Publications
Filters
189 result(s)
Journal papers
On Block Security of Regenerating Codes at the MBR Point for Distributed Storage Systems
Dau S. H, Song W, Yuen C, 2014, “On Block Security of Regenerating Codes at the MBR Point for Distributed Storage Systems,” IEEE International Symposium on Information Theory (IEEE ISIT)
Journal papers
On Simple Multiple Access Networks
Dau S. H, Song W, Yuen C, 2014, “On Simple Multiple Access Networks,” IEEE Journal on Selected Topics in Communications
Conference papers/presentations
On the Existence of MDS Codes Over Small Fields With Constrained Generator Matrices
Yuen C, 2014, “On the Existence of MDS Codes Over Small Fields With Constrained Generator Matrices,” IEEE International Symposium on Information Theory (IEEE ISIT)
Conference papers/presentations
On the Secrecy Outage Capacity of Physical Layer Security in Large-Scale MIMO Relaying Systems with Imperfect CSI
Chen X, Lei L, Zhang H, Yuen C, 2014, “On the Secrecy Outage Capacity of Physical Layer Security in Large-Scale MIMO Relaying Systems with Imperfect CSI,” IEEE International Conference on Communications (IEEE ICC)
Journal papers
Physical-layer secret key generation with untrusted relays
C.D. T. Thai, J. Lee, C. Cheng, and T. Q. S. Quek, 2014, “Physical-layer secret key generation with untrusted relays” in Proc. IEEE Global Commun. Conf, Workshop on Trusted Communications with Physical Layer Security, Austin, TX, pp. 1–6
Conference papers/presentations
Practical Analysis Framework for Software-based Attestation Scheme
Li L, Jun S, Liu Y, Dong J. S, 2014, “Practical Analysis Framework for Software-based Attestation Scheme.” 16th International Conference on Formal Engineering Methods (ICFEM)
Journal papers
Secure communication via jamming in massive MIMO Rician channels
J. Wang, J. Lee, F. Wang, and T. Q. S. Quek, 2014, “Secure communication via jamming in massive MIMO Rician channels” in Proc. IEEE Global Commun. Conf, Workshop on Massive MIMO: From theory to practice, Austin, TX, pp. 1–6
Journal papers
Symbolic Analysis of an Electric Vehicle Charging Protocol
Li L, Pang J, Liu Y, Jun S, Dong J. S, 2014, “Symbolic Analysis of an Electric Vehicle Charging Protocol.” ICECCS 2014: 11-18
Journal papers
TAuth: Verifying Timed Security Protocols
Li L, Jun S, Liu Y, Dong J. S, 2014, “TAuth: Verifying Timed Security Protocols.” ICFEM 2014: 300-315