-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, pp. 1355-1387
-
-
Wyner, A.1
-
3
-
-
0017495724
-
A note on Wyner's wiretap channel
-
May
-
A. B. Carleial and M. E. Hellman, "A note on Wyner's wiretap channel," IEEE Trans. Inf. Theory, vol. IT-23, no. 3, pp. 387-390, May 1977.
-
(1977)
IEEE Trans. Inf. Theory
, vol.IT-23
, Issue.3
, pp. 387-390
-
-
Carleial, A.B.1
Hellman, M.E.2
-
4
-
-
0017996501
-
Gaussian wire-tap channel
-
Jul
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
5
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
6
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
7
-
-
0029405656
-
Generalized privacy amplification
-
Nov
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
8
-
-
0027629488
-
Common randomness in information theory and cryptography, part I: Secret sharing
-
Jul
-
R. Ahslwede and I. Csiszár, "Common randomness in information theory and cryptography, part I: Secret sharing," IEEE Trans. Inf. Theory vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahslwede, R.1
Csiszár, I.2
-
9
-
-
0031701886
-
Common randomness in information theory and cryptography, Part II: CR capacity
-
Jan
-
R. Ahslwede and I. Csiszár, "Common randomness in information theory and cryptography, Part II: CR capacity," IEEE Trans. Inf. Theory, vol. 44, no. 1, pp. 225-240, Jan. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.1
, pp. 225-240
-
-
Ahslwede, R.1
Csiszár, I.2
-
10
-
-
0031647696
-
The common randomness capacity of a pair of independent discrete memoryless channels
-
Jan
-
S. Venkatesan and V. Anantharam, "The common randomness capacity of a pair of independent discrete memoryless channels," IEEE Trans. Inf. Theory, vol. 44, no. 1, pp. 215-224, Jan. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.1
, pp. 215-224
-
-
Venkatesan, S.1
Anantharam, V.2
-
11
-
-
0033892497
-
The common randomness capacity of a network of discrete memoryless channels
-
Mar
-
S. Venkatesan and V. Anantharam, "The common randomness capacity of a network of discrete memoryless channels," IEEE Trans. Inf. Theory vol. 46, no. 2, pp. 367-387, Mar. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.2
, pp. 367-387
-
-
Venkatesan, S.1
Anantharam, V.2
-
12
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
Mar
-
I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.2
, pp. 344-366
-
-
Csiszár, I.1
Narayan, P.2
-
13
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
14
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Berlin, Germany, May
-
U. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Proc. EUROCRYPT 2000, Lecture Notes in Comput. Sci., Berlin, Germany, May 2000, vol. 1807, pp. 351-368.
-
(2000)
Proc. EUROCRYPT 2000, Lecture Notes in Comput. Sci
, vol.1807
, pp. 351-368
-
-
Maurer, U.1
Wolf, S.2
-
15
-
-
0037396695
-
Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result
-
Apr
-
U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822-831, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 822-831
-
-
Maurer, U.1
Wolf, S.2
-
16
-
-
0037399113
-
Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition
-
Apr
-
U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 832-838, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 832-838
-
-
Maurer, U.1
Wolf, S.2
-
17
-
-
0037396951
-
Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification
-
Apr
-
U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 839-851, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 839-851
-
-
Maurer, U.1
Wolf, S.2
-
18
-
-
0022722755
-
On secret sharing communication systems with two or three channels
-
May
-
H. Yamamoto, "On secret sharing communication systems with two or three channels," IEEE Trans. Inf. Theory, vol. IT-32, no. 3, pp. 387-393, May 1986.
-
(1986)
IEEE Trans. Inf. Theory
, vol.IT-32
, Issue.3
, pp. 387-393
-
-
Yamamoto, H.1
-
19
-
-
0026153306
-
A coding theorem for secret sharing communication systems with two Gaussian wiretap channels
-
May
-
H. Yamamoto, "A coding theorem for secret sharing communication systems with two Gaussian wiretap channels," IEEE Trans. Inf. Theory, vol. 37, no. 3, pp. 634-638, May 1991.
-
(1991)
IEEE Trans. Inf. Theory
, vol.37
, Issue.3
, pp. 634-638
-
-
Yamamoto, H.1
-
20
-
-
39049144353
-
Secrecy capacity of wireless channels
-
Seattle, WA, Jul. 9-14
-
J. Barros and M. R. D. Rodrigues, "Secrecy capacity of wireless channels," in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, Jul. 9-14, 2006, pp. 356-360.
