Publications

189 result(s)

Journal papers

On Block Security of Regenerating Codes at the MBR Point for Distributed Storage Systems
Dau S. H, Song W, Yuen C, 2014, “On Block Security of Regenerating Codes at the MBR Point for Distributed Storage Systems,” IEEE International Symposium on Information Theory (IEEE ISIT)

Journal papers

On Simple Multiple Access Networks
Dau S. H, Song W, Yuen C, 2014, “On Simple Multiple Access Networks,” IEEE Journal on Selected Topics in Communications

Conference papers/presentations

On the Existence of MDS Codes Over Small Fields With Constrained Generator Matrices
Yuen C, 2014, “On the Existence of MDS Codes Over Small Fields With Constrained Generator Matrices,” IEEE International Symposium on Information Theory (IEEE ISIT)

Conference papers/presentations

On the Secrecy Outage Capacity of Physical Layer Security in Large-Scale MIMO Relaying Systems with Imperfect CSI
Chen X, Lei L, Zhang H, Yuen C, 2014, “On the Secrecy Outage Capacity of Physical Layer Security in Large-Scale MIMO Relaying Systems with Imperfect CSI,” IEEE International Conference on Communications (IEEE ICC)

Journal papers

Physical-layer secret key generation with untrusted relays
C.D. T. Thai, J. Lee, C. Cheng, and T. Q. S. Quek, 2014, “Physical-layer secret key generation with untrusted relays” in Proc. IEEE Global Commun. Conf, Workshop on Trusted Communications with Physical Layer Security, Austin, TX, pp. 1–6

Conference papers/presentations

Practical Analysis Framework for Software-based Attestation Scheme
Li L, Jun S, Liu Y, Dong J. S, 2014, “Practical Analysis Framework for Software-based Attestation Scheme.” 16th International Conference on Formal Engineering Methods (ICFEM)

Journal papers

Secure communication via jamming in massive MIMO Rician channels
J. Wang, J. Lee, F. Wang, and T. Q. S. Quek, 2014, “Secure communication via jamming in massive MIMO Rician channels” in Proc. IEEE Global Commun. Conf, Workshop on Massive MIMO: From theory to practice, Austin, TX, pp. 1–6

Journal papers

Symbolic Analysis of an Electric Vehicle Charging Protocol
Li L, Pang J, Liu Y, Jun S, Dong J. S, 2014, “Symbolic Analysis of an Electric Vehicle Charging Protocol.” ICECCS 2014: 11-18

Journal papers

TAuth: Verifying Timed Security Protocols
Li L, Jun S, Liu Y, Dong J. S, 2014, “TAuth: Verifying Timed Security Protocols.” ICFEM 2014: 300-315