메뉴 건너뛰기




Volumn 5, Issue 4-5, 2008, Pages 355-580

Information theoretic security

Author keywords

[No Author keywords available]

Indexed keywords

BROADCAST CHANNELS; CHANNEL MODEL; CODE DESIGNS; CODING SCHEME; COMMON RANDOMNESS; CROSS-LAYER DESIGN; GAUSSIANS; INFORMATION-THEORETIC SECURITY; INTERFERENCE CHANNELS; KEY AGREEMENT; MULTI-INPUT MULTI-OUTPUT; MULTI-USER NETWORKS; MULTIPLE ACCESS CHANNELS; RELAY CHANNELS; SECURE NETWORKS; SIDE INFORMATION; SOURCE-CODING;

EID: 68349116049     PISSN: 15672190     EISSN: 15672328     Source Type: Journal    
DOI: 10.1561/0100000036     Document Type: Article
Times cited : (673)

References (185)
  • 2
    • 68349100495 scopus 로고    scopus 로고
    • R. Ahlswede, Multi-way communication channels, in Proceedings of the 2nd International Symposium on Information Theory (ISIT, 1971), pp. 23-52, Tsahkadsor, Armenian S.S.R.: Publishing House of the Hungarian Academy of Sciences, 1973.
    • R. Ahlswede, "Multi-way communication channels," in Proceedings of the 2nd International Symposium on Information Theory (ISIT, 1971), pp. 23-52, Tsahkadsor, Armenian S.S.R.: Publishing House of the Hungarian Academy of Sciences, 1973.
  • 4
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography - Part I: Secret sharing
    • July
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography - Part I: Secret sharing," IEEE Transactions on Information Theory, vol. 39, pp. 1121-1132, July 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 5
    • 0031701886 scopus 로고    scopus 로고
    • Common randomness in information theory and cryptography-Part II: CR capacity
    • January
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-Part II: CR capacity," IEEE Transactions on Information Theory, vol. 44, pp. 225-240, January 1998.
    • (1998) IEEE Transactions on Information Theory , vol.44 , pp. 225-240
    • Ahlswede, R.1    Csiszár, I.2
  • 7
    • 0034317075 scopus 로고    scopus 로고
    • Key-agreement in ad hoc networks
    • N. Asokan and P. Ginzboorg, "Key-agreement in ad hoc networks," Computer Communications, vol. 23, no. 17, pp. 1627-1637, 2000.
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 10
    • 64549100718 scopus 로고    scopus 로고
    • G. Bagherikaram, A. S. Motahari, and A. K. Khandani, Secure broadcasting: The secrecy rate region, in Proceedings of the 46th Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, September 2008. Also submitted to IEEE Transactions on Information Theory, December 2008.
    • G. Bagherikaram, A. S. Motahari, and A. K. Khandani, "Secure broadcasting: The secrecy rate region," in Proceedings of the 46th Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, September 2008. Also submitted to IEEE Transactions on Information Theory, December 2008.
  • 12
    • 45249104850 scopus 로고    scopus 로고
    • M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, Wireless information-theoretic security, IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, 54, pp. 2515-2534, June 2008.
    • M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, vol. 54, pp. 2515-2534, June 2008.
  • 13
    • 68349099273 scopus 로고    scopus 로고
    • R. Bustin, R. Liu, H. V. Poor, and S. Shamai (Shitz), An MMSE approach to the secrecy capacity of the MIMO Gaussian wire-tap channel, EURASIP Journal on Wireless Communications and Networking, Special Issue on Wireless Physical Layer Security, to appear.
    • R. Bustin, R. Liu, H. V. Poor, and S. Shamai (Shitz), "An MMSE approach to the secrecy capacity of the MIMO Gaussian wire-tap channel," EURASIP Journal on Wireless Communications and Networking, Special Issue on Wireless Physical Layer Security, to appear.
  • 14
    • 70449511650 scopus 로고    scopus 로고
    • R. Bustin, R. Liu, H. V. Poor, and S. Shamai (Shitz), An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel, in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, June-July 2009.
    • R. Bustin, R. Liu, H. V. Poor, and S. Shamai (Shitz), "An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, June-July 2009.
  • 15
    • 31344438973 scopus 로고    scopus 로고
    • Key agreement in peer-to-peer wireless networks
    • February
    • M. Cagalj, S. Capkun, and J. P. Hubaux, "Key agreement in peer-to-peer wireless networks," Proceedings of the IEEE, vol. 94, pp. 467-478, February 2006.
    • (2006) Proceedings of the IEEE , vol.94 , pp. 467-478
    • Cagalj, M.1    Capkun, S.2    Hubaux, J.P.3
  • 16
  • 23
    • 0016486048 scopus 로고
    • A proof of the data compression theorem of Slepian and Wolf for ergodic sources
    • T. M. Cover, "A proof of the data compression theorem of Slepian and Wolf for ergodic sources," IEEE Transactions on Information Theory, vol. IT-22, pp. 226-228, 1975.
