What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Eduard A. Jorswieck
Google Scholar
15
publications in security and cryptology related venues
Year
Venue
Title
2021
journals/tifs
Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks.
Guyue Li
Chen Sun
Eduard A. Jorswieck
Junqing Zhang
Aiqun Hu
You Chen
2021
journals/tifs
Robust Key Generation With Hardware Mismatch for Secure MIMO Communications.
Guyue Li
Yinghao Xu
Wei Xu
Eduard A. Jorswieck
Aiqun Hu
2020
journals/tifs
Wiretap Code Design by Neural Network Autoencoders.
Karl-Ludwig Besser
Pin-Hsun Lin
Carsten R. Janda
Eduard A. Jorswieck
2020
conf/cns
Arbitrarily Varying Wiretap Channels with and without Non-Causal Side Information at the Jammer.
Carsten Rudolf Janda
Eduard A. Jorswieck
Moritz Wiese
Holger Boche
2019
journals/tifs
Secrecy Energy Efficiency for MIMO Single- and Multi-Cell Downlink Transmission With Confidential Messages.
Alessio Zappone
Pin-Hsun Lin
Eduard A. Jorswieck
2019
journals/popets
On Privacy Notions in Anonymous Communication.
Christiane Kuhn
Martin Beck
Stefan Schiffner
Eduard A. Jorswieck
Thorsten Strufe
2018
journals/tifs
Optimal Energy-Efficient Design of Confidential Multiple-Antenna Systems.
Alessio Zappone
Pin-Hsun Lin
Eduard A. Jorswieck
2016
journals/tifs
On the Fast Fading Gaussian Wiretap Channel With Statistical Channel State Information at the Transmitter.
Pin-Hsun Lin
Eduard A. Jorswieck
2015
journals/tifs
Weak Secrecy in the Multiway Untrusted Relay Channel With Compute-and-Forward.
Johannes Richter
Christian Scheunert
Sabrina Engelmann
Eduard A. Jorswieck
2015
conf/cns
Secret-key agreement over spatially correlated multiple-antenna channels in the low-SNR regime.
Marwen Zorgui
Zouheir Rezki
Basel Alomair
Eduard A. Jorswieck
Mohamed-Slim Alouini
2015
conf/cns
Key agreement over an interference channel with noiseless feedback: Achievable region & distributed allocation.
Somayeh Salimi
Eduard A. Jorswieck
Mikael Skoglund
Panos Papadimitratos
2015
conf/cns
Energy efficiency performance of cooperative schemes in cognitive radio networks with secrecy.
Frederic Gabry
Pin-Hsun Lin
Eduard A. Jorswieck
2015
conf/cns
Wiretap-channels under constrained active and passive attacks.
Carsten Rudolf Janda
Moritz Wiese
Janis Nötzel
Holger Boche
Eduard A. Jorswieck
2014
conf/cns
On the fading Gaussian wiretap channel with statistical channel state information at transmitter.
Pin-Hsun Lin
Eduard A. Jorswieck
2012
journals/tifs
Secrecy Outage in MISO Systems With Partial Channel Information.
Sabrina Gerbracht
Christian Scheunert
Eduard A. Jorswieck
Coauthors
Aiqun Hu
(2)
Alessio Zappone
(2)
Basel Alomair
(1)
Carsten R. Janda
(1)
Carsten Rudolf Janda
(2)
Chen Sun
(1)
Christian Scheunert
(2)
Christiane Kuhn
(1)
Eduard A. Jorswieck
(15)
Frederic Gabry
(1)
Guyue Li
(2)
Holger Boche
(2)
Janis Nötzel
(1)
Johannes Richter
(1)
Junqing Zhang
(1)
Karl-Ludwig Besser
(1)
Martin Beck
(1)
Marwen Zorgui
(1)
Mikael Skoglund
(1)
Mohamed-Slim Alouini
(1)
Moritz Wiese
(2)
Panos Papadimitratos
(1)
Pin-Hsun Lin
(6)
Sabrina Engelmann
(1)
Sabrina Gerbracht
(1)
Somayeh Salimi
(1)
Stefan Schiffner
(1)
Thorsten Strufe
(1)
Wei Xu
(1)
Yinghao Xu
(1)
You Chen
(1)
Zouheir Rezki
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to