Alexandros Katsiotis

Learn More
This paper investigates the security offered by PHY schemes that are well oriented towards jointly providing security and protection form channel errors. In particular, we focus on constructions that were recently proposed in the literature, whose security relies on the secrecy of parameters defining the encoding/decoding process of convolutional codes.(More)
In this paper, path pruning and puncturing are employed for the construction of recursive systematic convolutional encoders that can vary both their rate and decoding complexity. The basic goal is to use the resulting encoders in parallel concatenated coding schemes, leading to flexible turbo code constructions. A family of good constituent encoders is(More)
A cooperative jamming protocol is studied in this paper and its ability to protect the communications of a pair of users in the presence of an eavesdropper. Communication of users is assisted by many helping interferers, assuming knowledge of channel state information. Closed form expressions are given for the optimal weights and power allocation maximizing(More)