-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol.28, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol.54, no.8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol.24, no.3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
4
-
-
45249101530
-
The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol.54, no.6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
5
-
-
40949147785
-
Multiple access channels with confidential messages
-
Mar.
-
Y. Liang and H. V. Poor, "Multiple access channels with confidential messages," IEEE Trans. Inf. Theory, vol.54, no.3, pp. 976-1002, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.3
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
6
-
-
77958560746
-
Secure transmission with multiple antennas: The MISOME wiretap channel
-
submitted
-
A. Khisti and G. Wornell, "Secure transmission with multiple antennas: The MISOME wiretap channel," IEEE Trans. Inf. Theory, submitted.
-
IEEE Trans. Inf. Theory
-
-
Khisti, A.1
Wornell, G.2
-
7
-
-
51849113731
-
Secure lossless compression with side information
-
Porto, Portugal, May
-
D. Gündüz, E. Erkip, and H. V. Poor, "Secure lossless compression with side information," in Proc. IEEE Inf. Theory Workshop, Porto, Portugal, May 2008.
-
(2008)
In Proc. IEEE Inf. Theory Workshop
-
-
Gündüz, D.1
Erkip, E.2
Poor, H.V.3
-
9
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol.39, no.3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
10
-
-
0027629488
-
Common randomness in information theory and cryptography part I: Secret sharing
-
Jul.
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography part I: Secret sharing," IEEE Trans. Inf. Theory, vol.39, no.4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
11
-
-
77951123352
-
The wiretap channel with feedback: Encryption over the channel
-
to appear
-
L. Lai, H. El-Gamal, and H. V. Poor, "The wiretap channel with feedback: Encryption over the channel," IEEE Trans. Inf. Theory, to appear.
-
IEEE Trans. Inf. Theory
-
-
Lai, L.1
El-Gamal, H.2
Poor, H.V.3
-
12
-
-
77951099663
-
Strictly positive secrecy rates of binary wiretapper channels using feedback schemes
-
Princeton, NJ, March
-
G. T. Amariucai and S. Wei, "Strictly positive secrecy rates of binary wiretapper channels using feedback schemes," in Proc. Conf. on Inf. Sciences and Systems (CISS), Princeton, NJ, March 2008.
-
(2008)
Proc. Conf. on Inf. Sciences and Systems (CISS)
-
-
Amariucai, G.T.1
Wei, S.2
-
13
-
-
84913119594
-
A coding scheme for additive noise channels with feedback. part I: No bandwidth constraint
-
Apr.
-
J. P. M. Schalkwijk and T. Kailath, "A coding scheme for additive noise channels with feedback. part I: No bandwidth constraint," IEEE Trans. Inf. Theory, vol.12, pp. 172-182, Apr. 1966.
-
(1966)
IEEE Trans. Inf. Theory
, vol.12
, pp. 172-182
-
-
Schalkwijk, J.P.M.1
Kailath, T.2
|