M. L. Treust, L. Szczecinski, and F. Labeau, Secrecy & Rate Adaptation for secure HARQ protocols, 2013 IEEE Information Theory Workshop (ITW), pp.1-5, 2013.
DOI : 10.1109/ITW.2013.6691223

URL : https://hal.archives-ouvertes.fr/hal-01108112

X. Tang, R. Liu, P. Spasojevic, and H. Poor, On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels, IEEE Transactions on Information Theory, vol.55, issue.4, pp.1575-1591, 2009.
DOI : 10.1109/TIT.2009.2013043

C. E. Shannon, A Mathematical Theory of Communication, Bell System Technical Journal, vol.27, issue.3, pp.379-423, 1948.
DOI : 10.1002/j.1538-7305.1948.tb01338.x

I. E. Telatar and R. G. Gallager, Combining queueing theory with information theory for multiaccess, IEEE Journal on Selected Areas in Communications, vol.13, issue.6, pp.963-969, 1995.
DOI : 10.1109/49.400652

URL : http://dspace.mit.edu/bitstream/1721.1/3413/1/P-2309-34377208.pdf

G. Caire and D. Tuninetti, The throughput of hybrid-ARQ protocols for the Gaussian collision channel, IEEE Transactions on Information Theory, vol.47, issue.5, pp.1971-1988, 2001.
DOI : 10.1109/18.930931

M. Zorzi and R. R. Rao, Throughput of selective-repeat ARQ with time diversity in Markov channels with unreliable feedback, Wireless Networks, vol.42, issue.1, pp.63-75, 1996.
DOI : 10.1002/j.1538-7305.1960.tb03959.x

M. Zorzi and F. Borgonovo, Performance of capture-division packet access with slow shadowing and power control, IEEE Transactions on Vehicular Technology, vol.46, issue.3, pp.687-696, 1997.
DOI : 10.1109/25.618194

M. Zorzi, Mobile radio slotted ALOHA with capture, diversity and retransmission control in the presence of shadowing, Wireless Networks, vol.4, issue.5, pp.379-388, 1998.
DOI : 10.1023/A:1019129012116

E. Visotsky, S. Yakun, V. Tripathi, M. Honig, and R. Peterson, Reliability-Based Incremental Redundancy With Convolutional Codes, IEEE Transactions on Communications, vol.53, issue.6, pp.987-997, 2005.
DOI : 10.1109/TCOMM.2005.850012

S. Pfletschinger and M. Navarro, Adaptive HARQ for imperfect channel knowledge, International ITG Conference on Source and Channel Coding (SCC), pp.1-6, 2010.

E. Uhlemann, L. Rasmussen, A. Grant, and P. Wiberg, Optimal Incremental-redundancy strategy for type-II hybrid ARQ, IEEE International Symposium on Information Theory, 2003. Proceedings., 2003.
DOI : 10.1109/ISIT.2003.1228465

URL : http://www2.hh.se/staff/bettan/Publications/UhlRasGraISIT03.pdf

L. Szczecinski, S. R. Khosravirad, P. Duhamel, and M. Rahman, Rate Allocation and Adaptation for Incremental Redundancy Truncated HARQ, IEEE Transactions on Communications, vol.61, issue.6, pp.2580-2590, 2013.
DOI : 10.1109/TCOMM.2012.041113.120462

URL : https://hal.archives-ouvertes.fr/hal-00827950

M. Jabi, M. Benjillali, L. Szczecinski, and F. Labeau, Energy Efficiency of Adaptive HARQ, IEEE Transactions on Communications, vol.64, issue.2, pp.818-831, 2016.
DOI : 10.1109/TCOMM.2015.2506698

M. Jabi, A. E. Hamss, L. Szczecinski, and P. Piantanida, Multipacket Hybrid ARQ: Closing Gap to the Ergodic Capacity, IEEE Transactions on Communications, vol.63, issue.12, pp.5191-5205, 2015.
DOI : 10.1109/TCOMM.2015.2493138

