-
1
-
-
68349115329
-
Secrecy capacity of a class of orthogonal relay eavesdropper channels
-
to appear
-
V. Aggarwal, L. Sankar, A. R. Calderbank, and H. V. Poor, "Secrecy capacity of a class of orthogonal relay eavesdropper channels," EURASIP Journal on Wireless Communications and Networking, Special Issue on Wireless Physical Layer Security, to appear.
-
EURASIP Journal on Wireless Communications and Networking, Special Issue on Wireless Physical Layer Security
-
-
Aggarwal, V.1
Sankar, L.2
Calderbank, A.R.3
Poor, H.V.4
-
2
-
-
68349100495
-
-
R. Ahlswede, Multi-way communication channels, in Proceedings of the 2nd International Symposium on Information Theory (ISIT, 1971), pp. 23-52, Tsahkadsor, Armenian S.S.R.: Publishing House of the Hungarian Academy of Sciences, 1973.
-
R. Ahlswede, "Multi-way communication channels," in Proceedings of the 2nd International Symposium on Information Theory (ISIT, 1971), pp. 23-52, Tsahkadsor, Armenian S.S.R.: Publishing House of the Hungarian Academy of Sciences, 1973.
-
-
-
-
3
-
-
0034229404
-
Network information flow
-
July
-
R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, "Network information flow," IEEE Transactions on Information Theory, vol. 46, pp. 1204-1216, July 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
4
-
-
0027629488
-
Common randomness in information theory and cryptography - Part I: Secret sharing
-
July
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography - Part I: Secret sharing," IEEE Transactions on Information Theory, vol. 39, pp. 1121-1132, July 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
5
-
-
0031701886
-
Common randomness in information theory and cryptography-Part II: CR capacity
-
January
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-Part II: CR capacity," IEEE Transactions on Information Theory, vol. 44, pp. 225-240, January 1998.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, pp. 225-240
-
-
Ahlswede, R.1
Csiszár, I.2
-
6
-
-
68349123980
-
Identification via wire-tap channels
-
Trondheim, Norway, June-July
-
R. Ahlswede and Z. Zhang, "Identification via wire-tap channels," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), p. 352, Trondheim, Norway, June-July 1994.
-
(1994)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
, pp. 352
-
-
Ahlswede, R.1
Zhang, Z.2
-
7
-
-
0034317075
-
Key-agreement in ad hoc networks
-
N. Asokan and P. Ginzboorg, "Key-agreement in ad hoc networks," Computer Communications, vol. 23, no. 17, pp. 1627-1637, 2000.
-
(2000)
Computer Communications
, vol.23
, Issue.17
, pp. 1627-1637
-
-
Asokan, N.1
Ginzboorg, P.2
-
8
-
-
84940666980
-
Wireless network information flow
-
Monticello, IL, USA, September
-
A. Avestimehr, S. Diggavi, and D. Tse, "Wireless network information flow," in Proceedings of the 45th Annual Allerton Conference Communication, Control, and Computing, Monticello, IL, USA, September 2007.
-
(2007)
Proceedings of the 45th Annual Allerton Conference Communication, Control, and Computing
-
-
Avestimehr, A.1
Diggavi, S.2
Tse, D.3
-
9
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
Alexandria, VA, USA, October-November
-
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust key generation from signal envelopes in wireless networks," in Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 401-410, Alexandria, VA, USA, October-November 2007.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 401-410
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
10
-
-
64549100718
-
-
G. Bagherikaram, A. S. Motahari, and A. K. Khandani, Secure broadcasting: The secrecy rate region, in Proceedings of the 46th Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, September 2008. Also submitted to IEEE Transactions on Information Theory, December 2008.
-
G. Bagherikaram, A. S. Motahari, and A. K. Khandani, "Secure broadcasting: The secrecy rate region," in Proceedings of the 46th Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, September 2008. Also submitted to IEEE Transactions on Information Theory, December 2008.
-
-
-
-
12
-
-
45249104850
-
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, Wireless information-theoretic security, IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, 54, pp. 2515-2534, June 2008.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, vol. 54, pp. 2515-2534, June 2008.
-
-
-
-
13
-
-
68349099273
-
-
R. Bustin, R. Liu, H. V. Poor, and S. Shamai (Shitz), An MMSE approach to the secrecy capacity of the MIMO Gaussian wire-tap channel, EURASIP Journal on Wireless Communications and Networking, Special Issue on Wireless Physical Layer Security, to appear.
-
R. Bustin, R. Liu, H. V. Poor, and S. Shamai (Shitz), "An MMSE approach to the secrecy capacity of the MIMO Gaussian wire-tap channel," EURASIP Journal on Wireless Communications and Networking, Special Issue on Wireless Physical Layer Security, to appear.
-
-
-
-
14
-
-
70449511650
-
-
R. Bustin, R. Liu, H. V. Poor, and S. Shamai (Shitz), An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel, in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, June-July 2009.
-
R. Bustin, R. Liu, H. V. Poor, and S. Shamai (Shitz), "An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, June-July 2009.
-
-
-
-
15
-
-
31344438973
-
Key agreement in peer-to-peer wireless networks
-
February
-
M. Cagalj, S. Capkun, and J. P. Hubaux, "Key agreement in peer-to-peer wireless networks," Proceedings of the IEEE, vol. 94, pp. 467-478, February 2006.
-
(2006)
Proceedings of the IEEE
, vol.94
, pp. 467-478
-
-
Cagalj, M.1
Capkun, S.2
Hubaux, J.P.3
-
16
-
-
68349084965
-
Quantum privacy and quantum wire-tap channels
-
N. Cai, A. Winter, and R. W. Yeung, "Quantum privacy and quantum wire-tap channels," Problems of Information Transmission, vol. 40, no. 4, pp. 318-336, 2004.
-
(2004)
Problems of Information Transmission
, vol.40
, Issue.4
, pp. 318-336
-
-
Cai, N.1
Winter, A.2
Yeung, R.W.3
-
17
-
-
0036353798
-
Secure network coding
-
Lausanne, Switzerland, June-July
-
N. Cai and R. W. Yeung, "Secure network coding," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), p. 323, Lausanne, Switzerland, June-July 2002.
-
(2002)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
, pp. 323
-
-
Cai, N.1
Yeung, R.W.2
-
18
-
-
51649104348
-
A security condition for multi-source linear network coding
-
Nice, France, June
-
N. Cai and R. W. Yeung, "A security condition for multi-source linear network coding," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), pp. 561-565, Nice, France, June 2007.
-
(2007)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
, pp. 561-565
-
-
Cai, N.1
Yeung, R.W.2
-
19
-
-
0032668395
-
Optimal power control over fading channels
-
July
-
G. Caire, G. Taricco, and E. Biglieri, "Optimal power control over fading channels," IEEE Transactions on Information Theory, vol. 45, pp. 1468-1489, July 1999.
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, pp. 1468-1489
-
-
Caire, G.1
Taricco, G.2
Biglieri, E.3
-
20
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Oakland, CA, USA
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proceedings of the IEEE Symposium Security and Privacy, pp. 197-213, Oakland, CA, USA, 2003.
-
(2003)
Proceedings of the IEEE Symposium Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
23
-
-
0016486048
-
A proof of the data compression theorem of Slepian and Wolf for ergodic sources
-
T. M. Cover, "A proof of the data compression theorem of Slepian and Wolf for ergodic sources," IEEE Transactions on Information Theory, vol. IT-22, pp. 226-228, 1975.
-
(1975)
IEEE Transactions on Information Theory
, vol.IT-22
, pp. 226-228
-
-
Cover, T.M.1
-
26
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
R. Cramer and V. Shoup, "Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack," SIAM Journal on Computing, vol. 33, no. 1, pp. 167-226, 2004.
-
(2004)
SIAM Journal on Computing
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
28
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
March
-
I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Transactions on Information Theory, vol. 46, pp. 344-366, March 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, pp. 344-366
-
-
Csiszár, I.1
Narayan, P.2
-
30
-
-
45249104852
-
-
I. Csiszár and P. Narayan, Secrecy capacities for multiterminal channel models, IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, 54, pp. 2437-2452, June 2008.
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiterminal channel models," IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, vol. 54, pp. 2437-2452, June 2008.
