-
1
-
-
0027629488
-
Common Randomness in Information Theory and Cryptography - Part I: Secret Sharing
-
July
-
R. Ahlswede and I. Csiszar, "Common Randomness in Information Theory and Cryptography - Part I: Secret Sharing," IEEE Trans. Inform. Theory, vol. IT-39, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.IT-39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
2
-
-
0031701886
-
Common Randomness in Information Theory and Cryptography - Part II: CR Capacity
-
January
-
R. Ahlswede and I. Csiszar, "Common Randomness in Information Theory and Cryptography - Part II: CR Capacity," IEEE Trans. Inform. Theory, vol. IT-44, pp. 225-240, January 1998.
-
(1998)
IEEE Trans. Inform. Theory
, vol.IT-44
, pp. 225-240
-
-
Ahlswede, R.1
Csiszar, I.2
-
3
-
-
0016486048
-
A Proof of the Data Compression Theorem of Slepain and Wolf for Ergodic Sources
-
March
-
T. M. Cover, "A Proof of the Data Compression Theorem of Slepain and Wolf for Ergodic Sources," IEEE Trans. Inform. Theory, vol. IT-22, pp. 226-228, March 1975.
-
(1975)
IEEE Trans. Inform. Theory
, vol.IT-22
, pp. 226-228
-
-
Cover, T.M.1
-
4
-
-
0017973511
-
Broadcast Channels with Confidential Messages
-
May
-
I. Csiszar and J. Korner, "Broadcast Channels with Confidential Messages," IEEE Trans. Inform. Th., Vol. IT - 24, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inform. Th
, vol.IT - 24
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
5
-
-
0033891095
-
Common Randomnness and Secret Key Generation with a Helper
-
March
-
I. Csiszar and P. Narayan, "Common Randomnness and Secret Key Generation with a Helper," IEEE Trans. Inform. Theory, vol. IT-46, pp. 344-366, March 2000.
-
(2000)
IEEE Trans. Inform. Theory
, vol.IT-46
, pp. 344-366
-
-
Csiszar, I.1
Narayan, P.2
-
6
-
-
51849113731
-
Secure Lossless Compression with Side Information
-
Porto, Portugal, May 5-9
-
D. Gundüz, E. Erkip, and H. V. Poor, "Secure Lossless Compression with Side Information," Proc. IEEE Inform. Theory Workshop, Porto, Portugal, May 5-9, 2008.
-
(2008)
Proc. IEEE Inform. Theory Workshop
-
-
Gundüz, D.1
Erkip, E.2
Poor, H.V.3
-
7
-
-
34547531639
-
On the Security of the XOR-Method in Biometric Authentication Systems
-
Noordwijk, The Netherlands, June 8-9
-
T. Ignatenko and F. Willems, "On the Security of the XOR-Method in Biometric Authentication Systems," Proc. 27th Symp. Inform. Theory Benelux, Noordwijk, The Netherlands, June 8-9, 2006, pp. 197-204.
-
(2006)
Proc. 27th Symp. Inform. Theory Benelux
, pp. 197-204
-
-
Ignatenko, T.1
Willems, F.2
-
9
-
-
0027599802
-
Secret Key Agreement by Public Discussion from Common Information
-
U. Maurer, "Secret Key Agreement by Public Discussion from Common Information," IEEE Trans. Inform. Theory, IT-39, pp. 733-742, 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.IT-39
, pp. 733-742
-
-
Maurer, U.1
-
10
-
-
46749089666
-
On Secure Distributed Source Coding
-
Lake Tahoe, California, Sept. 2-6
-
V. Prabhakaran and K. Ramchandran, "On Secure Distributed Source Coding," Proc. IEEE Inform. Theory Workshop, Lake Tahoe, California, Sept. 2-6, 2007, pp. 442-447.
-
(2007)
Proc. IEEE Inform. Theory Workshop
, pp. 442-447
-
-
Prabhakaran, V.1
Ramchandran, K.2
-
12
-
-
0031647696
-
The Common Randomness Capacity of a Pair of Independent Discrete Memoryless Channels
-
January
-
S. Venkatesan and V. Anantharam, "The Common Randomness Capacity of a Pair of Independent Discrete Memoryless Channels," IEEE Trans. Inform. Theory, vol. IT-44, pp. 215-224, January 1998.
-
(1998)
IEEE Trans. Inform. Theory
, vol.IT-44
, pp. 215-224
-
-
Venkatesan, S.1
Anantharam, V.2
-
13
-
-
0015681689
-
-
A. D. Wyner and J. Ziv, A Theorem on the Entropy of Certain Binary Sequences and Application: Part I, IEEE Trans. Inform. Th., V o l. I T - 19, No. 6, pp. 769-773, November 1973.
-
A. D. Wyner and J. Ziv, "A Theorem on the Entropy of Certain Binary Sequences and Application: Part I," IEEE Trans. Inform. Th., V o l. I T - 19, No. 6, pp. 769-773, November 1973.
-
-
-
-
14
-
-
0016882596
-
The Rate-Distortion Function for Source Coding with Side Information at the Decoder
-
January
-
A. D. Wyner and J. Ziv, "The Rate-Distortion Function for Source Coding with Side Information at the Decoder," IEEE Trans. Inform. Th., Vol. IT - 22, No. 1, pp. 1-10, January 1976.
-
(1976)
IEEE Trans. Inform. Th
, vol.IT - 22
, Issue.1
, pp. 1-10
-
-
Wyner, A.D.1
Ziv, J.2
-
15
-
-
33749443558
-
Secret and Private Key Constructions for Simple Multiterminal Source Models
-
Adelaide, Australia, Sept. 4-9
-
Chunxuan Ye and P. Narayan, "Secret and Private Key Constructions for Simple Multiterminal Source Models," Proc. IEEE Int. Symp. Inform. Theory, Adelaide, Australia, Sept. 4-9, 2005, pp. 2138-2141.
-
(2005)
Proc. IEEE Int. Symp. Inform. Theory
, pp. 2138-2141
-
-
Ye, C.1
Narayan, P.2
|