Advanced search
Advanced search
IEEE Communications Letters > 2017 > 21 > 8 > 1679 - 1682
IEEE Transactions on Information Theory > 2017 > 63 > 3 > 1858 - 1873
IEEE Transactions on Communications > 2017 > 65 > 8 > 3442 - 3452
IEEE Transactions on Information Theory > 2016 > 62 > 6 > 3504 - 3531
IEEE Transactions on Information Theory > 2014 > 60 > 12 > 7606 - 7615
IEEE Transactions on Communications > 2014 > 62 > 3 > 1070 - 1079
IEEE Transactions on Information Theory > 2014 > 60 > 2 > 842 - 858
IEEE Transactions on Information Theory > 2013 > 59 > 12 > 8131 - 8143
IEEE Transactions on Information Theory > 2013 > 59 > 12 > 8077 - 8098
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 9 > 1482 - 1496
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 2 > 314 - 323
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 1-2 > 148 - 159
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 4 > 1414 - 1418
IEEE Transactions on Information Theory > 2011 > 57 > 10 > 6692 - 6702
IEEE Transactions on Information Theory > 2011 > 57 > 10 > 6428 - 6443
IEEE Transactions on Information Theory > 2011 > 57 > 2 > 1124 - 1135