-
-
-
-
31
-
-
38049165151
-
Secure hybrid encryption from weakened key encapsulation
-
Santa Barbara, CA, USA, August
-
H. Dennis and E. Kiltz, "Secure hybrid encryption from weakened key encapsulation," in Proceedings of the 27th Annual International Cryptology Conference (CRYPTO), pp. 553-571, Santa Barbara, CA, USA, August 2007.
-
(2007)
Proceedings of the 27th Annual International Cryptology Conference (CRYPTO)
, pp. 553-571
-
-
Dennis, H.1
Kiltz, E.2
-
32
-
-
68349088408
-
Information-theoretic secure identification
-
Cambridge, MA, USA, August
-
Y. Desmedt, "Information-theoretic secure identification," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), p. 296, Cambridge, MA, USA, August 1998.
-
(1998)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
, pp. 296
-
-
Desmedt, Y.1
-
33
-
-
70349218031
-
Amplify-and- forward based cooperation for secure wireless communications
-
Taipei, Taiwan, April
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Amplify-and- forward based cooperation for secure wireless communications," in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Taipei, Taiwan, April 2009.
-
(2009)
Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
34
-
-
72349099904
-
Cooperative jamming for wireless physical layer security
-
Cardiff, Wales, UK, August-September
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Cooperative jamming for wireless physical layer security," in Proceedings of the IEEE Workshop on Statistical Signal Processing, Cardiff, Wales, UK, August-September 2009.
-
(2009)
Proceedings of the IEEE Workshop on Statistical Signal Processing
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
35
-
-
32844459414
-
A key predistribution scheme for sensor networks using deployment knowledge
-
January-March
-
W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, "A key predistribution scheme for sensor networks using deployment knowledge," IEEE Communications Survey and Tutorials, vol. 3, pp. 62-77, January-March 2006.
-
(2006)
IEEE Communications Survey and Tutorials
, vol.3
, pp. 62-77
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
36
-
-
0003179124
-
Capacity of the product and sum of two unmatched broadcast channels
-
January-March
-
A. A. El Gamal, "Capacity of the product and sum of two unmatched broadcast channels," Problems of Information Transmission, vol. 16, pp. 1-16, January-March 1980.
-
(1980)
Problems of Information Transmission
, vol.16
, pp. 1-16
-
-
El Gamal, A.A.1
-
37
-
-
26844546304
-
Lattices which are good for (almost) everything
-
October
-
U. Erez, S. Litsyn, and R. Zamir, "Lattices which are good for (almost) everything," IEEE Transactions on Information Theory, vol. 51, pp. 3401-3416, October 2005.
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, pp. 3401-3416
-
-
Erez, U.1
Litsyn, S.2
Zamir, R.3
-
38
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington DC, USA
-
L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41-47, Washington DC, USA, 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
39
-
-
33750025166
-
On the capacity of secure network coding
-
Monticello, IL, USA, September
-
J. Feldman, T. Malkin, R. A. Servedio, and C. Stein, "On the capacity of secure network coding," in Proceedings of the 42nd Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, September 2004.
-
(2004)
Proceedings of the 42nd Annual Allerton Conference on Communication, Control, and Computing
-
-
Feldman, J.1
Malkin, T.2
Servedio, R.A.3
Stein, C.4
-
40
-
-
39349092611
-
Network coding applications
-
C. Fragouli and E. Soljanin, "Network coding applications," Foundations and Trends in Networking, vol. 2, no. 2, pp. 135-269, 2007.
-
(2007)
Foundations and Trends in Networking
, vol.2
, Issue.2
, pp. 135-269
-
-
Fragouli, C.1
Soljanin, E.2
-
41
-
-
34347246347
-
Network coding fundamentals
-
C. Fragouli and E. Soljanin, "Network coding fundamentals," Foundations and Trends in Networking, vol. 2, no. 1, pp. 1-133, 2007.
-
(2007)
Foundations and Trends in Networking
, vol.2
, Issue.1
, pp. 1-133
-
-
Fragouli, C.1
Soljanin, E.2
-
42
-
-
0019148101
-
Coding for channel with random parameters
-
S. I. Gelfand and M. S. Pinsker, "Coding for channel with random parameters," Problems of Control and Information Theory, vol. 9, no. 1, pp. 19-31, 1980.
-
(1980)
Problems of Control and Information Theory
, vol.9
, Issue.1
, pp. 19-31
-
-
Gelfand, S.I.1
Pinsker, M.S.2
-
43
-
-
68349093110
-
-
A. A. Gohari and V. Anantharam, Information-theoretic key agreement of multiple terminals - Part II: Channel model, Preprint, Available at http://www.eecs.berkeley.edu/̃aminzade/Channel Model.pdf. December 2007.
-
A. A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals - Part II: Channel model," Preprint, Available at http://www.eecs.berkeley.edu/̃aminzade/Channel Model.pdf. December 2007.
-
-
-
-
44
-
-
68349083803
-
-
A. A. Gohari and V. Anantharam, Information-theoretic key agreement of multiple terminals - Part I: Source model, Preprint, Available at http://www.eecs.berkeley.edu/̃aminzade/Source Model.pdf. December 2007.
-
A. A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals - Part I: Source model," Preprint, Available at http://www.eecs.berkeley.edu/̃aminzade/Source Model.pdf. December 2007.
-
-
-
-
46
-
-
52349099669
-
New bounds on the information-theoretic key agreement of multiple terminals
-
Toronto, Ontario, Canada, July
-
A. A. Gohari and V. Anantharam, "New bounds on the information-theoretic key agreement of multiple terminals," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Toronto, Ontario, Canada, July 2008.
-
(2008)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
-
-
Gohari, A.A.1
Anantharam, V.2
-
47
-
-
0031272703
-
Capacity of fading channels with channel side information
-
November
-
A. Goldsmith and P. Varaiya, "Capacity of fading channels with channel side information," IEEE Transactions on Information Theory, vol. 43, pp. 1986-1992, November 1997.
-
(1997)
IEEE Transactions on Information Theory
, vol.43
, pp. 1986-1992
-
-
Goldsmith, A.1
Varaiya, P.2
-
48
-
-
54749106691
-
On the secrecy capacity of fading channels
-
October
-
P. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Transactions on Information Theory, vol. 54, pp. 4687-4698, October 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, pp. 4687-4698
-
-
Gopala, P.1
Lai, L.2
El Gamal, H.3
-
49
-
-
47849092063
-
Secrecy capacity of semi-deterministic wire-tap channels
-
Bergen, Norway, July
-
J. Grubb, S. Vishwanath, Y. Liang, and H. V. Poor, "Secrecy capacity of semi-deterministic wire-tap channels," in Proceedings of the IEEE Information Theory Workshop (ITW) on Information Theory for Wireless Networks, Bergen, Norway, July 2007.
-
(2007)
Proceedings of the IEEE Information Theory Workshop (ITW) on Information Theory for Wireless Networks
-
-
Grubb, J.1
Vishwanath, S.2
Liang, Y.3
Poor, H.V.4
-
50
-
-
77951118738
-
Secret communication with feedback
-
Auckland, New Zealand, December
-
D. Gündüz, D. R. Brown III, and H. V. Poor, "Secret communication with feedback," in Proceedings of the International Symposium on Information Theory and Its Applications (ISITA), Auckland, New Zealand, December 2008.
-
(2008)
Proceedings of the International Symposium on Information Theory and Its Applications (ISITA)
-
-
Gündüz, D.1
Brown III, D.R.2
Poor, H.V.3
-
51
-
-
52349088659
-
Lossless compression with security constraints
-
Toronto, Canada, July
-
D. Gündüz, E. Erkip, and H. V. Poor, "Lossless compression with security constraints," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Toronto, Canada, July 2008.
-
(2008)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
-
-
Gündüz, D.1
Erkip, E.2
Poor, H.V.3
-
52
-
-
68349108846
-
Secure compression with side information
-
La Jolla, CA, USA, January-February
-
D. Gündüz, E. Erkip, and H. V. Poor, "Secure compression with side information," in Proceedings of the 3rd Workshop on Information Theory and Applications (ITA), La Jolla, CA, USA, January-February 2008.
-
(2008)
Proceedings of the 3rd Workshop on Information Theory and Applications (ITA)
-
-
Gündüz, D.1
Erkip, E.2
Poor, H.V.3
-
53
-
-
50249162005
-
On the equivocation region of relay channels with orthogonal components
-
Pacific Grove, CA, USA, November
-
X. He and A. Yener, "On the equivocation region of relay channels with orthogonal components," in Proceedings of the Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, November 2007.
