - 10.1002/0470841524 ID - Parsons2000 ER - TY - JOUR AU - Özgür, A. AU - Lévêque, O. AU - Preissmann, E. PY - 2007 DA - 2007// TI - Scaling laws for one- and two-dimensional random wireless networks in the low-attenuation regime JO - IEEE Transactions on Information Theory VL - 53 UR - https://doi.org/10.1109/TIT.2007.904979 DO - 10.1109/TIT.2007.904979 ID - Özgür2007 ER - TY - BOOK AU - Seybold, J. PY - 2005 DA - 2005// TI - Introduction to RF Propagation PB - Wiley Interscience CY - Hoboken, NJ, USA UR - https://doi.org/10.1002/0471743690 DO - 10.1002/0471743690 ID - Seybold2005 ER - TY - CHAP AU - Chrysikos, T. AU - Kotsopoulos, S. PY - 2009 DA - 2009// TI - Impact of channel-dependent variation of path loss exponent on Wireless Information-Theoretic Security BT - Wireless Telecommunications Symposium 2009 PB - IEEE Press CY - Prague, Czech Republic UR - https://doi.org/10.1109/WTS.2009.5068993 DO - 10.1109/WTS.2009.5068993 ID - Chrysikos2009 ER - TY - CHAP AU - Chrysikos, T. AU - Dagiuklas, T. AU - Kotsopoulos, S. PY - 2010 DA - 2010// TI - A closed-form expression for outage secrecy capacity in Wireless Information-Theoretic Security BT - Proceedings of Security in Emerging Wireless Communication and Networking Systems (SEWCN '09) UR - https://doi.org/10.1007/978-3-642-11526-4_1 DO - 10.1007/978-3-642-11526-4_1 ID - Chrysikos2010 ER - TY - CHAP AU - Pinto, P. C. AU - Barros, J. AU - Win, M. Z. PY - 2008 DA - 2008// TI - Physical-layer security in stochastic wireless networks BT - Proceedings of 11th IEEE Singapore International Conference on Communication Systems (ICCS '08) ID - Pinto2008 ER - TY - CHAP AU - Pinto, P. C. AU - Barros, J. AU - Win, M. Z. PY - 2009 DA - 2009// TI - Wireless physical-layer security: the case of colluding eavesdroppers BT - Proceedings of IEEE International Symposium on Information Theory (ISIT '09) ID - Pinto2009 ER - TY - CHAP AU - Chrysikos, T. AU - Dagiuklas, T. AU - Kotsopoulos, S. PY - 2010 DA - 2010// TI - Wireless information-theoretic security for moving users in autonomic networks BT - IFIP Wireless Days (WD '10) ID - Chrysikos2010 ER - TY - CHAP AU - Papageorgiou, C. AU - Birkos, K. AU - Dagiuklas, T. AU - Kotsopoulos, S. PY - 2009 DA - 2009// TI - An obstacle-aware human mobility model for ad hoc networks BT - Proceedings of the 17th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS '09) ID - Papageorgiou2009 ER - TY - CHAP AU - Papageorgiou, C. AU - Birkos, K. AU - Dagiuklas, T. AU - Kotsopoulos, S. PY - 2009 DA - 2009// TI - Simulating mission critical mobile ad hoc networks BT - Proceedings of the 4th ACM International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks (PM2HW2N '09) ID - Papageorgiou2009 ER - TY - STD TI - http://www.netstumbler.com/ UR - http://www.netstumbler.com/ ID - ref24 ER - TY - CHAP AU - Chrysikos, T. AU - Georgopoulos, G. AU - Kotsopoulos, S. PY - 2009 DA - 2009// TI - Empirical calculation of shadowing deviation for complex indoor propagation topologies at 2.4 GHz BT - Proceedings of International Conference on Ultra Modern Telecommunications (ICUMT '09) PB - IEEE Press CY - St. Petersburg, Russia ID - Chrysikos2009 ER -