-
1
-
-
45249124902
-
-
R. Ahlswede, Multi-way communication channels, in Proc. 2nd. Int. Symp. Inf. Theory, Tsahkadsor, Armenian S.S.R., 1971, pp. 23-52.
-
R. Ahlswede, "Multi-way communication channels," in Proc. 2nd. Int. Symp. Inf. Theory, Tsahkadsor, Armenian S.S.R., 1971, pp. 23-52.
-
-
-
-
2
-
-
0003914376
-
Multiple access channels,
-
Ph.D. dissertation, Dept. Electr. Engr, Univ. Hawaii, Honolulu, HI
-
H. Liao, "Multiple access channels," Ph.D. dissertation, Dept. Electr. Engr., Univ. Hawaii, Honolulu, HI, 1972.
-
(1972)
-
-
Liao, H.1
-
4
-
-
0018443950
-
The capacity region of the two-way channel can exceed the inner bound
-
G. Dueck, "The capacity region of the two-way channel can exceed the inner bound," Inf. Control, no. 40, pp. 258-266, 1979.
-
(1979)
Inf. Control
, Issue.40
, pp. 258-266
-
-
Dueck, G.1
-
5
-
-
0021157174
-
A general coding scheme for the two-way channel
-
Jan
-
T. S. Han, "A general coding scheme for the two-way channel," IEEE Trans. Inf. Theory, vol. IT-30, no. 1, pp. 35-44, Jan. 1984.
-
(1984)
IEEE Trans. Inf. Theory
, vol.IT-30
, Issue.1
, pp. 35-44
-
-
Han, T.S.1
-
6
-
-
0000456843
-
The capacity region of a channel with two senders and two receivers
-
R. Ahlswede, "The capacity region of a channel with two senders and two receivers," Ann. Probab., vol. 2, no. 5, pp. 805-814, 1974.
-
(1974)
Ann. Probab
, vol.2
, Issue.5
, pp. 805-814
-
-
Ahlswede, R.1
-
7
-
-
0017495152
-
Two-user communication channels
-
May
-
H. Sato, "Two-user communication channels," IEEE Trans. Inf. Theory vol. IT-23, no. 3, pp. 295-304, May 1977.
-
(1977)
IEEE Trans. Inf. Theory
, vol.IT-23
, Issue.3
, pp. 295-304
-
-
Sato, H.1
-
8
-
-
0019187817
-
Multiple user information theory
-
Dec
-
A. El Gamal and T. Cover, "Multiple user information theory," Proc. IEEE, vol. 68, no. 12, pp. 1466-1483, Dec. 1980.
-
(1980)
Proc. IEEE
, vol.68
, Issue.12
, pp. 1466-1483
-
-
El Gamal, A.1
Cover, T.2
-
9
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
10
-
-
0016562514
-
The wire-tap channel
-
A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, pp. 1355-1387
-
-
Wyner, A.1
-
11
-
-
0017495724
-
A note on Wyner's wiretap channel
-
May
-
A. B. Carleial and M. E. Hellman, "A note on Wyner's wiretap channel," IEEE Trans. Inf. Theory, vol. IT-23, no. 3, pp. 387-390, May 1977.
-
(1977)
IEEE Trans. Inf. Theory
, vol.IT-23
, Issue.3
, pp. 387-390
-
-
Carleial, A.B.1
Hellman, M.E.2
-
12
-
-
0017996501
-
Gaussian wire-tap channel
-
Jul
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
13
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
14
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Berlin, Germany: Springer-Verlag
-
U. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Lecture Notes in Computer Science Berlin, Germany: Springer-Verlag, 2000, vol. 1807, pp. 351-368.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 351-368
-
-
Maurer, U.1
Wolf, S.2
-
15
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
16
-
-
0029405656
-
Generalized privacy amplification
-
Nov
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
17
-
-
0027629488
-
Common randomness in information theory and cryptography - Part I: Secret sharing
-
Jul
-
R. Ahslwede and I. Csiszár, "Common randomness in information theory and cryptography - Part I: Secret sharing," IEEE Trans. Inf. Theory vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahslwede, R.1
Csiszár, I.2
-
18
-
-
0031701886
-
Common randomness in information theory and cryptography - Part II: CR capacity
-
Jan
-
R. Ahslwede and I. Csiszár, "Common randomness in information theory and cryptography - Part II: CR capacity," IEEE Trans. Inf. Theory vol. 44, no. 1, pp. 225-240, Jan. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.1
, pp. 225-240
-
-
Ahslwede, R.1
Csiszár, I.2
-
19
-
-
0037396695
-
Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result
-
Apr
-
U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822-831, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 822-831
-
-
Maurer, U.1
Wolf, S.2
-
20
-
-
0037399113
-
Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition
-
Apr
-