    • (1975) IEEE Transactions on Information Theory , vol.IT-22 , pp. 226-228
    • Cover, T.M.1
  • 26
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • R. Cramer and V. Shoup, "Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack," SIAM Journal on Computing, vol. 33, no. 1, pp. 167-226, 2004.
    • (2004) SIAM Journal on Computing , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 28
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • March
    • I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Transactions on Information Theory, vol. 46, pp. 344-366, March 2000.
    • (2000) IEEE Transactions on Information Theory , vol.46 , pp. 344-366
    • Csiszár, I.1    Narayan, P.2
  • 29
  • 30
    • 45249104852 scopus 로고    scopus 로고
    • I. Csiszár and P. Narayan, Secrecy capacities for multiterminal channel models, IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, 54, pp. 2437-2452, June 2008.
    • I. Csiszár and P. Narayan, "Secrecy capacities for multiterminal channel models," IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, vol. 54, pp. 2437-2452, June 2008.
  • 35
    • 32844459414 scopus 로고    scopus 로고
    • A key predistribution scheme for sensor networks using deployment knowledge
    • January-March
    • W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, "A key predistribution scheme for sensor networks using deployment knowledge," IEEE Communications Survey and Tutorials, vol. 3, pp. 62-77, January-March 2006.
    • (2006) IEEE Communications Survey and Tutorials , vol.3 , pp. 62-77
    • Du, W.1    Deng, J.2    Han, Y.S.3    Chen, S.4    Varshney, P.K.5
  • 36
    • 0003179124 scopus 로고
    • Capacity of the product and sum of two unmatched broadcast channels
    • January-March
    • A. A. El Gamal, "Capacity of the product and sum of two unmatched broadcast channels," Problems of Information Transmission, vol. 16, pp. 1-16, January-March 1980.
    • (1980) Problems of Information Transmission , vol.16 , pp. 1-16
    • El Gamal, A.A.1
  • 37
  • 43
    • 68349093110 scopus 로고    scopus 로고
    • A. A. Gohari and V. Anantharam, Information-theoretic key agreement of multiple terminals - Part II: Channel model, Preprint, Available at http://www.eecs.berkeley.edu/̃aminzade/Channel Model.pdf. December 2007.
    • A. A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals - Part II: Channel model," Preprint, Available at http://www.eecs.berkeley.edu/̃aminzade/Channel Model.pdf. December 2007.
  • 44
    • 68349083803 scopus 로고    scopus 로고
    • A. A. Gohari and V. Anantharam, Information-theoretic key agreement of multiple terminals - Part I: Source model, Preprint, Available at http://www.eecs.berkeley.edu/̃aminzade/Source Model.pdf. December 2007.
    • A. A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals - Part I: Source model," Preprint, Available at http://www.eecs.berkeley.edu/̃aminzade/Source Model.pdf. December 2007.
  • 47
    • 0031272703 scopus 로고    scopus 로고
    • Capacity of fading channels with channel side information
    • November
    • A. Goldsmith and P. Varaiya, "Capacity of fading channels with channel side information," IEEE Transactions on Information Theory, vol. 43, pp. 1986-1992, November 1997.
    • (1997) IEEE Transactions on Information Theory , vol.43 , pp. 1986-1992
    • Goldsmith, A.1    Varaiya, P.2
  • 55
    • 77950684549 scopus 로고    scopus 로고
    • K-user interference channels: Achievable secrecy rate and degrees of freedom
    • Volos, Greece, June
    • X. He and A. Yener, "K-user interference channels: Achievable secrecy rate and degrees of freedom," in Proceedings of the IEEE Information Theory Workshop (ITW), Volos, Greece, June 2009.
    • (2009) Proceedings of the IEEE Information Theory Workshop (ITW)
    • He, X.1    Yener, A.2
  • 58
    • 0002863426 scopus 로고
    • Bounds for the quantity of information transmitted by a quantum communication channel
    • A. S. Holevo, "Bounds for the quantity of information transmitted by a quantum communication channel," Problems of Information Transmission, vol. 9, no. 3, pp. 177-183, 1973.
    • (1973) Problems of Information Transmission , vol.9 , Issue.3 , pp. 177-183
    • Holevo, A.S.1
  • 59
    • 0004015843 scopus 로고
    • The capacity of the degraded spectral Gaussian broadcast channel,
    • PhD dissertation, Department of Electrical Engineering, Stanford University, Stanford, CA
    • D. Hughes-Hartogs, "The capacity of the degraded spectral Gaussian broadcast channel," PhD dissertation, Department of Electrical Engineering, Stanford University, Stanford, CA, 1975.
    • (1975)
    • Hughes-Hartogs, D.1
  • 60
    • 34547512629 scopus 로고    scopus 로고
    • T. Ignatenko and F. Willems, On privacy in secure biometric authentication systems, in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. II 121-II 124, Honolulu, HI, USA, May 2007.
    • T. Ignatenko and F. Willems, "On privacy in secure biometric authentication systems," in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. II 121-II 124, Honolulu, HI, USA, May 2007.