-
(2007)
Proceedings of the Asilomar Conference on Signals, Systems and Computers
-
-
He, X.1
Yener, A.2
-
54
-
-
52349100899
-
The role of an untrusted relay in secret communication
-
Toronto, Ontario, Canada, July
-
X. He and A. Yener, "The role of an untrusted relay in secret communication," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Toronto, Ontario, Canada, July 2008.
-
(2008)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
-
-
He, X.1
Yener, A.2
-
55
-
-
77950684549
-
K-user interference channels: Achievable secrecy rate and degrees of freedom
-
Volos, Greece, June
-
X. He and A. Yener, "K-user interference channels: Achievable secrecy rate and degrees of freedom," in Proceedings of the IEEE Information Theory Workshop (ITW), Volos, Greece, June 2009.
-
(2009)
Proceedings of the IEEE Information Theory Workshop (ITW)
-
-
He, X.1
Yener, A.2
-
56
-
-
70349665189
-
A new outer bound for the Gaussian interference channel with confidential messages
-
Baltimore, MD, USA, March
-
X. He and A. Yener, "A new outer bound for the Gaussian interference channel with confidential messages," in Proceedings of the Conference on Information Sciences and Systems (CISS), Baltimore, MD, USA, March 2009.
-
(2009)
Proceedings of the Conference on Information Sciences and Systems (CISS)
-
-
He, X.1
Yener, A.2
-
57
-
-
33947399169
-
A random linear network coding approach to multicast
-
October
-
T. Ho, R. Koetter, M. Medard, M. Effros, J. Shi, and D. Karger, "A random linear network coding approach to multicast," IEEE Transactions on Information Theory, vol. 52, pp. 4413-4430, October 2006.
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, pp. 4413-4430
-
-
Ho, T.1
Koetter, R.2
Medard, M.3
Effros, M.4
Shi, J.5
Karger, D.6
-
58
-
-
0002863426
-
Bounds for the quantity of information transmitted by a quantum communication channel
-
A. S. Holevo, "Bounds for the quantity of information transmitted by a quantum communication channel," Problems of Information Transmission, vol. 9, no. 3, pp. 177-183, 1973.
-
(1973)
Problems of Information Transmission
, vol.9
, Issue.3
, pp. 177-183
-
-
Holevo, A.S.1
-
59
-
-
0004015843
-
The capacity of the degraded spectral Gaussian broadcast channel,
-
PhD dissertation, Department of Electrical Engineering, Stanford University, Stanford, CA
-
D. Hughes-Hartogs, "The capacity of the degraded spectral Gaussian broadcast channel," PhD dissertation, Department of Electrical Engineering, Stanford University, Stanford, CA, 1975.
-
(1975)
-
-
Hughes-Hartogs, D.1
-
60
-
-
34547512629
-
-
T. Ignatenko and F. Willems, On privacy in secure biometric authentication systems, in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. II 121-II 124, Honolulu, HI, USA, May 2007.
-
T. Ignatenko and F. Willems, "On privacy in secure biometric authentication systems," in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. II 121-II 124, Honolulu, HI, USA, May 2007.
-
-
-
-
61
-
-
64549142823
-
Privacy leakage in biometric secrecy systems
-
Monticello, IL, USA, September
-
T. Ignatenko and F. Willems, "Privacy leakage in biometric secrecy systems," in Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, September 2008.
-
(2008)
Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing
-
-
Ignatenko, T.1
Willems, F.2
-
62
-
-
38349096129
-
Interference channels with common information
-
January
-
J. Jiang, Y. Xin, and H. K. Garg, "Interference channels with common information," IEEE Transactions on Information Theory, vol. 54, pp. 171-187, January 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, pp. 171-187
-
-
Jiang, J.1
Xin, Y.2
Garg, H.K.3
-
63
-
-
51649100462
-
Optimal power allocation for parallel Gaussian broadcast channels with independent and common information
-
Chicago, IL, USA, June-July
-
N. Jindal and A. Goldsmith, "Optimal power allocation for parallel Gaussian broadcast channels with independent and common information," in Proceedingsof the IEEE International Symposium on Information Theory (ISIT), Chicago, IL, USA, June-July 2004.
-
(2004)
Proceedingsof the IEEE International Symposium on Information Theory (ISIT)
-
-
Jindal, N.1
Goldsmith, A.2
-
64
-
-
52349099624
-
Broadcast channel with degraded source random variables and receiveride information
-
Toronto, Ontario, Canada, July
-
W. Kang and G. Kramer, "Broadcast channel with degraded source random variables and receiveride information," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Toronto, Ontario, Canada, July 2008.
-
(2008)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
-
-
Kang, W.1
Kramer, G.2
-
65
-
-
84943807207
-
Toward secure key distribution in truly ad-hoc networks
-
Orlando, FL, USA, January
-
A. Khalili, J. Katz, and W. A. Arbaugh, "Toward secure key distribution in truly ad-hoc networks," in Proceedings of the Symposium on Applications and the Internet Workshops (SAINT), pp. 27-31, Orlando, FL, USA, January 2003.
-
(2003)
Proceedings of the Symposium on Applications and the Internet Workshops (SAINT)
, pp. 27-31
-
-
Khalili, A.1
Katz, J.2
Arbaugh, W.A.3
-
66
-
-
52349090484
-
Secret key generation with correlated sources and noisy channels
-
Toronto, Ontario, Canada, July
-
A. Khisti, S. Diggavi, and G. W. Wornell, "Secret key generation with correlated sources and noisy channels," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Toronto, Ontario, Canada, July 2008.
-
(2008)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
-
-
Khisti, A.1
Diggavi, S.2
Wornell, G.W.3
-
67
-
-
45249092485
-
-
A. Khisti, A. Tchamkerten, and G. Wornell, Secure broadcasting, IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, 54, pp. 2453-2469, June 2008.
-
A. Khisti, A. Tchamkerten, and G. Wornell, "Secure broadcasting," IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, vol. 54, pp. 2453-2469, June 2008.
-
-
-
-
68
-
-
78650025803
-
The MIMOME channel
-
Monticello, IL, USA, September
-
A. Khisti and G. Wornell, "The MIMOME channel," in Proceedings of the 45th Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, USA, September 2007.
-
(2007)
Proceedings of the 45th Annual Allerton Conference on Communication, Control and Computing
-
-
Khisti, A.1
Wornell, G.2
-
69
-
-
76249131348
-
LDPC codes for the Gaussian wiretap channel
-
Taormina, Sicily, Italy, October
-
D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, and B.-J. Kwak, "LDPC codes for the Gaussian wiretap channel," in Proceedings of the IEEE Informaton Theory Workshop (ITW), Taormina, Sicily, Italy, October 2009.
-
(2009)
Proceedings of the IEEE Informaton Theory Workshop (ITW)
-
-
Klinc, D.1
Ha, J.2
McLaughlin, S.W.3
Barros, J.4
Kwak, B.-J.5
-
70
-
-
70449513409
-
-
M. Kobayashi, Y. Liang, S. Shamai (Shitz), and M. Debbah, On the compound MIMO broadcast channels with confidential messages, in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, June-July 2009.
-
M. Kobayashi, Y. Liang, S. Shamai (Shitz), and M. Debbah, "On the compound MIMO broadcast channels with confidential messages," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, June-July 2009.
-
-
-
-
71
-
-
0242334165
-
An algebraic approach to network coding
-
October
-
R. Koetter and M. Medard, "An algebraic approach to network coding," IEEE/ACM Transactions on Networking, vol. 11, pp. 782-795, October 2003.
-
(2003)
IEEE/ACM Transactions on Networking
, vol.11
, pp. 782-795
-
-
Koetter, R.1
Medard, M.2
-
72
-
-
68349105342
-
-
J. Körner and K. Marton, Comparison of two noisy channels, in Topics in Information Theory, (I. Csiszár and P. Elias, eds.), pp. 411-423, 1975. Colloquia Mathamatical Society János Bolyai, Amsterdam: North-Holland Publishers, 1977.
-
J. Körner and K. Marton, "Comparison of two noisy channels," in Topics in Information Theory, (I. Csiszár and P. Elias, eds.), pp. 411-423, 1975. Colloquia Mathamatical Society János Bolyai, Amsterdam: North-Holland Publishers, 1977.
