메뉴 건너뛰기




Volumn , Issue , 2008, Pages 818-825

On the secrecy capacity of arbitrary wiretap channels

Author keywords

[No Author keywords available]

Indexed keywords

COMPOUND CHANNELS; PARALLEL CHANNELS; RANDOM CODING; SECRECY CAPACITIES; WIRETAP CHANNELS;

EID: 64549110900     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ALLERTON.2008.4797642     Document Type: Conference Paper
Times cited : (61)

References (20)
  • 1
    • 0016562514 scopus 로고
    • The Wire-Tap Channel
    • October
    • A. D. Wyner, "The Wire-Tap Channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1367, October 1975.
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1367
    • Wyner, A.D.1
  • 2
    • 0017973511 scopus 로고
    • Broadcast Channels with Confidential Messages
    • May
    • I. Csiszár and J. Körner, "Broadcast Channels with Confidential Messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 3
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, pp. 656-715, 1948.
    • (1948) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 6
    • 45249119255 scopus 로고    scopus 로고
    • Y. Liang, H. V. Poor, and S. Shamai (Shitz), Secure communication over fading channels, IEEE Trans. Inf. Theory, 54, no. 6, pp. 2470-2492, 2008.
    • Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, 2008.
  • 7
    • 84940647248 scopus 로고    scopus 로고
    • Y. Liang, G. Kramer, H. V. Poor, and S. S. (Shitz), Compound wire-tap channels, in Proc. of the Allerton Conference on Communications, Control, and Computing, Allerton, IL, September 2007.
    • Y. Liang, G. Kramer, H. V. Poor, and S. S. (Shitz), "Compound wire-tap channels," in Proc. of the Allerton Conference on Communications, Control, and Computing, Allerton, IL, September 2007.
  • 8
    • 45249092485 scopus 로고    scopus 로고
    • Secure broadcasting over fading channels
    • A. Khisti, A. Tchamkerten, and G. W. Wornell, "Secure broadcasting over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453-2469, 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2453-2469
    • Khisti, A.1    Tchamkerten, A.2    Wornell, G.W.3
  • 9
    • 40949147785 scopus 로고    scopus 로고
    • Multiple-access channels with confidential messages
    • March
    • Y. Liang and H. V. Poor, "Multiple-access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, March 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.3 , pp. 976-1002
    • Liang, Y.1    Poor, H.V.2
  • 10
    • 45249101530 scopus 로고    scopus 로고
    • The general gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
    • E. Tekin and A. Yener, "The general gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 11
    • 33645727315 scopus 로고    scopus 로고
    • General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel
    • April
    • M. Hayashi, "General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel," IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1562-1575, April 2006.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , Issue.4 , pp. 1562-1575
    • Hayashi, M.1
  • 14
    • 33749427184 scopus 로고    scopus 로고
    • On an upper bound of the secrecy capacity for a general wiretap channel
    • Adelaide, Australia, September
    • H. Koga and N. Sato, "On an upper bound of the secrecy capacity for a general wiretap channel," in Proc. International Symposium on Information Theory ISIT 2005, Adelaide, Australia, September 2005, pp. 1641-1645.
    • (2005) Proc. International Symposium on Information Theory ISIT 2005 , pp. 1641-1645
    • Koga, H.1    Sato, N.2
  • 15
    • 0003180975 scopus 로고
    • Certain results in coding theory for noisy channels
    • September
    • C. E. Shannon, "Certain results in coding theory for noisy channels," Inform. Contr., vol. 1, pp. 6-25, September 1957.
    • (1957) Inform. Contr , vol.1 , pp. 6-25
    • Shannon, C.E.1
  • 19
    • 84948960386 scopus 로고    scopus 로고
    • U. M. Maurer and S. Wolf, Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free, in Advances in Cryptology - Eurocrypt 2000, Lecture Notes in Computer Science. B. Preneel, 2000, p. 351.
    • U. M. Maurer and S. Wolf, "Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free," in Advances in Cryptology - Eurocrypt 2000, Lecture Notes in Computer Science. B. Preneel, 2000, p. 351.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.