-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. Shannon, "Communication theory of secrecy systems," Bell Systems Technical Journal, vol. 28, pp. 656-715, Oct. 1949.
-
(1949)
Bell Systems Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.1
-
2
-
-
0017018484
-
New directions in cryptography
-
nov
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. on Info. Theory, vol. 22, no. 6, pp. 644-654, nov 1976.
-
(1976)
IEEE Trans. on Info. Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
3
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
C. Bennett and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing," in IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, Dec. 1984.
-
IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, Dec. 1984
-
-
Bennett, C.1
Brassard, G.2
-
4
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. Wyner, "The wire-tap channel," Bell Systems Technical Journal, vol. 54, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Systems Technical Journal
, vol.54
, pp. 1355-1387
-
-
Wyner, A.1
-
5
-
-
52349088659
-
Lossless compression with security constraints
-
D. Gunduz, E. Erkip, and H. Poor, "Lossless compression with security constraints," in IEEE International Symposium on Information Theory, 6-11 2008, pp. 111-115.
-
IEEE International Symposium on Information Theory, 6-11 2008
, pp. 111-115
-
-
Gunduz, D.1
Erkip, E.2
Poor, H.3
-
6
-
-
84856043672
-
A mathematical theory of communication
-
July and Oct.
-
C. Shannon, "A mathematical theory of communication," Bell Systems Technical Journal, vol. 27, pp. 379-423,623-656, July and Oct. 1948.
-
(1948)
Bell Systems Technical Journal
, vol.27
-
-
Shannon, C.1
-
7
-
-
0037321619
-
A large-deviations notion of perfect secrecy
-
feb.
-
N. Merhav, "A large-deviations notion of perfect secrecy," IEEE Trans. on Info. Theory, vol. 49, no. 2, pp. 506-508, feb. 2003.
-
(2003)
IEEE Trans. on Info. Theory
, vol.49
, Issue.2
, pp. 506-508
-
-
Merhav, N.1
-
9
-
-
0031143282
-
Rate-distortion theory for shannon cipher systems
-
May
-
H. Yamamoto, "Rate-distortion theory for shannon cipher systems," IEEE Trans. on Info. Theory, vol. 43, no. 3, pp. 827-835, May 1997.
-
(1997)
IEEE Trans. on Info. Theory
, vol.43
, Issue.3
, pp. 827-835
-
-
Yamamoto, H.1
-
10
-
-
77955754773
-
Coordination capacity
-
Sept.
-
P. Cuff, H. Permuter, and T. Cover, "Coordination capacity," IEEE Trans. on Info. Theory, vol. 56, no. 9, pp. 4181-4206, Sept. 2010.
-
(2010)
IEEE Trans. on Info. Theory
, vol.56
, Issue.9
, pp. 4181-4206
-
-
Cuff, P.1
Permuter, H.2
Cover, T.3
-
11
-
-
52349098116
-
Communication requirements for generating correlated random variables
-
P. Cuff, "Communication requirements for generating correlated random variables," in IEEE International Symp. on Info. Theory, Toronto, 2008, pp. 1393-1397.
-
IEEE International Symp. on Info. Theory, Toronto, 2008
, pp. 1393-1397
-
-
Cuff, P.1
-
13
-
-
0024035415
-
A rate-distortion problem for a communication system with a secondary decoder to be hindered
-
July
-
H. Yamamoto, "A rate-distortion problem for a communication system with a secondary decoder to be hindered," IEEE Trans. on Info. Theory, vol. 34, no. 4, July 1988.
-
(1988)
IEEE Trans. on Info. Theory
, vol.34
, Issue.4
-
-
Yamamoto, H.1
|