URL : https://hal.archives-ouvertes.fr/hal-01257567

M. Jabi, L. Szczecinski, M. Benjillali, and F. Labeau, Outage Minimization via Power Adaptation and Allocation in Truncated Hybrid ARQ, IEEE Transactions on Communications, vol.63, issue.3, pp.711-723, 2015.
DOI : 10.1109/TCOMM.2014.2386882

URL : http://arxiv.org/pdf/1311.5629.pdf

P. Larsson, L. Rasmussen, and M. Skoglund, Throughput Analysis of Hybrid-ARQ???A Matrix Exponential Distribution Approach, IEEE Transactions on Communications, vol.64, issue.1, pp.416-428, 2016.
DOI : 10.1109/TCOMM.2015.2501294

K. Nguyen, L. Rasmussen, A. Guillen-i-fabregas, and N. Letzepis, MIMO ARQ With Multibit Feedback: Outage Analysis, IEEE Transactions on Information Theory, vol.58, issue.2
DOI : 10.1109/TIT.2011.2170919

URL : http://arxiv.org/pdf/1006.1162

W. Lee, O. Simeone, J. Kang, S. Rangan, and P. Popovski, HARQ Buffer Management: An Information-Theoretic View, IEEE Transactions on Communications, vol.63, issue.11, pp.4539-4550, 2015.
DOI : 10.1109/TCOMM.2015.2472015

URL : http://arxiv.org/pdf/1501.06166

C. Hausl and A. Chindapol, Hybrid ARQ with Cross-Packet Channel Coding, IEEE Communications Letters, vol.11, issue.5, pp.434-436, 2007.
DOI : 10.1109/LCOMM.2007.061186

J. Chui and A. Chindapol, Design of Cross-Packet Channel Coding with Low-Density Parity-Check Codes, 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, pp.1-5, 2007.
DOI : 10.1109/ITWITWN.2007.4318036

D. Duyck, D. Capirone, C. Hausl, and M. Moeneclaey, Design of diversity-achieving LDPC codes for H-ARQ with cross-packet channel coding, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, pp.263-268, 2010.
DOI : 10.1109/PIMRC.2010.5671785

K. Trillingsgaard and P. Popovski, Block-fading channels with delayed CSIT at finite blocklength, 2014 IEEE International Symposium on Information Theory, pp.2062-2066, 2014.
DOI : 10.1109/ISIT.2014.6875196

URL : http://arxiv.org/pdf/1401.7134.pdf

K. D. Nguyen, R. Timo, and L. K. Rasmussen, Causal-CSIT rate adaptation for block-fading channels, 2015 IEEE International Symposium on Information Theory (ISIT), pp.351-355, 2015.
DOI : 10.1109/ISIT.2015.7282475

A. Benyouss, M. Jabi, M. L. Treust, and L. Szczecinski, Joint coding/decoding for multi-message HARQ, 2016 IEEE Wireless Communications and Networking Conference, 2016.
DOI : 10.1109/WCNC.2016.7564780

URL : https://hal.archives-ouvertes.fr/hal-01361218

M. Jabi, A. Benyouss, M. L. Treust, E. Pierre-doray, and L. Szczecinski, Adaptive Cross-Packet HARQ, IEEE Transactions on Communications, vol.65, issue.5, pp.2022-2035, 2017.
DOI : 10.1109/TCOMM.2017.2661758

URL : https://hal.archives-ouvertes.fr/hal-01633786

A. D. Wyner, The Wire-Tap Channel, Bell System Technical Journal, vol.54, issue.8, pp.1355-1387, 1975.
DOI : 10.1002/j.1538-7305.1975.tb02040.x

C. E. Shannon, Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

I. Csiszár and J. Körner, Broadcast channels with confidential messages, IEEE Transactions on Information Theory, vol.24, issue.3, pp.339-348, 1978.
DOI : 10.1109/TIT.1978.1055892

S. Leung-yan-cheong and M. Hellman, The Gaussian wire-tap channel, IEEE Transactions on Information Theory, vol.24, issue.4, pp.451-456, 1978.
DOI : 10.1109/TIT.1978.1055917

