Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Deterministic and Correlated Random Public-Confidential Capacity Regions of the Arbitrarily Varying Wiretap Channel., , and . WIFS, page 1-7. IEEE, (2018)Iterative Antenna Selection for Secrecy Enhancement in Massive MIMO Wiretap Channels., , , and . SPAWC, page 1-5. IEEE, (2018)Secure Communication in Underlay Cognitive Massive MIMO Systems with Pilot Contamination., , and . GLOBECOM, page 1-7. IEEE, (2017)On the Degradedness of Fast Fading Gaussian Multiple-Antenna Wiretap Channels with Statistical Channel State Information at the Transmitter., , , and . GLOBECOM Workshops, page 1-5. IEEE, (2015)Degradedness and stochastic orders of fast fading Gaussian broadcast channels with statistical channel state information at the transmitter., , , , and . ICASSP, page 3846-3850. IEEE, (2016)On ergodic fading Gaussian interference channels with statistical CSIT., , and . ITW, page 454-458. IEEE, (2016)The secrecy capacity of a compound MIMO Gaussian channel., and . ITW, page 1-5. IEEE, (2013)Secure Integrated Sensing and Communication., , , and . IACR Cryptol. ePrint Arch., (2022)Code Constructions and Bounds for Identification via Channels., , , and . IACR Cryptol. ePrint Arch., (2021)Secure Lossy Function Computation with Multiple Private Remote Source Observations., , and . IACR Cryptol. ePrint Arch., (2022)