U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition," IEEE Trans. Inform. Theory, vol. 49, no. 4, pp. 832-838, Apr. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, Issue.4
, pp. 832-838
-
-
Maurer, U.1
Wolf, S.2
-
21
-
-
0037396951
-
Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification
-
Apr
-
U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 839-851, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 839-851
-
-
Maurer, U.1
Wolf, S.2
-
22
-
-
0031647696
-
The common randomness capacity of a pair of independent discrete memoryless channels
-
Jan
-
S. Venkatesan and V. Anantharam, "The common randomness capacity of a pair of independent discrete memoryless channels," IEEE Trans. Inf. Theory, vol. 44, no. 1, pp. 215-224, Jan. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.1
, pp. 215-224
-
-
Venkatesan, S.1
Anantharam, V.2
-
23
-
-
0033892497
-
The common randomness capacity of a network of discrete memoryless channels
-
Mar
-
S. Venkatesan and V. Anantharam, "The common randomness capacity of a network of discrete memoryless channels," IEEE Trans. Inf. Theory vol. 46, no. 2, pp. 367-387, Mar. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.2
, pp. 367-387
-
-
Venkatesan, S.1
Anantharam, V.2
-
24
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
Mar
-
I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.2
, pp. 344-366
-
-
Csiszár, I.1
Narayan, P.2
-
25
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
26
-
-
0022722755
-
On secret sharing communication systems with two or three channels
-
May
-
H. Yamamoto, "On secret sharing communication systems with two or three channels," IEEE Trans. Inf. Theory, vol. IT-32, no. 3, pp. 387-393, May 1986.
-
(1986)
IEEE Trans. Inf. Theory
, vol.IT-32
, Issue.3
, pp. 387-393
-
-
Yamamoto, H.1
-
27
-
-
0026153306
-
A coding theorem for secret sharing communication systems with two Gaussian wiretap channels
-
May
-
H. Yamamoto, "A coding theorem for secret sharing communication systems with two Gaussian wiretap channels," IEEE Trans. Inf. Theory, vol. 37, no. 3, pp. 634-638, May 1991.
-
(1991)
IEEE Trans. Inf. Theory
, vol.37
, Issue.3
, pp. 634-638
-
-
Yamamoto, H.1
-
28
-
-
84938932265
-
Coding for relay channels with confidential messages
-
Y. Oohama, "Coding for relay channels with confidential messages," in Proc. IEEE Inf. Theory Workshop, 2001, pp. 87-89.
-
(2001)
Proc. IEEE Inf. Theory Workshop
, pp. 87-89
-
-
Oohama, Y.1
-
29
-
-
39049144353
-
Secrecy capacity of wireless channels
-
Seattle, WA, Jul. 9-14
-
J. Barros and M. R. D. Rodrigues, "Secrecy capacity of wireless channels," in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, Jul. 9-14, 2006, pp. 356-360.
-
(2006)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 356-360
-
-
Barros, J.1
Rodrigues, M.R.D.2
-
30
-
-
45249101310
-
Wireless information-theoretic security - Part I: Theoretical aspects
-
accepted for publication
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security - Part I: Theoretical aspects," IEEE Trans. Inf. Theory, accepted for publication.
-
IEEE Trans. Inf. Theory
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
31
-
-
77954445239
-
Secure communication over fading channels
-
Monticello, IL, Sep. 27-29
-
Y. Liang and V. Poor, "Secure communication over fading channels," in Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 27-29, 2006.
-
(2006)
Proc. Allerton Conf. Commun. Control Comput
-
-
Liang, Y.1
Poor, V.2
-
32
-
-
84940654702
-
Secrecy capacity of independent parallel channels
-
Monticello, IL, Sep. 27-29
-
L. Zang, R. Yates, and W. Trappe, "Secrecy capacity of independent parallel channels," in Proc. Allerton Conf. Commun. Control Comput. Monticello, IL, Sep. 27-29, 2006.
-
(2006)
Proc. Allerton Conf. Commun. Control Comput
-
-
Zang, L.1
Yates, R.2
Trappe, W.3
-
33
-
-
84940648008
-
Discrete memoryless interference and broadcast channels with confidential messages
-
Monticello, IL, Sep. 27-29
-
R. Liu, I. Marie, R. D. Yates, and P. Spasojevic, "Discrete memoryless interference and broadcast channels with confidential messages," in Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 27-29, 2006.