-
-
-
-
73
-
-
52349105722
-
On the secure degrees of freedom in the K-user Gaussian interference channel
-
Toronto, Ontario, Canada, July
-
O. O. Koyluoglu, H. El Gamal, L. Lai, and H. V. Poor, "On the secure degrees of freedom in the K-user Gaussian interference channel," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Toronto, Ontario, Canada, July 2008.
-
(2008)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
-
-
Koyluoglu, O.O.1
El Gamal, H.2
Lai, L.3
Poor, H.V.4
-
74
-
-
46849113249
-
Topics in multi-user information theory
-
G. Kramer, "Topics in multi-user information theory," Foundations and Trends in Communications and Information Theory, vol. 4, nos. 4-5, pp. 265-444, 2008.
-
(2008)
Foundations and Trends in Communications and Information Theory
, vol.4
, Issue.4-5
, pp. 265-444
-
-
Kramer, G.1
-
75
-
-
26444619804
-
Cooperative strategies and capacity theorems for relay networks
-
September
-
G. Kramer, M. Gastpar, and P. Gupta, "Cooperative strategies and capacity theorems for relay networks," IEEE Transactions on Information Theory, vol. 51, pp. 3037-3063, September 2005.
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, pp. 3037-3063
-
-
Kramer, G.1
Gastpar, M.2
Gupta, P.3
-
76
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
September
-
L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Transactions on Information Theory, vol. 54, pp. 4005-4019, September 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
77
-
-
55349095058
-
The wiretap channel with feedback: Encryption over the channel
-
November
-
L. Lai, H. El Gamal, and H. V. Poor, "The wiretap channel with feedback: Encryption over the channel," IEEE Transactions on Information Theory, vol. 54, pp. 5059-5067, November 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, pp. 5059-5067
-
-
Lai, L.1
El Gamal, H.2
Poor, H.V.3
-
78
-
-
61349140043
-
Authentication over noisy channels
-
February
-
L. Lai, H. El Gamal, and H. V. Poor, "Authentication over noisy channels," IEEE Transactions on Information Theory, vol. 55, pp. 906-916, February 2009.
-
(2009)
IEEE Transactions on Information Theory
, vol.55
, pp. 906-916
-
-
Lai, L.1
El Gamal, H.2
Poor, H.V.3
-
79
-
-
64549127364
-
-
L. Lai, S.-W. Ho, and H. V. Poor, Privacy-security tradeoffs in biometric security systems, in Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing, pp. 23-26, Monticello, IL, USA, September 2008. Also submitted to IEEE Transactions on Information Theory, 2008.
-
L. Lai, S.-W. Ho, and H. V. Poor, "Privacy-security tradeoffs in biometric security systems," in Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing, pp. 23-26, Monticello, IL, USA, September 2008. Also submitted to IEEE Transactions on Information Theory, 2008.
-
-
-
-
80
-
-
68349091802
-
An information theoretic framework for biometric security systems
-
Sassari, Italy, June
-
L. Lai, S.-W. Ho, and H. V. Poor, "An information theoretic framework for biometric security systems," in Proceedings of the 3rd IAPR/IEEE International Conference on Biometrics, Sassari, Italy, June 2009.
-
(2009)
Proceedings of the 3rd IAPR/IEEE International Conference on Biometrics
-
-
Lai, L.1
Ho, S.-W.2
Poor, H.V.3
-
81
-
-
68349122951
-
Advanced topics in computation for control
-
Stanford University, Fall
-
S. Lall, "Advanced topics in computation for control," Lecture notes for Engr210b, Stanford University, Fall, 2004.
-
(2004)
Lecture notes for Engr210b
-
-
Lall, S.1
-
84
-
-
0035270116
-
Capacity and optimal resource allocation for fading broadcast channels - Part I: Ergodic capacity
-
March
-
L. Li and A. J. Goldsmith, "Capacity and optimal resource allocation for fading broadcast channels - Part I: Ergodic capacity," IEEE Transactions on Information Theory, vol. 47, pp. 1083-1102, March 2001.
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, pp. 1083-1102
-
-
Li, L.1
Goldsmith, A.J.2
-
85
-
-
0035271101
-
Capacity and optimal resource allocation for fading broadcast channels - Part II: Outage capacity
-
March
-
L. Li and A. J. Goldsmith, "Capacity and optimal resource allocation for fading broadcast channels - Part II: Outage capacity," IEEE Transactions on Information Theory, vol. 47, pp. 1103-1127, March 2001.
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, pp. 1103-1127
-
-
Li, L.1
Goldsmith, A.J.2
-
86
-
-
0037323073
-
Linear network coding
-
February
-
S.-Y. R. Li, R. W. Yeung, and N. Cai, "Linear network coding," IEEE Transactions on Information Theory, vol. 49, pp. 371-381, February 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, pp. 371-381
-
-
Li, S.-Y.R.1
Yeung, R.W.2
Cai, N.3
-
87
-
-
84940654702
-
Secrecy capacity of independent parallel channels
-
Monticello, IL, USA, September
-
Z. Li, R. Yates, and W. Trappe, "Secrecy capacity of independent parallel channels," in Proceedings of the 44th Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, USA, September 2006.
-
(2006)
Proceedings of the 44th Annual Allerton Conference on Communication, Control and Computing
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
88
-
-
52349084570
-
Secrecy capacity region of a class of onesided interference channel
-
Toronto, Ontario, Canada, July
-
Z. Li, R. D. Yates, and W. Trappe, "Secrecy capacity region of a class of onesided interference channel," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Toronto, Ontario, Canada, July 2008.
-
(2008)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
-
-
Li, Z.1
Yates, R.D.2
Trappe, W.3
-
89
-
-
84940647248
-
-
Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), Compound wire-tap channels, in Proceedings of the 45th Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, USA, September 2007.
-
Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), "Compound wire-tap channels," in Proceedings of the 45th Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, USA, September 2007.
-
-
-
-
90
-
-
69949135004
-
-
Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), Recent results on compound wire-tap channels, in Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Cannes, France, September 2008.
-
Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), "Recent results on compound wire-tap channels," in Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Cannes, France, September 2008.
-
-
-
-
91
-
-
77954445239
-
Secure communication over fading channels
-
Monticello, IL, USA, September
-
Y. Liang and H. V. Poor, "Secure communication over fading channels," in Proceedings of the 44th Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, USA, September 2006.
-
(2006)
Proceedings of the 44th Annual Allerton Conference on Communication, Control and Computing
-
-
Liang, Y.1
Poor, H.V.2
-
92
-
-
40949147785
-
Multiple access channels with confidential messages
-
March
-
Y. Liang and H. V. Poor, "Multiple access channels with confidential messages," IEEE Transactions on Information Theory, vol. 54, pp. 976-1002, March 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
93
-
-
45249119255
-
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), Secure communication over fading channels, IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, 54, pp. 2470-2492, June 2008.
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, vol. 54, pp. 2470-2492, June 2008.
-
-
-
-
94
-
-
67949100557
-
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), Physical layer security in broadcast networks, Security and Communication Networks, 2, pp. 227-238, Wiley, May-June 2009.
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Physical layer security in broadcast networks," Security and Communication Networks, vol. 2, pp. 227-238, Wiley, May-June 2009.
-
-
-
-
95
-
-
52949087579
-
Wireless broadcast networks: Reliability, security and stability
-
La Jolla, CA, USA, January-February
-
Y. Liang, H. V. Poor, and L. Ying, "Wireless broadcast networks: Reliability, security and stability," in Proceedings of the 3rd Workshop on Information Theory and Applications (ITA), La Jolla, CA, USA, January-February 2008.
-
(2008)
Proceedings of the 3rd Workshop on Information Theory and Applications (ITA)
-
-
Liang, Y.1
Poor, H.V.2
Ying, L.3
-
96
-
-
61349186445
-
-
Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai (Shitz), and S. Verdú, Capacity of cognitive interference channels with and without secrecy, IEEE Transactions on Information Theory, 55, pp. 604-619, February 2009.
-
Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai (Shitz), and S. Verdú, "Capacity of cognitive interference channels with and without secrecy," IEEE Transactions on Information Theory, vol. 55, pp. 604-619, February 2009.
-
-
-
-
97
-
-
35148864632
-
-
Y. Liang, V. V. Veeravalli, and H. V. Poor, Resource allocation for wireless fading relay channels: Max-min solution, IEEE Transactions on Information Theory, Special Issue on Models, Theory and Codes for Relaying and Cooperation in Communication Networks, 53, pp. 3432-3453, October 2007.
