ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Physical Layer Secured Polar Codes with Optimal Jamming Position
2020 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET)
◽
10.1109/wispnet48689.2020.9198631
◽
2020
◽
Author(s):
S. Devi
◽
V.N. Senthil Kumaran
Keyword(s):
Physical Layer
◽
Polar Codes
Download Full-text
Related Documents
Cited By
References
A Physical Layer Encryption Algorithm Based on Length-Compatible Polar Codes
2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall)
◽
10.1109/vtc2020-fall49728.2020.9348518
◽
2020
◽
Author(s):
Xinjin Lu
◽
Jing Lei
◽
Wei Li
Keyword(s):
Physical Layer
◽
Encryption Algorithm
◽
Polar Codes
◽
Physical Layer Encryption
Download Full-text
Artificial noise aided polar codes for physical layer security
China Communications
◽
10.1109/cc.2017.8246334
◽
2017
◽
Vol 14
(12)
◽
pp. 15-24
◽
Cited By ~ 4
Author(s):
Huiqing Bai
◽
Liang Jin
◽
Ming Yi
Keyword(s):
Physical Layer Security
◽
Physical Layer
◽
Artificial Noise
◽
Polar Codes
Download Full-text
Physical Layer Encryption Algorithm Based on Polar Codes and Chaotic Sequences
IEEE Access
◽
10.1109/access.2018.2888883
◽
2019
◽
Vol 7
◽
pp. 4380-4390
◽
Cited By ~ 4
Author(s):
Xinjin Lu
◽
Jing Lei
◽
Wei Li
◽
Ke Lai
◽
Zhipeng Pan
Keyword(s):
Physical Layer
◽
Encryption Algorithm
◽
Polar Codes
◽
Chaotic Sequences
◽
Physical Layer Encryption
Download Full-text
A Physical Layer Encryption Algorithm Based on Partial Frozen Bits of Polar Codes and AES Encrypter
2019 9th International Conference on Information Science and Technology (ICIST)
◽
10.1109/icist.2019.8836782
◽
2019
◽
Author(s):
Xinjin Lu
◽
Wei Li
◽
Jing Lei
◽
Yuxin Shi
Keyword(s):
Physical Layer
◽
Encryption Algorithm
◽
Polar Codes
◽
Physical Layer Encryption
Download Full-text
Construction of Polar Codes Combined with Physical Layer Security on Impulsive Noise Channels
2018 IEEE 18th International Conference on Communication Technology (ICCT)
◽
10.1109/icct.2018.8600020
◽
2018
◽
Cited By ~ 1
Author(s):
Huan Cao
◽
Zhen Mei
◽
Martin Johnston
◽
Stephane Le Goff
Keyword(s):
Physical Layer Security
◽
Impulsive Noise
◽
Physical Layer
◽
Polar Codes
Download Full-text
Physical layer encryption scheme using finite-length polar codes
IET Communications
◽
10.1049/iet-com.2014.0933
◽
2015
◽
Vol 9
(15)
◽
pp. 1857-1866
◽
Cited By ~ 8
Author(s):
Reza Hooshmand
◽
Taraneh Eghlidos
◽
Mohammad Reza Aref
Keyword(s):
Finite Length
◽
Physical Layer
◽
Polar Codes
◽
Encryption Scheme
◽
Physical Layer Encryption
Download Full-text
A Joint Physical Layer Encryption and PAPR Reduction Scheme Based on Polar Codes and Chaotic Sequences in OFDM System
IEEE Access
◽
10.1109/access.2019.2919598
◽
2019
◽
Vol 7
◽
pp. 73036-73045
◽
Cited By ~ 2
Author(s):
Xinjin Lu
◽
Yuxin Shi
◽
Wei Li
◽
Jing Lei
◽
Zhipeng Pan
Keyword(s):
Physical Layer
◽
Papr Reduction
◽
Polar Codes
◽
Reduction Scheme
◽
Ofdm System
◽
Chaotic Sequences
◽
Physical Layer Encryption
Download Full-text
A physical-layer secure coding schcme for visible light communication based on polar codes
2017 Conference on Lasers and Electro-Optics Pacific Rim (CLEO-PR)
◽
10.1109/cleopr.2017.8118883
◽
2017
◽
Cited By ~ 2
Author(s):
Zhen Che
◽
Junbin Fang
◽
Zoe Lin Jiang
◽
Xiaolong Yu
◽
Guikai Xi
◽
...
Keyword(s):
Visible Light
◽
Visible Light Communication
◽
Physical Layer
◽
Polar Codes
◽
Secure Coding
Download Full-text
A Physical-Layer Secure Coding Scheme for Indoor Visible Light Communication Based on Polar Codes
IEEE Photonics Journal
◽
10.1109/jphot.2018.2869931
◽
2018
◽
Vol 10
(5)
◽
pp. 1-13
◽
Cited By ~ 11
Author(s):
Zhen Che
◽
Junbin Fang
◽
Zoe Lin Jiang
◽
Jin Li
◽
Shancheng Zhao
◽
...
Keyword(s):
Visible Light
◽
Visible Light Communication
◽
Physical Layer
◽
Polar Codes
◽
Coding Scheme
◽
Secure Coding
Download Full-text
Wireless Physical Layer Network Coding
10.1017/9781316156162
◽
2018
◽
Cited By ~ 3
Author(s):
Jan Sykora
◽
Alister Burr
Keyword(s):
Network Coding
◽
Physical Layer
◽
Physical Layer Network Coding
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close