-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
4
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep
-
L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
5
-
-
55349095058
-
The wiretap channel with feedback: Encryption over the channel
-
Nov
-
L. Lai, H. El Gamal, and H. V. Poor, "The wiretap channel with feedback: Encryption over the channel," IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 5059-5067, Nov. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.11
, pp. 5059-5067
-
-
Lai, L.1
El Gamal, H.2
Poor, H.V.3
-
6
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct
-
P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
7
-
-
40949147785
-
Multiple access channels with confidential messages
-
Mar
-
Y. Liang and H. V. Poor, "Multiple access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.3
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
8
-
-
45249119255
-
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), Secure communication over fading channels, IEEE Trans. Inf. Theory, 54, no. 6, pp. 2470-2492, Jun. 2008.
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
-
-
-
9
-
-
45249104850
-
Wireless information-theoretic security
-
Jun
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory vol. 54, no. 6, pp. 25152-534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 25152-25534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
10
-
-
77958560746
-
Secure transmission with multiple antennas: The MISOME wiretap channel
-
submitted for publication
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas: The MISOME wiretap channel," IEEE Trans. Inf. Theory, submitted for publication.
-
IEEE Trans. Inf. Theory
-
-
Khisti, A.1
Wornell, G.W.2
-
11
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
submitted for publication
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, submitted for publication.
-
IEEE Trans. Inf. Theory
-
-
Oggier, F.1
Hassibi, B.2
-
12
-
-
45249103470
-
Introduction to special issue on information theoretic security
-
Jun
-
H. Imai, U. Maurer, and Y. Zheng, "Introduction to special issue on information theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2405-2407, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2405-2407
-
-
Imai, H.1
Maurer, U.2
Zheng, Y.3
-
13
-
-
84983269168
-
Authentication theory/coding theory
-
NewYork: Springer-Verlag
-
G. J. Simmons, "Authentication theory/coding theory," in Proc. CRYPTO84 on Advances in Cryptology. NewYork: Springer-Verlag, 1985, pp. 411-431.
-
(1985)
Proc. CRYPTO84 on Advances in Cryptology
, pp. 411-431
-
-
Simmons, G.J.1
-
14
-
-
0028514178
-
Lower bounds on the probability of deception in authentication with arbitration
-
Sep
-
T. Johansson, "Lower bounds on the probability of deception in authentication with arbitration," IEEE Trans. Inf. Theory, vol. 40, no. 5, pp. 1573-1585, Sep. 1994.
-
(1994)
IEEE Trans. Inf. Theory
, vol.40
, Issue.5
, pp. 1573-1585
-
-
Johansson, T.1
-
15
-
-
0347188260
-
Arbitrated unconditionally secure authentication can be unconditionally protected against arbiter's attacks
-
Santa Barbara, CA
-
Y. Desmedt and M. Yung, "Arbitrated unconditionally secure authentication can be unconditionally protected against arbiter's attacks," in Proc. Int. Cryptology Conf., Santa Barbara, CA, 1990, pp. 177-188.
-
(1990)
Proc. Int. Cryptology Conf
, pp. 177-188
-
-
Desmedt, Y.1
Yung, M.2
-
16
-
-
0034228863
-
Authentication theory and hypothesis testing
-
Jul
-
U. M. Maurer, "Authentication theory and hypothesis testing," IEEE Trans. Inf. Theory, vol. 46, no. 7, pp. 1350-1356, Jul. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.7
, pp. 1350-1356
-
-
Maurer, U.M.1
-
17
-
-
0026191173
-
Strengthening Simmons' bound on impersonation
-
Jul
-
R. Johannesson and A. Sgarro, "Strengthening Simmons' bound on impersonation," IEEE Trans. Inf. Theory, vol. 37, no. 4, pp. 1182-1185, Jul. 1991.
-
(1991)
IEEE Trans. Inf. Theory
, vol.37
, Issue.4
, pp. 1182-1185
-
-
Johannesson, R.1
Sgarro, A.2
-
18
-
-
33845637231
-
The CRC-NTMAC for noisy message authentication
-
Dec
-
Y. Liu and C. G. Boncelet, "The CRC-NTMAC for noisy message authentication," IEEE Trans. Inf. Forensics and Security, vol. 1, no. 4, pp. 517-523, Dec. 2006.
-
(2006)
IEEE Trans. Inf. Forensics and Security
, vol.1
, Issue.4
, pp. 517-523
-
-
Liu, Y.1
Boncelet, C.G.2
-
19
-
-
33645004780
-
The NTMAC for authentication of noisy messages
-
Mar
-
C. G. Boncelet, "The NTMAC for authentication of noisy messages," IEEE Trans. Inf. Forensics and Security, vol. 1, no. 1, pp. 35-42, Mar. 2006.
-
(2006)
IEEE Trans. Inf. Forensics and Security
, vol.1
, Issue.1
, pp. 35-42
-
-
Boncelet, C.G.1
-
20
-
-
0029405656
-
Generalized privacy amplification
-
Nov
-
C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Maurer, U.M.4
-
21
-
-
0009801824
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Bruges Brugge, Belgium, May
-
U. M. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Proc. Advances in Cryptology-EUROCRYPT, Bruges (Brugge), Belgium, May 2000, pp. 356-373.
-
(2000)
Proc. Advances in Cryptology-EUROCRYPT
, pp. 356-373
-
-
Maurer, U.M.1
Wolf, S.2
-
22
-
-
33750056552
-
Almost independence and secrecy capacity
-
Jan
-
I. Csiszár, "Almost independence and secrecy capacity," Probl. Inf. Transm., vol. 32, pp. 40-47, Jan. 1996.
-
(1996)
Probl. Inf. Transm
, vol.32
, pp. 40-47
-
-
Csiszár, I.1
-
23
-
-
0031701886
-
Common randomness in information theory and cryptography, Part II: CR capacity
-
Jan
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part II: CR capacity," IEEE Trans. Inf. Theory, vol. 44, no. 1, pp. 225-240, Jan. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.1
, pp. 225-240
-
-
Ahlswede, R.1
Csiszár, I.2
-
24
-
-
0011321632
-
Repeated use of codes which detect deception
-
Mar
-
V. Fak, "Repeated use of codes which detect deception," IEEE Trans. Inf. Theory, vol. IT-25, no. 4, pp. 233-234, Mar. 1979.
-
(1979)
IEEE Trans. Inf. Theory
, vol.IT-25
, Issue.4
, pp. 233-234
-
-
Fak, V.1
-
25
-
-
0027607095
-
A lower bound on authentication after having observed a sequence of messages
-
Mar
-
U. Rosenbaum, "A lower bound on authentication after having observed a sequence of messages," J. Cryptol., vol. 6, pp. 135-156, Mar. 1993.
-
(1993)
J. Cryptol
, vol.6
, pp. 135-156
-
-
Rosenbaum, U.1
-
26
-
-
0028514064
-
Bounds on the probability of deception in multiple authentication
-
Sep
-
B. Smeets, "Bounds on the probability of deception in multiple authentication," IEEE Trans. Inf. Theory, vol. 40, no. 5, pp. 1586-1591, Sep. 1994.
-
(1994)
IEEE Trans. Inf. Theory
, vol.40
, Issue.5
, pp. 1586-1591
-
-
Smeets, B.1
|