-
Y. Liang, V. V. Veeravalli, and H. V. Poor, "Resource allocation for wireless fading relay channels: Max-min solution," IEEE Transactions on Information Theory, Special Issue on Models, Theory and Codes for Relaying and Cooperation in Communication Networks, vol. 53, pp. 3432-3453, October 2007.
-
-
-
-
98
-
-
0003914376
-
Multiple access channels,
-
Ph.D. thesis, Department of Electrical Engineering, University of Hawaii, Honolulu, HI
-
H. Liao, "Multiple access channels," Ph.D. thesis, Department of Electrical Engineering, University of Hawaii, Honolulu, HI, 1972.
-
(1972)
-
-
Liao, H.1
-
99
-
-
0003476270
-
-
2nd Edition. Upper Saddle River, NJ, USA: Pearson Education, Inc
-
S. Lin and D. J. Costello, Error Control Coding, 2nd Edition. Upper Saddle River, NJ, USA: Pearson Education, Inc., 2004.
-
(2004)
Error Control Coding
-
-
Lin, S.1
Costello, D.J.2
-
100
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Washington DC, USA
-
D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," in Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 52-61, Washington DC, USA, 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
101
-
-
45249114841
-
Secure nested codes for type II wire-tap channels
-
Lake Tahoe, CA, USA, September
-
R. Liu, Y. Liang, H. V. Poor, and P. Spasojevic, "Secure nested codes for type II wire-tap channels," in Proceedings of the IEEE Information Theory Workshop (ITW), Lake Tahoe, CA, USA, September 2007.
-
(2007)
Proceedings of the IEEE Information Theory Workshop (ITW)
-
-
Liu, R.1
Liang, Y.2
Poor, H.V.3
Spasojevic, P.4
-
102
-
-
70449472879
-
-
R. Liu, T. Liu, H. V. Poor, and S. Shamai (Shitz), MIMO Gaussian broadcast channels with confidential messages, in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, June-July 2009. Also submitted to IEEE Transactions on Information Theory, 2009.
-
R. Liu, T. Liu, H. V. Poor, and S. Shamai (Shitz), "MIMO Gaussian broadcast channels with confidential messages," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, June-July 2009. Also submitted to IEEE Transactions on Information Theory, 2009.
-
-
-
-
103
-
-
84940648008
-
Discrete memoryless interference and broadcast channels with confidential messages
-
Monticello, IL, USA, September
-
R. Liu, I. Maric, P. Spasojevic, and R. Yates, "Discrete memoryless interference and broadcast channels with confidential messages," in Proceedings of the 44th Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, USA, September 2006.
-
(2006)
Proceedings of the 44th Annual Allerton Conference on Communication, Control and Computing
-
-
Liu, R.1
Maric, I.2
Spasojevic, P.3
Yates, R.4
-
104
-
-
45249090083
-
-
R. Liu, I. Maric, P. Spasojevic, and R. Yates, Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions, IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, 54, pp. 2493-2507, June 2008.
-
R. Liu, I. Maric, P. Spasojevic, and R. Yates, "Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions," IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, vol. 54, pp. 2493-2507, June 2008.
-
-
-
-
105
-
-
39049089566
-
The discrete memoryless multiple access channel with confidential messages
-
Seattle, WA, USA, July
-
R. Liu, I. Maric, R. Yates, and P. Spasojevic, "The discrete memoryless multiple access channel with confidential messages," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Seattle, WA, USA, July 2006.
-
(2006)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
-
-
Liu, R.1
Maric, I.2
Yates, R.3
Spasojevic, P.4
-
106
-
-
62749109096
-
Secrecy capacity region of a multi-antenna Gaussian broadcast channel with confidential messages
-
March
-
R. Liu and H. V. Poor, "Secrecy capacity region of a multi-antenna Gaussian broadcast channel with confidential messages," IEEE Transactions on Information Theory, vol. 55, pp. 1235-1249, March 2009.
-
(2009)
IEEE Transactions on Information Theory
, vol.55
, pp. 1235-1249
-
-
Liu, R.1
Poor, H.V.2
-
107
-
-
52349104395
-
The secrecy capacity of a class of parallel Gaussian compound wiretap channels
-
Toronto, Ontario, Canada, July
-
T. Liu, V. Prabhakaran, and S. Vishwanath, "The secrecy capacity of a class of parallel Gaussian compound wiretap channels," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Toronto, Ontario, Canada, July 2008.
-
(2008)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
-
-
Liu, T.1
Prabhakaran, V.2
Vishwanath, S.3
-
108
-
-
66949180834
-
-
T. Liu and S. Shamai (Shitz), A note on the secrecy capacity of the multi-antenna wire-tap channel, IEEE Transactions on Information Theory, 55, pp. 2547-2553, June 2009.
-
T. Liu and S. Shamai (Shitz), "A note on the secrecy capacity of the multi-antenna wire-tap channel," IEEE Transactions on Information Theory, vol. 55, pp. 2547-2553, June 2009.
-
-
-
-
109
-
-
34248373869
-
An extremal inequality motivated by multiterminal information-theoretic problems
-
May
-
T. Liu and P. Viswanath, "An extremal inequality motivated by multiterminal information-theoretic problems," IEEE Transactions on Information Theory, vol. 53, pp. 1839-1851, May 2007.
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, pp. 1839-1851
-
-
Liu, T.1
Viswanath, P.2
-
110
-
-
39349098274
-
Separate enciphering of correlated messages for confidentiality in distributed networks
-
Washington DC, USA, November
-
W. Luh and D. Kundur, "Separate enciphering of correlated messages for confidentiality in distributed networks," in Proceedings of the IEEE Global Communications Conference (GLOBECOM), Washington DC, USA, November 2007.
-
(2007)
Proceedings of the IEEE Global Communications Conference (GLOBECOM)
-
-
Luh, W.1
Kundur, D.2
-
111
-
-
77951096439
-
MIMO broadcasting with common, private and confidential messages
-
Auckland, New Zealand, December
-
H. D. Ly, T. Liu, and Y. Liang, "MIMO broadcasting with common, private and confidential messages," in Proceedings of the International Symposium on Information Theory and Its Applications (ISITA), Auckland, New Zealand, December 2008.
-
(2008)
Proceedings of the International Symposium on Information Theory and Its Applications (ISITA)
-
-
Ly, H.D.1
Liu, T.2
Liang, Y.3
-
112
-
-
0018467629
-
A coding theorem for the discrete memoryless broadcast channel
-
May
-
K. Marton, "A coding theorem for the discrete memoryless broadcast channel," IEEE Transactions on Information Theory, vol. 25, pp. 306-311, May 1979.
-
(1979)
IEEE Transactions on Information Theory
, vol.25
, pp. 306-311
-
-
Marton, K.1
-
113
-
-
0347909351
-
Contemporary cryptology - An introduction
-
G. J. Simmons, ed, Piscataway, NJ, USA: IEEE Press
-
J. L. Massey, "Contemporary cryptology - An introduction," in Contemporary Cryptology - The Science of Information Integrity, (G. J. Simmons, ed.), Piscataway, NJ, USA: IEEE Press, 1992.
-
(1992)
Contemporary Cryptology - The Science of Information Integrity
-
-
Massey, J.L.1
-
114
-
-
0034228863
-
Authentication theory and hypothesis testing
-
July
-
U. Maurer, "Authentication theory and hypothesis testing," IEEE Transactions on Information Theory, vol. 46, pp. 1350-1356, July 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, pp. 1350-1356
-
-
Maurer, U.1
-
115
-
-
68349100488
-
Provably secure key distribution based on independent channels
-
Veldhoven, The Netherlands, June
-
U. M. Maurer, "Provably secure key distribution based on independent channels," in Proceedings of the IEEE Information Theory Workshop (ITW), Veldhoven, The Netherlands, June 1990.
-
(1990)
Proceedings of the IEEE Information Theory Workshop (ITW)
-
-
Maurer, U.M.1
-
116
-
-
0027599802
-
Secret-key agreement by public discussion based on common information
-
May
-
U. M. Maurer, "Secret-key agreement by public discussion based on common information," IEEE Transactions on Information Theory, vol. 39, pp. 733-742, May 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.M.1
-
117
-
-
0034450066
-
From weak to strong information-theoretic key agreement
-
Sorrento, Italy, June
-
U. M. Maurer and S. Wolf, "From weak to strong information-theoretic key agreement," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), p. 18, Sorrento, Italy, June 2000.