  • 63
    • 51649100462 scopus 로고    scopus 로고
    • Optimal power allocation for parallel Gaussian broadcast channels with independent and common information
    • Chicago, IL, USA, June-July
    • N. Jindal and A. Goldsmith, "Optimal power allocation for parallel Gaussian broadcast channels with independent and common information," in Proceedingsof the IEEE International Symposium on Information Theory (ISIT), Chicago, IL, USA, June-July 2004.
    • (2004) Proceedingsof the IEEE International Symposium on Information Theory (ISIT)
    • Jindal, N.1    Goldsmith, A.2
  • 67
    • 45249092485 scopus 로고    scopus 로고
    • A. Khisti, A. Tchamkerten, and G. Wornell, Secure broadcasting, IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, 54, pp. 2453-2469, June 2008.
    • A. Khisti, A. Tchamkerten, and G. Wornell, "Secure broadcasting," IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, vol. 54, pp. 2453-2469, June 2008.
  • 70
    • 70449513409 scopus 로고    scopus 로고
    • M. Kobayashi, Y. Liang, S. Shamai (Shitz), and M. Debbah, On the compound MIMO broadcast channels with confidential messages, in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, June-July 2009.
    • M. Kobayashi, Y. Liang, S. Shamai (Shitz), and M. Debbah, "On the compound MIMO broadcast channels with confidential messages," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, June-July 2009.
  • 71
    • 0242334165 scopus 로고    scopus 로고
    • An algebraic approach to network coding
    • October
    • R. Koetter and M. Medard, "An algebraic approach to network coding," IEEE/ACM Transactions on Networking, vol. 11, pp. 782-795, October 2003.
    • (2003) IEEE/ACM Transactions on Networking , vol.11 , pp. 782-795
    • Koetter, R.1    Medard, M.2
  • 72
    • 68349105342 scopus 로고    scopus 로고
    • J. Körner and K. Marton, Comparison of two noisy channels, in Topics in Information Theory, (I. Csiszár and P. Elias, eds.), pp. 411-423, 1975. Colloquia Mathamatical Society János Bolyai, Amsterdam: North-Holland Publishers, 1977.
    • J. Körner and K. Marton, "Comparison of two noisy channels," in Topics in Information Theory, (I. Csiszár and P. Elias, eds.), pp. 411-423, 1975. Colloquia Mathamatical Society János Bolyai, Amsterdam: North-Holland Publishers, 1977.
  • 75
    • 26444619804 scopus 로고    scopus 로고
    • Cooperative strategies and capacity theorems for relay networks
    • September
    • G. Kramer, M. Gastpar, and P. Gupta, "Cooperative strategies and capacity theorems for relay networks," IEEE Transactions on Information Theory, vol. 51, pp. 3037-3063, September 2005.
    • (2005) IEEE Transactions on Information Theory , vol.51 , pp. 3037-3063
    • Kramer, G.1    Gastpar, M.2    Gupta, P.3
  • 76
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • September
    • L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Transactions on Information Theory, vol. 54, pp. 4005-4019, September 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , pp. 4005-4019
    • Lai, L.1    El Gamal, H.2
  • 77
    • 55349095058 scopus 로고    scopus 로고
    • The wiretap channel with feedback: Encryption over the channel
    • November
    • L. Lai, H. El Gamal, and H. V. Poor, "The wiretap channel with feedback: Encryption over the channel," IEEE Transactions on Information Theory, vol. 54, pp. 5059-5067, November 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , pp. 5059-5067
    • Lai, L.1    El Gamal, H.2    Poor, H.V.3
  • 79
    • 64549127364 scopus 로고    scopus 로고
    • L. Lai, S.-W. Ho, and H. V. Poor, Privacy-security tradeoffs in biometric security systems, in Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing, pp. 23-26, Monticello, IL, USA, September 2008. Also submitted to IEEE Transactions on Information Theory, 2008.
    • L. Lai, S.-W. Ho, and H. V. Poor, "Privacy-security tradeoffs in biometric security systems," in Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing, pp. 23-26, Monticello, IL, USA, September 2008. Also submitted to IEEE Transactions on Information Theory, 2008.
  • 81
    • 68349122951 scopus 로고    scopus 로고
    • Advanced topics in computation for control
    • Stanford University, Fall
    • S. Lall, "Advanced topics in computation for control," Lecture notes for Engr210b, Stanford University, Fall, 2004.
    • (2004) Lecture notes for Engr210b
    • Lall, S.1
  • 84
    • 0035270116 scopus 로고    scopus 로고
    • Capacity and optimal resource allocation for fading broadcast channels - Part I: Ergodic capacity
    • March
    • L. Li and A. J. Goldsmith, "Capacity and optimal resource allocation for fading broadcast channels - Part I: Ergodic capacity," IEEE Transactions on Information Theory, vol. 47, pp. 1083-1102, March 2001.
    • (2001) IEEE Transactions on Information Theory , vol.47 , pp. 1083-1102
    • Li, L.1    Goldsmith, A.J.2
  • 85
    • 0035271101 scopus 로고    scopus 로고
    • Capacity and optimal resource allocation for fading broadcast channels - Part II: Outage capacity
    • March
    • L. Li and A. J. Goldsmith, "Capacity and optimal resource allocation for fading broadcast channels - Part II: Outage capacity," IEEE Transactions on Information Theory, vol. 47, pp. 1103-1127, March 2001.
