Skip to main navigation
Skip to search
Skip to main content
Princeton University Home
Help & FAQ
Home
Profiles
Research units
Facilities
Projects
Research output
Press/Media
Search by expertise, name or affiliation
Coding schemes for confidential communications
Xiaojun Tang
, Ruoheng Liu
, Predrag Spasojević
,
H. Vincent Poor
Research output
:
Chapter in Book/Report/Conference proceeding
›
Conference contribution
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Coding schemes for confidential communications'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Computer Science
Channel Coding
20%
Channel Realization
20%
Code Sequence
20%
Communication Link
20%
Fading Channel
40%
Legitimate User
20%
Numerical Computation
20%
Outage Probability
20%
Retransmission
100%
Secrecy Outage Probability
40%
wiretap channel
20%
Keyphrases
Achievable Throughput
25%
Coding Protocols
25%
Connection Outage
25%
Hybrid Automatic Repeat Request (H-ARQ)
100%
Incremental Redundancy
50%
Redundancy Protocols
25%
Redundancy Scheme
25%
Repetition Time
25%
Time Diversity
25%
Engineering
Incremental Redundancy
40%
Repetition Time
20%