-
(2000)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
, pp. 18
-
-
Maurer, U.M.1
Wolf, S.2
-
118
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Proceedings of the EUROCRYPT 2000 on Advances in Cryptology, Berlin, Germany: Springer
-
U. M. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Proceedings of the EUROCRYPT 2000 on Advances in Cryptology, vol. 1807, pp. 352-368, Lecture Notes in Computer Science, Berlin, Germany: Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 352-368
-
-
Maurer, U.M.1
Wolf, S.2
-
119
-
-
0037396695
-
Secret-key agreement over unauthenticated public channels - Part I. Definitions and a completeness result
-
April
-
U. M. Maurer and S.Wolf, "Secret-key agreement over unauthenticated public channels - Part I. Definitions and a completeness result," IEEE Transactions on Information Theory, vol. 49, pp. 822-831, April 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, pp. 822-831
-
-
Maurer, U.M.1
Wolf, S.2
-
120
-
-
0037399113
-
Secret-key agreement over unauthenticated public channels - Part II. Privacy amplification
-
April
-
U. M. Maurer and S.Wolf, "Secret-key agreement over unauthenticated public channels - Part II. Privacy amplification," IEEE Transactions on Information Theory, vol. 49, pp. 832-838, April 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, pp. 832-838
-
-
Maurer, U.M.1
Wolf, S.2
-
121
-
-
0037396951
-
Secret-key agreement over unauthenticated public channels - Part III. Privacy amplification
-
April
-
U. M. Maurer and S.Wolf, "Secret-key agreement over unauthenticated public channels - Part III. Privacy amplification," IEEE Transactions on Information Theory, vol. 49, pp. 839-851, April 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, pp. 839-851
-
-
Maurer, U.M.1
Wolf, S.2
-
122
-
-
84944878354
-
-
Boca Raton, FL, USA: CRC Press
-
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC Press, 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
van Oorschot, P.C.2
Vanstone, S.A.3
-
123
-
-
33646073724
-
An achievable region for the Gaussian wiretap channel with side information
-
May
-
C. Mitrpant, A. J. H. Vinck, and Y. Luo, "An achievable region for the Gaussian wiretap channel with side information," IEEE Transactions on Information Theory, vol. 52, pp. 2181-2190, May 2006.
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, pp. 2181-2190
-
-
Mitrpant, C.1
Vinck, A.J.H.2
Luo, Y.3
-
124
-
-
33747886952
-
Secret-key agreement from correlated source outputs using low density parity check matrices
-
J. Muramatsu, "Secret-key agreement from correlated source outputs using low density parity check matrices," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E89-A, no. 7, pp. 2036-2046, 2006.
-
(2006)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E89-A
, Issue.7
, pp. 2036-2046
-
-
Muramatsu, J.1
-
125
-
-
52349088850
-
Secret-key generation for correlated Gaussian sources
-
Toronto, Ontario, Canada, July
-
S. Nitinawarat, "Secret-key generation for correlated Gaussian sources," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), pp. 702-706, Toronto, Ontario, Canada, July 2008.
-
(2008)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
, pp. 702-706
-
-
Nitinawarat, S.1
-
126
-
-
45249118588
-
Secret-key generation for correlated Gaussian sources
-
Monticello, IL, USA, September
-
S. Nitinawarat, "Secret-key generation for correlated Gaussian sources," in Proceedings of the 45th Annual Allerton Conference on Communication, Control and Computing, pp. 1054-1058, Monticello, IL, USA, September 2007.
-
(2007)
Proceedings of the 45th Annual Allerton Conference on Communication, Control and Computing
, pp. 1054-1058
-
-
Nitinawarat, S.1
-
127
-
-
84940667036
-
The secrecy capacity of the MIMO wire-tap channel
-
Monticello, IL, USA, September
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wire-tap channel," in Proceedings of the 45th Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, USA, September 2007.
-
(2007)
Proceedings of the 45th Annual Allerton Conference on Communication, Control and Computing
-
-
Oggier, F.1
Hassibi, B.2
-
128
-
-
33847126189
-
Secret-key generation exploiting antenna beam steering and wave propagation reciprocity
-
Paris, France, October
-
T. Ohira, "Secret-key generation exploiting antenna beam steering and wave propagation reciprocity," in Proceedings of the European Microwave Conference, Paris, France, October 2005.
-
(2005)
Proceedings of the European Microwave Conference
-
-
Ohira, T.1
-
129
-
-
84938932265
-
Coding for relay channels with confidential messages
-
Cairns, Australia, September
-
Y. Oohama, "Coding for relay channels with confidential messages," in Proceedings of the IEEE Information Theory Workshop (ITW), pp. 87-89, Cairns, Australia, September 2001.
-
(2001)
Proceedings of the IEEE Information Theory Workshop (ITW)
, pp. 87-89
-
-
Oohama, Y.1
-
130
-
-
51649095674
-
-
Y. Oohama, Relay channels with confidential messages, in Proceedings of the IEEE International Symposium on Information Theory (ISIT), pp. 926-930, Nice, France, June 2007. Also submitted to IEEE Transactions on Information Theory, 2007. Available at http://arxiv.org/PS cache/cs/pdf/0611/0611125v7.pdf.
-
Y. Oohama, "Relay channels with confidential messages," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), pp. 926-930, Nice, France, June 2007. Also submitted to IEEE Transactions on Information Theory, 2007. Available at http://arxiv.org/PS cache/cs/pdf/0611/0611125v7.pdf.
-
-
-
-
131
-
-
0036913621
-
Capacity-achieving sequences for the erasure channel
-
December
-
P. Oswald and M. Shokrollahi, "Capacity-achieving sequences for the erasure channel," IEEE Transactions on Information Theory, vol. 48, pp. 3017-3028, December 2002.
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, pp. 3017-3028
-
-
Oswald, P.1
Shokrollahi, M.2
-
133
-
-
33749450172
-
Secrecy capacity of SIMO and slow fading channels
-
Adelaide, Australia, September
-
P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), pp. 2152-2155, Adelaide, Australia, September 2005.
-
(2005)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
, pp. 2152-2155
-
-
Parada, P.1
Blahut, R.2
-
134
-
-
0141538021
-
Efficient and secure keys management for wireless mobile communications
-
Toulouse, France
-
R. D. Pietro, L. V. Mancini, and S. Jajodia, "Efficient and secure keys management for wireless mobile communications," in Proceedings of the 2nd ACM International Workshop on Principles of Mobile Computing, pp. 66-73, Toulouse, France, 2002.
-
(2002)
Proceedings of the 2nd ACM International Workshop on Principles of Mobile Computing
, pp. 66-73
-
-
Pietro, R.D.1
Mancini, L.V.2
Jajodia, S.3
-
135
-
-
52349084992
-
Secrecy via sources and channels: A secret key-secret message rate trade-off region
-
Toronto, Ontario, Canada, July
-
V. Prabhakaran, K. Eswaran, and K. Ramchandran, "Secrecy via sources and channels: A secret key-secret message rate trade-off region," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Toronto, Ontario, Canada, July 2008.
-
(2008)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
-
-
Prabhakaran, V.1
Eswaran, K.2
Ramchandran, K.3
-
136
-
-
46749089666
-
On secure distributed source coding
-
Lake Tahoe, CA, USA, September
-
V. Prabhakaran and K. Ramchandranr, "On secure distributed source coding," in Proceedings of the IEEE Information Theory Workshop (ITW), Lake Tahoe, CA, USA, September 2007.
-
(2007)
Proceedings of the IEEE Information Theory Workshop (ITW)
-
-
Prabhakaran, V.1
Ramchandranr, K.2
-
137
-
-
0021502824
-
Transmission over a multiple-access channel with a special source heirarchy
-
October-December
-
V. V. Prelov, "Transmission over a multiple-access channel with a special source heirarchy," Problems of Information Transmission, vol. 20, pp. 3-10, October-December 1984.
-
(1984)
Problems of Information Transmission
, vol.20
, pp. 3-10
-
-
Prelov, V.V.1
-
138
-
-
35248888499
-
New bounds in secret key agreement: The gap between formation and secrecy extraction
-
Proceedings of the EUROCRYPT on Advances in Cryptography, pp, Springer-Verlag
-
R. Renner and S. Wolf, "New bounds in secret key agreement: The gap between formation and secrecy extraction," in Proceedings of the EUROCRYPT on Advances in Cryptography, pp. 562-577, Lecture notes in Computer Science, Springer-Verlag, 2003.