    • (2001) IEEE Transactions on Information Theory , vol.47 , pp. 1103-1127
    • Li, L.1    Goldsmith, A.J.2
  • 89
    • 84940647248 scopus 로고    scopus 로고
    • Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), Compound wire-tap channels, in Proceedings of the 45th Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, USA, September 2007.
    • Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), "Compound wire-tap channels," in Proceedings of the 45th Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, USA, September 2007.
  • 90
    • 69949135004 scopus 로고    scopus 로고
    • Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), Recent results on compound wire-tap channels, in Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Cannes, France, September 2008.
    • Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), "Recent results on compound wire-tap channels," in Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Cannes, France, September 2008.
  • 92
    • 40949147785 scopus 로고    scopus 로고
    • Multiple access channels with confidential messages
    • March
    • Y. Liang and H. V. Poor, "Multiple access channels with confidential messages," IEEE Transactions on Information Theory, vol. 54, pp. 976-1002, March 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , pp. 976-1002
    • Liang, Y.1    Poor, H.V.2
  • 93
    • 45249119255 scopus 로고    scopus 로고
    • Y. Liang, H. V. Poor, and S. Shamai (Shitz), Secure communication over fading channels, IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, 54, pp. 2470-2492, June 2008.
    • Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, vol. 54, pp. 2470-2492, June 2008.
  • 94
    • 67949100557 scopus 로고    scopus 로고
    • Y. Liang, H. V. Poor, and S. Shamai (Shitz), Physical layer security in broadcast networks, Security and Communication Networks, 2, pp. 227-238, Wiley, May-June 2009.
    • Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Physical layer security in broadcast networks," Security and Communication Networks, vol. 2, pp. 227-238, Wiley, May-June 2009.
  • 96
    • 61349186445 scopus 로고    scopus 로고
    • Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai (Shitz), and S. Verdú, Capacity of cognitive interference channels with and without secrecy, IEEE Transactions on Information Theory, 55, pp. 604-619, February 2009.
    • Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai (Shitz), and S. Verdú, "Capacity of cognitive interference channels with and without secrecy," IEEE Transactions on Information Theory, vol. 55, pp. 604-619, February 2009.
  • 97
    • 35148864632 scopus 로고    scopus 로고
    • Y. Liang, V. V. Veeravalli, and H. V. Poor, Resource allocation for wireless fading relay channels: Max-min solution, IEEE Transactions on Information Theory, Special Issue on Models, Theory and Codes for Relaying and Cooperation in Communication Networks, 53, pp. 3432-3453, October 2007.
    • Y. Liang, V. V. Veeravalli, and H. V. Poor, "Resource allocation for wireless fading relay channels: Max-min solution," IEEE Transactions on Information Theory, Special Issue on Models, Theory and Codes for Relaying and Cooperation in Communication Networks, vol. 53, pp. 3432-3453, October 2007.
  • 98
    • 0003914376 scopus 로고
    • Multiple access channels,
    • Ph.D. thesis, Department of Electrical Engineering, University of Hawaii, Honolulu, HI
    • H. Liao, "Multiple access channels," Ph.D. thesis, Department of Electrical Engineering, University of Hawaii, Honolulu, HI, 1972.
    • (1972)
    • Liao, H.1
  • 99
    • 0003476270 scopus 로고    scopus 로고
    • 2nd Edition. Upper Saddle River, NJ, USA: Pearson Education, Inc
    • S. Lin and D. J. Costello, Error Control Coding, 2nd Edition. Upper Saddle River, NJ, USA: Pearson Education, Inc., 2004.
    • (2004) Error Control Coding
    • Lin, S.1    Costello, D.J.2
  • 102
    • 70449472879 scopus 로고    scopus 로고
    • R. Liu, T. Liu, H. V. Poor, and S. Shamai (Shitz), MIMO Gaussian broadcast channels with confidential messages, in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, June-July 2009. Also submitted to IEEE Transactions on Information Theory, 2009.
    • R. Liu, T. Liu, H. V. Poor, and S. Shamai (Shitz), "MIMO Gaussian broadcast channels with confidential messages," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, June-July 2009. Also submitted to IEEE Transactions on Information Theory, 2009.
  • 104
    • 45249090083 scopus 로고    scopus 로고
    • R. Liu, I. Maric, P. Spasojevic, and R. Yates, Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions, IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, 54, pp. 2493-2507, June 2008.
    • R. Liu, I. Maric, P. Spasojevic, and R. Yates, "Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions," IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, vol. 54, pp. 2493-2507, June 2008.
  • 106
    • 62749109096 scopus 로고    scopus 로고
    • Secrecy capacity region of a multi-antenna Gaussian broadcast channel with confidential messages
    • March
    • R. Liu and H. V. Poor, "Secrecy capacity region of a multi-antenna Gaussian broadcast channel with confidential messages," IEEE Transactions on Information Theory, vol. 55, pp. 1235-1249, March 2009.