M. Bloch and J. Barros, Physical Layer Security-From Information Theory to Security Engineering, 2011.

M. Bloch, J. Barros, M. R. Rodrigues, and S. W. Mclaughlin, Wireless Information-Theoretic Security, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2515-2534, 2008.
DOI : 10.1109/TIT.2008.921908

A. Khisti, A. Tchamkerten, and G. Wornell, Secure Broadcasting Over Fading Channels, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2453-2469, 2008.
DOI : 10.1109/TIT.2008.921861

URL : http://allegro.mit.edu/pubs/posted/journal/2008-khisti-tchamkerten-wornell-it.pdf

P. K. Gopala, L. Lai, and H. E. Gamal, On the Secrecy Capacity of Fading Channels, IEEE Transactions on Information Theory, vol.54, issue.10, pp.4687-4698, 2008.
DOI : 10.1109/TIT.2008.928990

Y. Liang, H. V. Poor, and S. Shamai, Secure Communication Over Fading Channels, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2470-2492, 2008.
DOI : 10.1109/TIT.2008.921678

Z. Li, R. Yates, and W. Trappe, Achieving Secret Communication for Fast Rayleigh Fading Channels, IEEE Transactions on Wireless Communications, vol.9, issue.9, pp.2792-2799, 2010.
DOI : 10.1109/TWC.2010.080210.090948

M. R. Bloch and J. N. Laneman, Exploiting Partial Channel State Information for Secrecy over Wireless Channels, IEEE Journal on Selected Areas in Communications, vol.31, issue.9, pp.1840-1849, 2013.
DOI : 10.1109/JSAC.2013.130916

URL : http://www.nd.edu/%7Ejnl/pubs/jsac2012.pdf

Z. Rezki, A. Khisti, and M. S. Alouini, On the Secrecy Capacity of the Wiretap Channel With Imperfect Main Channel Estimation, IEEE Transactions on Communications, vol.62, issue.10, pp.3652-3664, 2014.
DOI : 10.1109/TCOMM.2014.2356482

P. H. Lin and E. Jorswieck, On the Fast Fading Gaussian Wiretap Channel With Statistical Channel State Information at the Transmitter, IEEE Transactions on Information Forensics and Security, vol.11, issue.1, pp.46-58, 2016.
DOI : 10.1109/TIFS.2015.2476464

X. Zhou, M. R. Mckay, B. Maham, and A. Hjorungnes, Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective, IEEE Communications Letters, vol.15, issue.3, pp.302-304, 2011.
DOI : 10.1109/LCOMM.2011.011811.102433

Z. Mheich, M. L. Treust, F. Alberge, P. Duhamel, and L. Szczecinski, Rate-adaptive secure HARQ protocol for block-fading channels, 22nd European Signal Processing Conference (EUSIPCO), pp.830-834, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01056016

Z. Mheich, M. L. Treust, F. Alberge, and P. Duhamel, Rate Adaptation for Incremental Redundancy Secure HARQ, IEEE Transactions on Communications, vol.64, issue.2, pp.765-777, 2016.
DOI : 10.1109/TCOMM.2015.2514284

URL : https://hal.archives-ouvertes.fr/hal-01273989

M. Baldi, M. Bianchi, and F. Chiaraluce, Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.883-894, 2012.
DOI : 10.1109/TIFS.2012.2187515

S. Tomasin and N. Laurenti, Secure HARQ With Multiple Encoding Over Block Fading Channels: Channel Set Characterization and Outage Analysis, IEEE Transactions on Information Forensics and Security, vol.9, issue.10, pp.1708-1719, 2014.
DOI : 10.1109/TIFS.2014.2346397

J. Choi, On Channel-Aware Secure HARQ-IR, IEEE Transactions on Information Forensics and Security, vol.12, issue.2, pp.351-362, 2017.
DOI : 10.1109/TIFS.2016.2613846