-
(2003)
Lecture notes in Computer Science
, pp. 562-577
-
-
Renner, R.1
Wolf, S.2
-
141
-
-
0027607095
-
A lower bound on authentication after having observed a sequence of messages
-
U. Rosenbaum, "A lower bound on authentication after having observed a sequence of messages," Journal of Cryptology, vol. 6, no. 3, pp. 135-156, 1993.
-
(1993)
Journal of Cryptology
, vol.6
, Issue.3
, pp. 135-156
-
-
Rosenbaum, U.1
-
142
-
-
0017969522
-
An outer bound to the capacity region of broadcast channels
-
May
-
H. Sato, "An outer bound to the capacity region of broadcast channels," IEEE Transactions on Information Theory, vol. 24, pp. 374-377, May 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, pp. 374-377
-
-
Sato, H.1
-
144
-
-
68349095489
-
-
S. Shafiee, N. Liu, and S. Ulukus, Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel, IEEE Transactions on Information Theory, submitted in 2007.
-
S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel," IEEE Transactions on Information Theory, submitted in 2007.
-
-
-
-
145
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, pp. 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
146
-
-
84983269168
-
Authentication theory/coding theory
-
Proceedings of the CRYPTO'84 on Advances in Cryptography, pp, New York, NY, USA: Springer-Verlag
-
G. J. Simmons, "Authentication theory/coding theory," in Proceedings of the CRYPTO'84 on Advances in Cryptography, pp. 411-431, Lecture Notes in Computer Science, New York, NY, USA: Springer-Verlag, 1985.
-
(1985)
Lecture Notes in Computer Science
, pp. 411-431
-
-
Simmons, G.J.1
-
147
-
-
0015648934
-
Noiseless coding of correlated information sources
-
D. Slepian and J. K. Wolf, "Noiseless coding of correlated information sources," IEEE Transactions on Information Theory, vol. IT-19, pp. 471-480, 1973.
-
(1973)
IEEE Transactions on Information Theory
, vol.IT-19
, pp. 471-480
-
-
Slepian, D.1
Wolf, J.K.2
-
149
-
-
51849144195
-
Interference- assisted secret communication
-
Porto, Portugal, May
-
X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "Interference- assisted secret communication," in Proceedings of the IEEE Information Theory Workshop (ITW), Porto, Portugal, May 2008.
-
(2008)
Proceedings of the IEEE Information Theory Workshop (ITW)
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.V.4
-
150
-
-
64249156371
-
On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels
-
April
-
X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels," IEEE Transactions on Information Theory, vol. 55, pp. 1575-1591, April 2009.
-
(2009)
IEEE Transactions on Information Theory
, vol.55
, pp. 1575-1591
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.V.4
-
151
-
-
70449472881
-
Secret-key sharing based on layered broadcast coding over fading channels
-
Seoul, Korea, June-July
-
X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "Secret-key sharing based on layered broadcast coding over fading channels," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, June-July 2009.
-
(2009)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.V.4
-
152
-
-
84930890020
-
Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks
-
L. Tassiulas and A. Ephremides, "Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks," IEEE Transactions on Automatic Control, vol. 37, no. 12, pp. 1936-1948, 1992.
-
(1992)
IEEE Transactions on Automatic Control
, vol.37
, Issue.12
, pp. 1936-1948
-
-
Tassiulas, L.1
Ephremides, A.2
-
153
-
-
57349093480
-
The Gaussian multiple access wire-tap channel
-
December
-
E. Tekin and A. Yener, "The Gaussian multiple access wire-tap channel," IEEE Transactions on Information Theory, vol. 54, pp. 5747-5755, December 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, pp. 5747-5755
-
-
Tekin, E.1
Yener, A.2
-
154
-
-
45249101530
-
-
E. Tekin and A. Yener, The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming, IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, 54, pp. 2735-2751, June 2008.
-
E. Tekin and A. Yener, "The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming," IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, vol. 54, pp. 2735-2751, June 2008.
-
-
-
-
155
-
-
34547922334
-
Application of LDPC codes to the wiretap channel
-
August
-
A. Thangaraj, S. Dihidar, A. Calderbank, S. McLaughlin, and J.-M. Merolla, "Application of LDPC codes to the wiretap channel," IEEE Transactions on Information Theory, vol. 53, pp. 2933-2945, August 2007.
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.3
McLaughlin, S.4
Merolla, J.-M.5
-
156
-
-
46749089247
-
A deterministic model for wireless channels and its applications
-
Lake Tahoe, CA, USA, September
-
D. Tse, "A deterministic model for wireless channels and its applications," in Proceedings of the IEEE Information Theory Workshop (ITW), Lake Tahoe, CA, USA, September 2007.
-
(2007)
Proceedings of the IEEE Information Theory Workshop (ITW)
-
-
Tse, D.1
-
157
-
-
0030706705
-
Optimal power allocation over parallel Gaussian broadcast channels
-
Ulm, Germany, June
-
D. N. Tse, "Optimal power allocation over parallel Gaussian broadcast channels," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), p. 27, Ulm, Germany, June 1997.
-
(1997)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
, pp. 27
-
-
Tse, D.N.1
-
159
-
-
0031103783
-
On a special class of broadcast channels with confidential messages
-
March
-
M. van Dijk, "On a special class of broadcast channels with confidential messages," IEEE Transactions on Information Theory, vol. 43, pp. 712-714, March 1997.
-
(1997)
IEEE Transactions on Information Theory
, vol.43
, pp. 712-714
-
-
van Dijk, M.1
-
160
-
-
0031647696
-
The common randomness capacity of a pair of independent discrete memoryless channels
-
January
-
S. Venkatesan and V. Anantharam, "The common randomness capacity of a pair of independent discrete memoryless channels," IEEE Transactions on Information Theory, vol. 44, pp. 215-224, January 1998.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, pp. 215-224
-
-
Venkatesan, S.1
Anantharam, V.2
-
161
-
-
0033892497
-
The common randomness capacity of a network of discrete memoryless channels
-
March
-
S. Venkatesan and V. Anantharam, "The common randomness capacity of a network of discrete memoryless channels," IEEE Transactions on Information Theory, vol. 46, pp. 367-387, March 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, pp. 367-387
-
-
Venkatesan, S.1
Anantharam, V.2
-
162
-
-
0025594980
-
Information theoretic bounds for authentication schemes
-
M. Walker, "Information theoretic bounds for authentication schemes," Journal of Cryptology, vol. 2, no. 3, pp. 131-143, 1990.
-
(1990)
Journal of Cryptology
, vol.2
, Issue.3
, pp. 131-143
-
-
Walker, M.1
-
163
-
-
51649109883
-
On the secrecy capacity of fading wireless channel with multiple eavesdroppers
-
Nice, France, June
-
P. Wang, G. Yu, and Z. Zhang, "On the secrecy capacity of fading wireless channel with multiple eavesdroppers," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Nice, France, June 2007.
-
(2007)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
-
-
Wang, P.1
Yu, G.2
Zhang, Z.3
-
164
-
-
51649130455
-
-
H. Weingarten, T. Liu, S. Shamai (Shitz), Y. Steinberg, and P. Viswanath, The capacity region of the degraded MIMO compound broadcast channel, in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Nice, France, June 2007.
-
H. Weingarten, T. Liu, S. Shamai (Shitz), Y. Steinberg, and P. Viswanath, "The capacity region of the degraded MIMO compound broadcast channel," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Nice, France, June 2007.
-
-
-
-
165
-
-
33748578624
-
-
H. Weingarten, Y. Steinberg, and S. Shamai (Shitz), The capacity region of the Gaussian multiple-input multiple-output broadcast channel, IEEE Transactions on Information Theory, 52, pp. 3936-3964, September 2006.
-
H. Weingarten, Y. Steinberg, and S. Shamai (Shitz), "The capacity region of the Gaussian multiple-input multiple-output broadcast channel," IEEE Transactions on Information Theory, vol. 52, pp. 3936-3964, September 2006.
-
-
-
-
166
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in UWB channels
-
R. Wilson, D. Tse, and R. Scholtz, "Channel identification: Secret sharing using reciprocity in UWB channels," IEEE Transactions on Information Forensics and Security, pp. 364-375, 2007.