    • (2009) IEEE Transactions on Information Theory , vol.55 , pp. 1235-1249
    • Liu, R.1    Poor, H.V.2
  • 108
    • 66949180834 scopus 로고    scopus 로고
    • T. Liu and S. Shamai (Shitz), A note on the secrecy capacity of the multi-antenna wire-tap channel, IEEE Transactions on Information Theory, 55, pp. 2547-2553, June 2009.
    • T. Liu and S. Shamai (Shitz), "A note on the secrecy capacity of the multi-antenna wire-tap channel," IEEE Transactions on Information Theory, vol. 55, pp. 2547-2553, June 2009.
  • 109
    • 34248373869 scopus 로고    scopus 로고
    • An extremal inequality motivated by multiterminal information-theoretic problems
    • May
    • T. Liu and P. Viswanath, "An extremal inequality motivated by multiterminal information-theoretic problems," IEEE Transactions on Information Theory, vol. 53, pp. 1839-1851, May 2007.
    • (2007) IEEE Transactions on Information Theory , vol.53 , pp. 1839-1851
    • Liu, T.1    Viswanath, P.2
  • 110
    • 39349098274 scopus 로고    scopus 로고
    • Separate enciphering of correlated messages for confidentiality in distributed networks
    • Washington DC, USA, November
    • W. Luh and D. Kundur, "Separate enciphering of correlated messages for confidentiality in distributed networks," in Proceedings of the IEEE Global Communications Conference (GLOBECOM), Washington DC, USA, November 2007.
    • (2007) Proceedings of the IEEE Global Communications Conference (GLOBECOM)
    • Luh, W.1    Kundur, D.2
  • 112
    • 0018467629 scopus 로고
    • A coding theorem for the discrete memoryless broadcast channel
    • May
    • K. Marton, "A coding theorem for the discrete memoryless broadcast channel," IEEE Transactions on Information Theory, vol. 25, pp. 306-311, May 1979.
    • (1979) IEEE Transactions on Information Theory , vol.25 , pp. 306-311
    • Marton, K.1
  • 113
  • 114
    • 0034228863 scopus 로고    scopus 로고
    • Authentication theory and hypothesis testing
    • July
    • U. Maurer, "Authentication theory and hypothesis testing," IEEE Transactions on Information Theory, vol. 46, pp. 1350-1356, July 2000.
    • (2000) IEEE Transactions on Information Theory , vol.46 , pp. 1350-1356
    • Maurer, U.1
  • 115
    • 68349100488 scopus 로고
    • Provably secure key distribution based on independent channels
    • Veldhoven, The Netherlands, June
    • U. M. Maurer, "Provably secure key distribution based on independent channels," in Proceedings of the IEEE Information Theory Workshop (ITW), Veldhoven, The Netherlands, June 1990.
    • (1990) Proceedings of the IEEE Information Theory Workshop (ITW)
    • Maurer, U.M.1
  • 116
    • 0027599802 scopus 로고
    • Secret-key agreement by public discussion based on common information
    • May
    • U. M. Maurer, "Secret-key agreement by public discussion based on common information," IEEE Transactions on Information Theory, vol. 39, pp. 733-742, May 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , pp. 733-742
    • Maurer, U.M.1
  • 118
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Proceedings of the EUROCRYPT 2000 on Advances in Cryptology, Berlin, Germany: Springer
    • U. M. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Proceedings of the EUROCRYPT 2000 on Advances in Cryptology, vol. 1807, pp. 352-368, Lecture Notes in Computer Science, Berlin, Germany: Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 352-368
    • Maurer, U.M.1    Wolf, S.2
  • 119
    • 0037396695 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels - Part I. Definitions and a completeness result
    • April
    • U. M. Maurer and S.Wolf, "Secret-key agreement over unauthenticated public channels - Part I. Definitions and a completeness result," IEEE Transactions on Information Theory, vol. 49, pp. 822-831, April 2003.
    • (2003) IEEE Transactions on Information Theory , vol.49 , pp. 822-831
    • Maurer, U.M.1    Wolf, S.2
  • 120
    • 0037399113 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels - Part II. Privacy amplification
    • April
    • U. M. Maurer and S.Wolf, "Secret-key agreement over unauthenticated public channels - Part II. Privacy amplification," IEEE Transactions on Information Theory, vol. 49, pp. 832-838, April 2003.
    • (2003) IEEE Transactions on Information Theory , vol.49 , pp. 832-838
    • Maurer, U.M.1    Wolf, S.2
  • 121
    • 0037396951 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels - Part III. Privacy amplification
    • April
    • U. M. Maurer and S.Wolf, "Secret-key agreement over unauthenticated public channels - Part III. Privacy amplification," IEEE Transactions on Information Theory, vol. 49, pp. 839-851, April 2003.
    • (2003) IEEE Transactions on Information Theory , vol.49 , pp. 839-851
    • Maurer, U.M.1    Wolf, S.2
  • 123
    • 33646073724 scopus 로고    scopus 로고
    • An achievable region for the Gaussian wiretap channel with side information
    • May
    • C. Mitrpant, A. J. H. Vinck, and Y. Luo, "An achievable region for the Gaussian wiretap channel with side information," IEEE Transactions on Information Theory, vol. 52, pp. 2181-2190, May 2006.
