Year of Publication: 2014

F. Gomez-Cuba, Rangan, S., and Erkip, E., Scaling laws for infrastructure single and multihop wireless networks in wideband regimes, in IEEE International Symposium on Information Theory (ISIT), Honolulu, 2014, pp. 76–80.
D. D. Ariananda, Romero, D., and Leus, G., Cooperative compressive power spectrum estimation, in IEEE Sensor Array Multichannel Signal Process. Workshop (SAM), 2014.PDF icon 1405.4160.pdf (115.5 KB)
J. R. Troncoso-Pastoriza and Caputo, S., Bootstrap-based Proxy Reencryption for Private Multi-user Computing, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.PDF icon TroncosoCaputo-BootstrappingMultiKey.pdf (795.89 KB)
J. F. Schmidt and López-Valcarce, R., Detecting Misreporting Attacks to the Proportional Fair Scheduler, in IEEE Workshop on Information Forensics and Security (WIFS), Atlanta, USA, 2014.PDF icon GlobalSIP_2014.pdf (326.68 KB)
P. Comesaña and Pérez-González, F., The optimal attack to histogram-based forensic detectors is simple(x), in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 137-142.PDF icon wifs14.pdf (265.04 KB)