-
1
-
-
0027629488
-
Common randomness in information theory and cryptography, Part I: Secret sharing
-
July
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part I: Secret sharing," IEEE Trans. Inform. Theory,vol. 39, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
2
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
March
-
I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inform. Theory,vol. 46, pp. 344-366, March 2000.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, pp. 344-366
-
-
Csiszár, I.1
Narayan, P.2
-
3
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
December
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inform. Theory,vol. 50, pp. 3047-3061, December 2004.
-
(2004)
IEEE Trans. Inform. Theory
, vol.50
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
5
-
-
0002924564
-
Packing Steiner trees: A cutting plane algorithm and computational results
-
February
-
M. Grötschel, A. Martin and R. Weismantel, "Packing Steiner trees: A cutting plane algorithm and computational results," Mathematical Programming,vol. 72, pp. 125-145, February 1996.
-
(1996)
Mathematical Programming
, vol.72
, pp. 125-145
-
-
Grötschel, M.1
Martin, A.2
Weismantel, R.3
-
6
-
-
25844480338
-
Network coding in undirected networks
-
Princeton, NJ, March
-
Z. Li and B. Li, "Network coding in undirected networks," Proceedings of the 38th Annual Conference on Information Sciences and Systems,pp. 257-242, Princeton, NJ, March 2004.
-
(2004)
Proceedings of the 38th Annual Conference on Information Sciences and Systems
, pp. 257-242
-
-
Li, Z.1
Li, B.2
-
7
-
-
33749446548
-
Provably secure key distribution based on independent channels
-
presented at the ,Eindhoven, The Netherlands, June
-
U. M. Maurer, "Provably secure key distribution based on independent channels," presented at the IEEE Workshop Inform. Theory,Eindhoven, The Netherlands, June 1990.
-
(1990)
IEEE Workshop Inform. Theory
-
-
Maurer, U.M.1
-
8
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory,vol. 39, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.M.1
-
9
-
-
84881100274
-
Edge disjoint spanning trees of finite graphs
-
C. St. J. A. Nash-Williams, "Edge disjoint spanning trees of finite graphs," J London Math. Soc.,36, pp. 445-450, 1961.
-
(1961)
J London Math. Soc
, vol.36
, pp. 445-450
-
-
Nash-Williams, C.S.J.A.1
-
10
-
-
52349096793
-
-
S. Nitinawarat, C. Ye, A. Barg, P. Narayan and A. Reznik,Secret key generation for a pairwise independent network model, Proceedings of the IEEE International Symposium on Information Theory,pp. 10151019, Toronto, Ontario, Canada, July 2008.
-
S. Nitinawarat, C. Ye, A. Barg, P. Narayan and A. Reznik,"Secret key generation for a pairwise independent network model," Proceedings of the IEEE International Symposium on Information Theory,pp. 10151019, Toronto, Ontario, Canada, July 2008.
-
-
-
-
11
-
-
64549083289
-
Common randomness, multiuser secrecy and tree packing
-
Monticello, IL, September
-
S. Nitinawarat, C. Ye, A. Barg, P. Narayan and A. Reznik,"Common randomness, multiuser secrecy and tree packing," Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, September 2008.
-
(2008)
Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing
-
-
Nitinawarat, S.1
Ye, C.2
Barg, A.3
Narayan, P.4
Reznik, A.5
-
12
-
-
84963041976
-
On the problem of decomposing a graph into nconnected factors
-
W. T. Tutte, "On the problem of decomposing a graph into nconnected factors," J London Math. Soc.,36, pp. 221-230, 1961.
-
(1961)
J London Math. Soc
, vol.36
, pp. 221-230
-
-
Tutte, W.T.1
-
13
-
-
33745134676
-
A unification of network coding and tree-packing (routing) theorems
-
June
-
Y. Wu, K. Jain and S.-Y. Kung, "A unification of network coding and tree-packing (routing) theorems," IEEE Trans. Inform. Theory,vol. 52, pp. 2398-2409, June 2006.
-
(2006)
IEEE Trans. Inform. Theory
, vol.52
, pp. 2398-2409
-
-
Wu, Y.1
Jain, K.2
Kung, S.-Y.3
-
14
-
-
33749443558
-
Secret key and private key constructions for simple multiterminal source models
-
Adelaide, Australia, September
-
C. Ye and P. Narayan, "Secret key and private key constructions for simple multiterminal source models," Proceedings of the IEEE International Symposium on Information Theory,pp. 2133-2137, Adelaide, Australia, September 2005.
-
(2005)
Proceedings of the IEEE International Symposium on Information Theory
, pp. 2133-2137
-
-
Ye, C.1
Narayan, P.2
-
15
-
-
51649130417
-
Group secret key generation algorithms
-
Nice, France, June
-
C. Ye and A. Reznik, "Group secret key generation algorithms," Proceedings of the IEEE International Symposium on Information Theory,pp. 2596-2600, Nice, France, June 2007.
-
(2007)
Proceedings of the IEEE International Symposium on Information Theory
, pp. 2596-2600
-
-
Ye, C.1
Reznik, A.2
-
16
-
-
39049156464
-
Extracting secrecy from jointly Gaussian random variables
-
Seattle, USA, July
-
C. Ye, A. Reznik and Y. Shah, "Extracting secrecy from jointly Gaussian random variables," Proceedings ofthe IEEE International Symposium on Information Theory,pp. 2593-2597, Seattle, USA, July 2006.
-
(2006)
Proceedings ofthe IEEE International Symposium on Information Theory
, pp. 2593-2597
-
-
Ye, C.1
Reznik, A.2
Shah, Y.3
|