-
(2006)
Proc. Allerton Conf. Commun. Control Comput
-
-
Liu, R.1
Marie, I.2
Yates, R.D.3
Spasojevic, P.4
-
34
-
-
45249119708
-
Generalized multiple access channels with confidential messages
-
accepted for publication
-
Y. Liang and V. Poor, "Generalized multiple access channels with confidential messages," IEEE Trans. Inf. Theory, accepted for publication.
-
IEEE Trans. Inf. Theory
-
-
Liang, Y.1
Poor, V.2
-
35
-
-
39049089566
-
The discrete memoryless multiple access channel with confidential messages
-
Seattle, WA, Jul. 9-14
-
R. Liu, I. Marie, R. D. Yates, and P. Spasojevic, "The discrete memoryless multiple access channel with confidential messages," in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, Jul. 9-14, 2006, pp. 957-961.
-
(2006)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 957-961
-
-
Liu, R.1
Marie, I.2
Yates, R.D.3
Spasojevic, P.4
-
36
-
-
77958560746
-
Secure transmission with multiple antennas: The MISOME wiretap channel
-
submitted for publication
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas: The MISOME wiretap channel," IEEE Trans. Inf. Theory, submitted for publication.
-
IEEE Trans. Inf. Theory
-
-
Khisti, A.1
Wornell, G.W.2
-
37
-
-
69449086815
-
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel
-
submitted for publication
-
S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel," IEEE Trans. Inf. Theory, submitted for publication.
-
IEEE Trans. Inf. Theory
-
-
Shafiee, S.1
Liu, N.2
Ulukus, S.3
-
38
-
-
33847609636
-
On secure signaling for the Gaussian multiple access wire-tap channel
-
Asilomar, CA, Nov. 1
-
E. Tekin, S. Şerbetli, and A. Yener, "On secure signaling for the Gaussian multiple access wire-tap channel," in Proc. Asilomar Conf. Signal Syst. Comput., Asilomar, CA, Nov. 1, 2005, pp. 1747-1751.
-
(2005)
Proc. Asilomar Conf. Signal Syst. Comput
, pp. 1747-1751
-
-
Tekin, E.1
Şerbetli, S.2
Yener, A.3
-
39
-
-
39049168628
-
The Gaussian multiple-access wire-tap channel with collective secrecy constraints
-
Seattle, WA, Jul. 9-14
-
E. Tekin and A. Yener, "The Gaussian multiple-access wire-tap channel with collective secrecy constraints," in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, Jul. 9-14, 2006, pp. 1164-1168.
-
(2006)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1164-1168
-
-
Tekin, E.1
Yener, A.2
-
40
-
-
57349093480
-
The Gaussian multiple-access wire-tap channel
-
Online, Available:, submitted for publication
-
E. Tekin and A. Yener, "The Gaussian multiple-access wire-tap channel," IEEE Trans. Inf. Theory [Online]. Available: http://arxiv.org/format/cs.IT/0605028, submitted for publication
-
IEEE Trans. Inf. Theory
-
-
Tekin, E.1
Yener, A.2
-
41
-
-
84940659555
-
Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy
-
Monticello, IL, Sep. 27-29
-
E. Tekin and A. Yener, "Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy," in Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 27-29, 2006.
-
(2006)
Proc. Allerton Conf. Commun. Control Comput
-
-
Tekin, E.1
Yener, A.2
-
42
-
-
40949121595
-
Achievable rates for two-way wire-tap channels
-
Nice, France, Jun. 24-29
-
E. Tekin and A. Yener, "Achievable rates for two-way wire-tap channels," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 24-29, 2007.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory
-
-
Tekin, E.1
Yener, A.2
-
43
-
-
0017918923
-
Interference channels
-
Jan
-
A. B. Carleial, "Interference channels," IEEE Trans. Inf. Theory vol. IT-24, no. 1, pp. 60-70, Jan. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.1
, pp. 60-70
-
-
Carleial, A.B.1
-
45
-
-
84857709521
-
Secrecy sum-rates for the multiple-access wire-tap channel with ergodic block fading
-
Monticello, IL, Sep. 26-28
-
E. Tekin and A. Yener, "Secrecy sum-rates for the multiple-access wire-tap channel with ergodic block fading," in Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 26-28, 2007.
-
(2007)
Proc. Allerton Conf. Commun. Control Comput
-
-
Tekin, E.1
Yener, A.2
-
46
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
Aug
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. McLaughlin, and J.-M. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.4
Merolla, J.-M.5
-
47
-
-
45249115450
-
Wireless information-theoretic security - Part II: Practical implementation
-
accepted for publication
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security - Part II: Practical implementation," IEEE Trans. Inf. Theory, accepted for publication.
-
IEEE Trans. Inf. Theory
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
|