    • (2006) IEEE Transactions on Information Theory , vol.52 , pp. 2181-2190
    • Mitrpant, C.1    Vinck, A.J.H.2    Luo, Y.3
  • 128
    • 33847126189 scopus 로고    scopus 로고
    • Secret-key generation exploiting antenna beam steering and wave propagation reciprocity
    • Paris, France, October
    • T. Ohira, "Secret-key generation exploiting antenna beam steering and wave propagation reciprocity," in Proceedings of the European Microwave Conference, Paris, France, October 2005.
    • (2005) Proceedings of the European Microwave Conference
    • Ohira, T.1
  • 129
    • 84938932265 scopus 로고    scopus 로고
    • Coding for relay channels with confidential messages
    • Cairns, Australia, September
    • Y. Oohama, "Coding for relay channels with confidential messages," in Proceedings of the IEEE Information Theory Workshop (ITW), pp. 87-89, Cairns, Australia, September 2001.
    • (2001) Proceedings of the IEEE Information Theory Workshop (ITW) , pp. 87-89
    • Oohama, Y.1
  • 130
    • 51649095674 scopus 로고    scopus 로고
    • Y. Oohama, Relay channels with confidential messages, in Proceedings of the IEEE International Symposium on Information Theory (ISIT), pp. 926-930, Nice, France, June 2007. Also submitted to IEEE Transactions on Information Theory, 2007. Available at http://arxiv.org/PS cache/cs/pdf/0611/0611125v7.pdf.
    • Y. Oohama, "Relay channels with confidential messages," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), pp. 926-930, Nice, France, June 2007. Also submitted to IEEE Transactions on Information Theory, 2007. Available at http://arxiv.org/PS cache/cs/pdf/0611/0611125v7.pdf.
  • 131
    • 0036913621 scopus 로고    scopus 로고
    • Capacity-achieving sequences for the erasure channel
    • December
    • P. Oswald and M. Shokrollahi, "Capacity-achieving sequences for the erasure channel," IEEE Transactions on Information Theory, vol. 48, pp. 3017-3028, December 2002.
    • (2002) IEEE Transactions on Information Theory , vol.48 , pp. 3017-3028
    • Oswald, P.1    Shokrollahi, M.2
  • 137
    • 0021502824 scopus 로고
    • Transmission over a multiple-access channel with a special source heirarchy
    • October-December
    • V. V. Prelov, "Transmission over a multiple-access channel with a special source heirarchy," Problems of Information Transmission, vol. 20, pp. 3-10, October-December 1984.
    • (1984) Problems of Information Transmission , vol.20 , pp. 3-10
    • Prelov, V.V.1
  • 138
    • 35248888499 scopus 로고    scopus 로고
    • New bounds in secret key agreement: The gap between formation and secrecy extraction
    • Proceedings of the EUROCRYPT on Advances in Cryptography, pp, Springer-Verlag
    • R. Renner and S. Wolf, "New bounds in secret key agreement: The gap between formation and secrecy extraction," in Proceedings of the EUROCRYPT on Advances in Cryptography, pp. 562-577, Lecture notes in Computer Science, Springer-Verlag, 2003.
    • (2003) Lecture notes in Computer Science , pp. 562-577
    • Renner, R.1    Wolf, S.2
  • 140
    • 0035246320 scopus 로고    scopus 로고
    • Efficient encoding of low-density paritycheck codes
    • February
    • T. J. Richardson and R. Urbanke, "Efficient encoding of low-density paritycheck codes," IEEE Transactions on Information Theory, vol. 47, pp. 638-656, February 2001.
    • (2001) IEEE Transactions on Information Theory , vol.47 , pp. 638-656
    • Richardson, T.J.1    Urbanke, R.2
  • 141
    • 0027607095 scopus 로고
    • A lower bound on authentication after having observed a sequence of messages
    • U. Rosenbaum, "A lower bound on authentication after having observed a sequence of messages," Journal of Cryptology, vol. 6, no. 3, pp. 135-156, 1993.
    • (1993) Journal of Cryptology , vol.6 , Issue.3 , pp. 135-156
    • Rosenbaum, U.1
  • 142
    • 0017969522 scopus 로고
    • An outer bound to the capacity region of broadcast channels
    • May
    • H. Sato, "An outer bound to the capacity region of broadcast channels," IEEE Transactions on Information Theory, vol. 24, pp. 374-377, May 1978.
    • (1978) IEEE Transactions on Information Theory , vol.24 , pp. 374-377
    • Sato, H.1
  • 144
    • 68349095489 scopus 로고    scopus 로고
    • S. Shafiee, N. Liu, and S. Ulukus, Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel, IEEE Transactions on Information Theory, submitted in 2007.
    • S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel," IEEE Transactions on Information Theory, submitted in 2007.