J. Hou and G. Kramer, Effective secrecy: Reliability, confusion and stealth, IEEE Inter. Symp. Inf. Theory (ISIT), pp.601-605, 2014.
DOI : 10.1109/isit.2014.6874903

URL : http://arxiv.org/pdf/1311.1411.pdf

Z. Goldfeld, P. Cuff, and H. H. Permuter, Semantic-Security Capacity for Wiretap Channels of Type II, IEEE Transactions on Information Theory, vol.62, issue.7, pp.3863-3879, 2016.
DOI : 10.1109/TIT.2016.2565483

L. Senigagliesi, M. Baldi, and F. Chiaraluce, Semantic Security with Practical Transmission Schemes over Fading Wiretap Channels, Entropy, vol.1267, issue.9, p.491, 2017.
DOI : 10.1109/TIT.1969.1054260

URL : http://www.mdpi.com/1099-4300/19/9/491/pdf

L. Wang, G. W. Wornell, and L. Zheng, Fundamental Limits of Communication With Low Probability of Detection, IEEE Transactions on Information Theory, vol.62, issue.6, pp.3493-3503, 2016.
DOI : 10.1109/TIT.2016.2548471

URL : https://hal.archives-ouvertes.fr/hal-01345907

M. R. Bloch, Covert Communication Over Noisy Channels: A Resolvability Perspective, IEEE Transactions on Information Theory, vol.62, issue.5, pp.2334-2354, 2016.
DOI : 10.1109/TIT.2016.2530089

URL : http://arxiv.org/pdf/1503.08778

M. Zorzi and R. Rao, On the use of renewal theory in the analysis of ARQ protocols, IEEE Transactions on Communications, vol.44, issue.9, pp.1077-1081, 1996.
DOI : 10.1109/26.536913

J. S. Harsini, F. Lahouti, M. Levorato, and M. Zorzi, Analysis of Non-Cooperative and Cooperative Type II Hybrid ARQ Protocols with AMC over Correlated Fading Channels, IEEE Transactions on Wireless Communications, vol.10, issue.3, pp.877-889, 2011.
DOI : 10.1109/TWC.2011.010411.100328

S. M. Kim, W. Choi, T. W. Ban, and D. K. Sung, Optimal Rate Adaptation for Hybrid ARQ in Time-Correlated Rayleigh Fading Channels, IEEE Transactions on Wireless Communications, vol.10, issue.3, pp.968-979, 2011.
DOI : 10.1109/TWC.2011.011111.101027

T. V. Chaitanya and E. G. Larsson, Adaptive power allocation for HARQ with Chase combining in correlated Rayleigh fading channels, IEEE Wireless Communications Letters, vol.3, issue.2, pp.169-172, 2014.

Z. Shi, H. Ding, S. Ma, and K. W. Tam, Analysis of HARQ-IR Over Time-Correlated Rayleigh Fading Channels, IEEE Transactions on Wireless Communications, vol.14, issue.12, pp.7096-7109, 2015.
DOI : 10.1109/TWC.2015.2464798

A. E. Gamal and Y. Kim, Network Information Theory, 2011.
DOI : 10.1017/CBO9781139030687

T. Maël-le, earned his Diplôme d'Etude Approfondies (M.Sc.) degree in Optimization , Game Theory & Economics (OJME) from the Université de Paris VI (UPMC), France in 2008 and his Ph.D. degree from the Université de Paris Sud XI in 2011, at the Laboratoire des signaux et systèmes (joint laboratory of CNRS, Supélec Sud XI) in Gif-sur-Yvette, France. Since 2013, he is a CNRS researcher at ETIS laboratory UMR 8051

F. Vallée, His research interests are strategic coordination, information theory, Shannon theory, game theory, physical layer security and wireless communications

L. Szczecinski, he was an Assistant Professor with the Department of Electrical Engineering, University of Chile. He is currently a Professor with INRS he was an Adjunct Professor with the Electrical and He co-authored the book " Bit-Interleaved Coded Modulation: Fundamental, Analysis and Design, His research interests include the area of communication theory, modulation and coding, ARQ, wireless communications, and digital signal processing, 1997.