-
(2006)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 356-360
-
-
Barros, J.1
Rodrigues, M.R.D.2
-
21
-
-
45249106562
-
On the secrecy capacity of fading channels
-
Nice, France, Jun
-
P. K. Gopala, L. Lai, and H. ElGamal, "On the secrecy capacity of fading channels," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 2007.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory
-
-
Gopala, P.K.1
Lai, L.2
ElGamal, H.3
-
22
-
-
77954445239
-
Secure communication over fading channels
-
Monticello, IL, Sep. 27-29
-
Y. Liang and V. Poor, "Secure communication over fading channels," in Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 27-29, 2006.
-
(2006)
Proc. Allerton Conf. Commun. Control Comput
-
-
Liang, Y.1
Poor, V.2
-
23
-
-
84940654702
-
Secrecy capacity of independent parallel channels
-
Monticello, IL, Sep. 27-29
-
L. Zang, R. Yates, and W. Trappe, "Secrecy capacity of independent parallel channels," in Proc. Allerton Conf. Commun. Control Comput. Monticello, IL, Sep. 27-29, 2006.
-
(2006)
Proc. Allerton Conf. Commun. Control Comput
-
-
Zang, L.1
Yates, R.2
Trappe, W.3
-
24
-
-
84940648008
-
Discrete memoryless interference and broadcast channels with confidential messages
-
Monticello, IL, Sep. 27-29
-
R. Liu, I. Maric, R. D. Yates, and P. Spasojevic, "Discrete memoryless interference and broadcast channels with confidential messages," in Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 27-29, 2006.
-
(2006)
Proc. Allerton Conf. Commun. Control Comput
-
-
Liu, R.1
Maric, I.2
Yates, R.D.3
Spasojevic, P.4
-
25
-
-
45249119708
-
Generalized multiple access channels with confidential messages
-
to appear
-
Y. Liang and V. Poor, "Generalized multiple access channels with confidential messages," IEEE Trans. Inf. Theory, to appear.
-
IEEE Trans. Inf. Theory
-
-
Liang, Y.1
Poor, V.2
-
26
-
-
39049089566
-
The discrete memoryless multiple access channel with confidential messages
-
Seattle, WA, Jul. 9-14
-
R. Liu, I. Maric, R. D. Yates, and P. Spasojevic, "The discrete memoryless multiple access channel with confidential messages," in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, Jul. 9-14, 2006, pp. 957-961.
-
(2006)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 957-961
-
-
Liu, R.1
Maric, I.2
Yates, R.D.3
Spasojevic, P.4
-
27
-
-
33847609636
-
On secure signaling for the Gaussian multiple access wire-tap channel
-
Asilomar, CA, Oct. 28-Nov. 1
-
E. Tekin, S. Serbetli, and A. Yener, "On secure signaling for the Gaussian multiple access wire-tap channel," in Proc. Asilomar Conf. Signal Syst. Comput., Asilomar, CA, Oct. 28-Nov. 1 2005, pp. 1747-1751.
-
(2005)
Proc. Asilomar Conf. Signal Syst. Comput
, pp. 1747-1751
-
-
Tekin, E.1
Serbetli, S.2
Yener, A.3
-
28
-
-
0017918923
-
Interference channels
-
Jan
-
A. B. Carleial, "Interference channels," IEEE Trans. Inf. Theory vol. IT-24, no. 1, pp. 60-70, Jan. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.1
, pp. 60-70
-
-
Carleial, A.B.1
-
29
-
-
39049168628
-
The Gaussian multiple-access wire-tap channel with collective secrecy constraints
-
Seattle, WA, Jul. 9-14
-
E. Tekin and A. Yener, "The Gaussian multiple-access wire-tap channel with collective secrecy constraints," in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, Jul. 9-14, 2006, pp. 1164-1168.
-
(2006)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1164-1168
-
-
Tekin, E.1
Yener, A.2
-
30
-
-
0031382715
-
The wire-tap channel concept against eavesdropping of indoor radio telephone
-
Sep
-
V. Korjik, V. Yakovlev, and I. Babkov, "The wire-tap channel concept against eavesdropping of indoor radio telephone," in Proc. 8th IEEE Int. Symp. Pers., Indoor and Mobile Radio Commun., Sep. 1997, vol. 2, pp. 477-479.
-
(1997)
Proc. 8th IEEE Int. Symp. Pers., Indoor and Mobile Radio Commun
, vol.2
, pp. 477-479
-
-
Korjik, V.1
Yakovlev, V.2
Babkov, I.3
-
32
-
-
84940659555
-
Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy
-
Monticello, IL, Sep. 27-29
-
E. Tekin and A. Yener, "Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy," in Proc. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 27-29, 2006.
-
(2006)
Proc. Allerton Conf. Commun. Control Comput
-
-
Tekin, E.1
Yener, A.2
-
33
-
-
45249101530
-
The general Gaussian multiple-access and two-way wire-tap channels: Achievable rates and cooperative jamming
-
Jun
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wire-tap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
|