  • 145
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, pp. 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 146
    • 84983269168 scopus 로고
    • Authentication theory/coding theory
    • Proceedings of the CRYPTO'84 on Advances in Cryptography, pp, New York, NY, USA: Springer-Verlag
    • G. J. Simmons, "Authentication theory/coding theory," in Proceedings of the CRYPTO'84 on Advances in Cryptography, pp. 411-431, Lecture Notes in Computer Science, New York, NY, USA: Springer-Verlag, 1985.
    • (1985) Lecture Notes in Computer Science , pp. 411-431
    • Simmons, G.J.1
  • 147
    • 0015648934 scopus 로고
    • Noiseless coding of correlated information sources
    • D. Slepian and J. K. Wolf, "Noiseless coding of correlated information sources," IEEE Transactions on Information Theory, vol. IT-19, pp. 471-480, 1973.
    • (1973) IEEE Transactions on Information Theory , vol.IT-19 , pp. 471-480
    • Slepian, D.1    Wolf, J.K.2
  • 150
    • 64249156371 scopus 로고    scopus 로고
    • On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels
    • April
    • X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels," IEEE Transactions on Information Theory, vol. 55, pp. 1575-1591, April 2009.
    • (2009) IEEE Transactions on Information Theory , vol.55 , pp. 1575-1591
    • Tang, X.1    Liu, R.2    Spasojevic, P.3    Poor, H.V.4
  • 152
    • 84930890020 scopus 로고
    • Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks
    • L. Tassiulas and A. Ephremides, "Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks," IEEE Transactions on Automatic Control, vol. 37, no. 12, pp. 1936-1948, 1992.
    • (1992) IEEE Transactions on Automatic Control , vol.37 , Issue.12 , pp. 1936-1948
    • Tassiulas, L.1    Ephremides, A.2
  • 153
    • 57349093480 scopus 로고    scopus 로고
    • The Gaussian multiple access wire-tap channel
    • December
    • E. Tekin and A. Yener, "The Gaussian multiple access wire-tap channel," IEEE Transactions on Information Theory, vol. 54, pp. 5747-5755, December 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , pp. 5747-5755
    • Tekin, E.1    Yener, A.2
  • 154
    • 45249101530 scopus 로고    scopus 로고
    • E. Tekin and A. Yener, The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming, IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, 54, pp. 2735-2751, June 2008.
    • E. Tekin and A. Yener, "The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming," IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, vol. 54, pp. 2735-2751, June 2008.
  • 156
    • 46749089247 scopus 로고    scopus 로고
    • A deterministic model for wireless channels and its applications
    • Lake Tahoe, CA, USA, September
    • D. Tse, "A deterministic model for wireless channels and its applications," in Proceedings of the IEEE Information Theory Workshop (ITW), Lake Tahoe, CA, USA, September 2007.
    • (2007) Proceedings of the IEEE Information Theory Workshop (ITW)
    • Tse, D.1
  • 159
    • 0031103783 scopus 로고    scopus 로고
    • On a special class of broadcast channels with confidential messages
    • March
    • M. van Dijk, "On a special class of broadcast channels with confidential messages," IEEE Transactions on Information Theory, vol. 43, pp. 712-714, March 1997.
    • (1997) IEEE Transactions on Information Theory , vol.43 , pp. 712-714
    • van Dijk, M.1
  • 160
    • 0031647696 scopus 로고    scopus 로고
    • The common randomness capacity of a pair of independent discrete memoryless channels
    • January
    • S. Venkatesan and V. Anantharam, "The common randomness capacity of a pair of independent discrete memoryless channels," IEEE Transactions on Information Theory, vol. 44, pp. 215-224, January 1998.
    • (1998) IEEE Transactions on Information Theory , vol.44 , pp. 215-224
    • Venkatesan, S.1    Anantharam, V.2
  • 161
    • 0033892497 scopus 로고    scopus 로고
    • The common randomness capacity of a network of discrete memoryless channels
    • March
    • S. Venkatesan and V. Anantharam, "The common randomness capacity of a network of discrete memoryless channels," IEEE Transactions on Information Theory, vol. 46, pp. 367-387, March 2000.
    • (2000) IEEE Transactions on Information Theory , vol.46 , pp. 367-387
    • Venkatesan, S.1    Anantharam, V.2
  • 162
    • 0025594980 scopus 로고
    • Information theoretic bounds for authentication schemes
    • M. Walker, "Information theoretic bounds for authentication schemes," Journal of Cryptology, vol. 2, no. 3, pp. 131-143, 1990.
    • (1990) Journal of Cryptology , vol.2 , Issue.3 , pp. 131-143
    • Walker, M.1
  • 164
    • 51649130455 scopus 로고    scopus 로고
    • H. Weingarten, T. Liu, S. Shamai (Shitz), Y. Steinberg, and P. Viswanath, The capacity region of the degraded MIMO compound broadcast channel, in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Nice, France, June 2007.
    • H. Weingarten, T. Liu, S. Shamai (Shitz), Y. Steinberg, and P. Viswanath, "The capacity region of the degraded MIMO compound broadcast channel," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Nice, France, June 2007.