-
(2007)
IEEE Transactions on Information Forensics and Security
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.3
-
167
-
-
33947656426
-
Secure and efficient key management in mobile ad hoc networks
-
August
-
B. Wu, J. Wu, E. B. Ernandez, M. Ilyas, and S. Magliveras, "Secure and efficient key management in mobile ad hoc networks," Journal of Network and Computer Applications, vol. 30, pp. 937-954, August 2007.
-
(2007)
Journal of Network and Computer Applications
, vol.30
, pp. 937-954
-
-
Wu, B.1
Wu, J.2
Ernandez, E.B.3
Ilyas, M.4
Magliveras, S.5
-
168
-
-
0015992185
-
Recent results in the Shannon theory
-
January
-
A. D. Wyner, "Recent results in the Shannon theory," IEEE Transactions on Information Theory, vol. 20, pp. 2-10, January 1974.
-
(1974)
IEEE Transactions on Information Theory
, vol.20
, pp. 2-10
-
-
Wyner, A.D.1
-
169
-
-
0016562514
-
The wire-tap channel
-
October
-
A. D. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, pp. 1355-1387, October 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
170
-
-
0015681689
-
A theorem on the entropy of certain binary sequences and applications: Part I
-
November
-
A. D. Wyner and J. Ziv, "A theorem on the entropy of certain binary sequences and applications: Part I," IEEE Transactions on Information Theory, vol. 19, pp. 769-777, November 1973.
-
(1973)
IEEE Transactions on Information Theory
, vol.19
, pp. 769-777
-
-
Wyner, A.D.1
Ziv, J.2
-
171
-
-
51249120889
-
A physical-layer technique to enhance authentication for mobile terminals
-
Beijing, China, May
-
L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "A physical-layer technique to enhance authentication for mobile terminals," in Proceedings of the IEEE International Conference on Communications (ICC), pp. 1520-1524, Beijing, China, May 2008.
-
(2008)
Proceedings of the IEEE International Conference on Communications (ICC)
, pp. 1520-1524
-
-
Xiao, L.1
Greenstein, L.2
Mandayam, N.3
Trappe, W.4
-
172
-
-
68349099265
-
-
J. Xu, Y. Cao, and B. Chen, Capacity bounds for broadcast channels with confidential messages, IEEE Transactions on Information Theory, Submitted in May 2008.
-
J. Xu, Y. Cao, and B. Chen, "Capacity bounds for broadcast channels with confidential messages," IEEE Transactions on Information Theory, Submitted in May 2008.
-
-
-
-
173
-
-
0024666944
-
Coding theorem for secret sharing communication systems with two noisy channels
-
May
-
H. Yamamoto, "Coding theorem for secret sharing communication systems with two noisy channels," IEEE Transactions on Information Theory, vol. 35, pp. 572-578, May 1989.
-
(1989)
IEEE Transactions on Information Theory
, vol.35
, pp. 572-578
-
-
Yamamoto, H.1
-
174
-
-
0026153306
-
A coding theorem for secret sharing communication systems with two Gaussian wiretap channels
-
May
-
H. Yamamoto, "A coding theorem for secret sharing communication systems with two Gaussian wiretap channels," IEEE Transactions on Information Theory, vol. 37, pp. 634-638, May 1991.
-
(1991)
IEEE Transactions on Information Theory
, vol.37
, pp. 634-638
-
-
Yamamoto, H.1
-
175
-
-
52349106158
-
Secret communication on interference channels
-
Toronto, Ontario, Canada, July
-
R. D. Yates, D. Tse, and Z. Li, "Secret communication on interference channels," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Toronto, Ontario, Canada, July 2008.
-
(2008)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
-
-
Yates, R.D.1
Tse, D.2
Li, Z.3
-
176
-
-
33749443558
-
Secret key and private key constructions for simple multiterminal source models
-
Adelaide, Australia, September
-
C. Ye and P. Narayan, "Secret key and private key constructions for simple multiterminal source models," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), pp. 2133-2137, Adelaide, Australia, September 2005.
-
(2005)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
, pp. 2133-2137
-
-
Ye, C.1
Narayan, P.2
-
177
-
-
33749438006
-
The secret key-private key capacity region for three terminals
-
Baltimore, MD, USA
-
C. Ye and P. Narayan, "The secret key-private key capacity region for three terminals," in Proceedings of the 39th Annual Conference on Information Scienes and Systems (CISS), Baltimore, MD, USA, 2005.
-
(2005)
Proceedings of the 39th Annual Conference on Information Scienes and Systems (CISS)
-
-
Ye, C.1
Narayan, P.2
-
178
-
-
33749438006
-
The secret key-private key capacity region for three terminals
-
Adelaide, Australia, September
-
C. Ye and P. Narayan, "The secret key-private key capacity region for three terminals," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), pp. 2142-2146, Adelaide, Australia, September 2005.
-
(2005)
Proceedings of the IEEE International Symposium on Information Theory (ISIT)
, pp. 2142-2146
-
-
Ye, C.1
Narayan, P.2
-
179
-
-
33846198316
-
Network coding theory: Multiple sources
-
R. W. Yeung, S.-Y. R. Li, N. Cai, and Z. Zhang, "Network coding theory: Multiple sources," Foundations and Trends in Communications and Information Theory, vol. 2, no. 5, pp. 241-381, 2005.
-
(2005)
Foundations and Trends in Communications and Information Theory
, vol.2
, Issue.5
, pp. 241-381
-
-
Yeung, R.W.1
Li, S.-Y.R.2
Cai, N.3
Zhang, Z.4
-
180
-
-
33846198316
-
Network coding theory: Single sources
-
R. W. Yeung, S.-Y. R. Li, N. Cai, and Z. Zhang, "Network coding theory: Single sources," Foundations and Trends in Communications and Information Theory, vol. 2, no. 4, pp. 241-381, 2005.
-
(2005)
Foundations and Trends in Communications and Information Theory
, vol.2
, Issue.4
, pp. 241-381
-
-
Yeung, R.W.1
Li, S.-Y.R.2
Cai, N.3
Zhang, Z.4
-
181
-
-
13244255381
-
Composite key management for ad hoc networks
-
Boston, MA, USA, August
-
S. Yi and R. Kravets, "Composite key management for ad hoc networks," in Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous), pp. 52-61, Boston, MA, USA, August 2004.
-
(2004)
Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous)
, pp. 52-61
-
-
Yi, S.1
Kravets, R.2
-
182
-
-
0036611624
-
-
R. Zamir, S. Shamai (Shitz), and U. Erez, Nested linear/lattice codes for structured multiterminal binning, IEEE Transactions on Information Theory, 48, pp. 1250-1276, June 2002.
-
R. Zamir, S. Shamai (Shitz), and U. Erez, "Nested linear/lattice codes for structured multiterminal binning," IEEE Transactions on Information Theory, vol. 48, pp. 1250-1276, June 2002.
-
-
-
-
183
-
-
64249118727
-
Error exponents for asymmetric two-user discrete memoryless source-channel coding systems
-
April
-
Y. Zhong, F. Alajaji, and L. L. Campbell, "Error exponents for asymmetric two-user discrete memoryless source-channel coding systems," IEEE Transactions on Information Theory, vol. 55, pp. 1497-1518, April 2009.
-
(2009)
IEEE Transactions on Information Theory
, vol.55
, pp. 1497-1518
-
-
Zhong, Y.1
Alajaji, F.2
Campbell, L.L.3
-
184
-
-
18244376871
-
Efficient and robust key management for large mobile ad hoc networks
-
July
-
B. Zhu, F. Bao, R. H. Deng, M. S. Kankanhalli, and G. Wang, "Efficient and robust key management for large mobile ad hoc networks," Computer Networks, vol. 48, pp. 657-682, July 2005.
-
(2005)
Computer Networks
, vol.48
, pp. 657-682
-
-
Zhu, B.1
Bao, F.2
Deng, R.H.3
Kankanhalli, M.S.4
Wang, G.5
-
185
-
-
84943553152
-
Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach
-
Atlanta, GA, USA, November
-
S. Zhu, S. Xu, S. Setia, and S. Jajodia, "Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach," in Proceedings of the 11th IEEE International Conference on Network Protocols, pp. 326-335, Atlanta, GA, USA, November 2003.
-
(2003)
Proceedings of the 11th IEEE International Conference on Network Protocols
, pp. 326-335
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
|