  • 165
    • 33748578624 scopus 로고    scopus 로고
    • H. Weingarten, Y. Steinberg, and S. Shamai (Shitz), The capacity region of the Gaussian multiple-input multiple-output broadcast channel, IEEE Transactions on Information Theory, 52, pp. 3936-3964, September 2006.
    • H. Weingarten, Y. Steinberg, and S. Shamai (Shitz), "The capacity region of the Gaussian multiple-input multiple-output broadcast channel," IEEE Transactions on Information Theory, vol. 52, pp. 3936-3964, September 2006.
  • 168
    • 0015992185 scopus 로고
    • Recent results in the Shannon theory
    • January
    • A. D. Wyner, "Recent results in the Shannon theory," IEEE Transactions on Information Theory, vol. 20, pp. 2-10, January 1974.
    • (1974) IEEE Transactions on Information Theory , vol.20 , pp. 2-10
    • Wyner, A.D.1
  • 169
    • 0016562514 scopus 로고
    • The wire-tap channel
    • October
    • A. D. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, pp. 1355-1387, October 1975.
    • (1975) Bell System Technical Journal , vol.54 , pp. 1355-1387
    • Wyner, A.D.1
  • 170
    • 0015681689 scopus 로고
    • A theorem on the entropy of certain binary sequences and applications: Part I
    • November
    • A. D. Wyner and J. Ziv, "A theorem on the entropy of certain binary sequences and applications: Part I," IEEE Transactions on Information Theory, vol. 19, pp. 769-777, November 1973.
    • (1973) IEEE Transactions on Information Theory , vol.19 , pp. 769-777
    • Wyner, A.D.1    Ziv, J.2
  • 172
    • 68349099265 scopus 로고    scopus 로고
    • J. Xu, Y. Cao, and B. Chen, Capacity bounds for broadcast channels with confidential messages, IEEE Transactions on Information Theory, Submitted in May 2008.
    • J. Xu, Y. Cao, and B. Chen, "Capacity bounds for broadcast channels with confidential messages," IEEE Transactions on Information Theory, Submitted in May 2008.
  • 173
    • 0024666944 scopus 로고
    • Coding theorem for secret sharing communication systems with two noisy channels
    • May
    • H. Yamamoto, "Coding theorem for secret sharing communication systems with two noisy channels," IEEE Transactions on Information Theory, vol. 35, pp. 572-578, May 1989.
    • (1989) IEEE Transactions on Information Theory , vol.35 , pp. 572-578
    • Yamamoto, H.1
  • 174
    • 0026153306 scopus 로고
    • A coding theorem for secret sharing communication systems with two Gaussian wiretap channels
    • May
    • H. Yamamoto, "A coding theorem for secret sharing communication systems with two Gaussian wiretap channels," IEEE Transactions on Information Theory, vol. 37, pp. 634-638, May 1991.
    • (1991) IEEE Transactions on Information Theory , vol.37 , pp. 634-638
    • Yamamoto, H.1
  • 176
    • 33749443558 scopus 로고    scopus 로고
    • Secret key and private key constructions for simple multiterminal source models
    • Adelaide, Australia, September
    • C. Ye and P. Narayan, "Secret key and private key constructions for simple multiterminal source models," in Proceedings of the IEEE International Symposium on Information Theory (ISIT), pp. 2133-2137, Adelaide, Australia, September 2005.
    • (2005) Proceedings of the IEEE International Symposium on Information Theory (ISIT) , pp. 2133-2137
    • Ye, C.1    Narayan, P.2
  • 182
    • 0036611624 scopus 로고    scopus 로고
    • R. Zamir, S. Shamai (Shitz), and U. Erez, Nested linear/lattice codes for structured multiterminal binning, IEEE Transactions on Information Theory, 48, pp. 1250-1276, June 2002.
    • R. Zamir, S. Shamai (Shitz), and U. Erez, "Nested linear/lattice codes for structured multiterminal binning," IEEE Transactions on Information Theory, vol. 48, pp. 1250-1276, June 2002.
  • 183
    • 64249118727 scopus 로고    scopus 로고
    • Error exponents for asymmetric two-user discrete memoryless source-channel coding systems
    • April
    • Y. Zhong, F. Alajaji, and L. L. Campbell, "Error exponents for asymmetric two-user discrete memoryless source-channel coding systems," IEEE Transactions on Information Theory, vol. 55, pp. 1497-1518, April 2009.
    • (2009) IEEE Transactions on Information Theory , vol.55 , pp. 1497-1518
    • Zhong, Y.1    Alajaji, F.2    Campbell, L.L.3
  • 184
    • 18244376871 scopus 로고    scopus 로고
    • Efficient and robust key management for large mobile ad hoc networks
    • July
    • B. Zhu, F. Bao, R. H. Deng, M. S. Kankanhalli, and G. Wang, "Efficient and robust key management for large mobile ad hoc networks," Computer Networks, vol. 48, pp. 657-682, July 2005.
    • (2005) Computer Networks , vol.48 , pp. 657-682
    • Zhu, B.1    Bao, F.2    Deng, R.H.3    Kankanhalli, M.S.4    Wang, G.5
  • 185


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.