-
1
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel", Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1367, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1367
-
-
Wyner, A.D.1
-
2
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages", IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
3
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret key agreement by public discussion from common information", IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
4
-
-
0027629488
-
Common randomness in information theory and cryptography. I. secret sharing
-
Jul
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography. I. secret sharing", IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
5
-
-
76249114101
-
-
Foundations and Trends in Communications and Information Theory. Delft, The Netherlands: Now Publishers
-
Y. Liang, H. V. Poor, and S. S. (Shitz), Information-Theoretic Security, ser. Foundations and Trends in Communications and Information Theory. Delft, The Netherlands: Now Publishers, 2009, vol. 5.
-
(2009)
Information-theoretic Security, Ser.
, vol.5
-
-
Liang, Y.1
Poor, H.V.2
Shitz, S.S.3
-
7
-
-
45249101530
-
The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
-
Jun
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming", IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
8
-
-
77955729519
-
Correction to: The Gaussian multiple access wire-tap channel and the general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming
-
Sep
-
E. Tekin and A. Yener, "Correction to: The Gaussian multiple access wire-tap channel and the general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming", IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4762-4763, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.9
, pp. 4762-4763
-
-
Tekin, E.1
Yener, A.2
-
10
-
-
70449504460
-
Channel scrambling for secrecy
-
Seoul, Korea, Jul
-
M. Bloch, "Channel scrambling for secrecy", in Proc. IEEE Int. Symp. Inf. Theory, Seoul, Korea, Jul. 2009, pp. 2452-2456.
-
(2009)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2452-2456
-
-
Bloch, M.1
-
11
-
-
77954826162
-
New achievable secrecy rate regions for the two-way wiretap channel
-
Cairo, Egypt, Jan
-
A. E. Gamal, O. O. Koyluoglu, M. Youssef, and H. E. Gamal, "New achievable secrecy rate regions for the two-way wiretap channel", in Proc. IEEE Inf. Theory Workshop, Cairo, Egypt, Jan. 2010, pp. 1-5.
-
(2010)
Proc. IEEE Inf. Theory Workshop
, pp. 1-5
-
-
Gamal, A.E.1
Koyluoglu, O.O.2
Youssef, M.3
Gamal, H.E.4
-
13
-
-
77951118738
-
Secret communication with feedback
-
Dec
-
D. Gündüz, D. R. Brown, and H. V. Poor, "Secret communication with feedback", in Proc. Int. Symp. Inf. Theory and Its Applications (ISITA 2008), Dec. 2008, pp. 1-6.
-
(2008)
Proc. Int. Symp. Inf. Theory and its Applications (ISITA 2008)
, pp. 1-6
-
-
Gündüz, D.1
Brown, D.R.2
Poor, H.V.3
-
14
-
-
55349095058
-
The wiretap channel with feedback: Encryption over the channel
-
Nov
-
L. Lai, H. E. Gamal, and H. V. Poor, "The wiretap channel with feedback: Encryption over the channel", IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 5059-5067, Nov. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.11
, pp. 5059-5067
-
-
Lai, L.1
Gamal, H.E.2
Poor, H.V.3
-
15
-
-
77955641859
-
Wiretap channel with secure rate-limited feedback
-
Dec
-
E. Ardestanizadeh, M. Franceschetti, T. Javidi, and Y.-H. Kim, "Wiretap channel with secure rate-limited feedback", IEEE Trans. Inf. Theory, vol. 55, no. 12, pp. 5353-5361, Dec. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.12
, pp. 5353-5361
-
-
Ardestanizadeh, E.1
Franceschetti, M.2
Javidi, T.3
Kim, Y.-H.4
-
16
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
DOI 10.1109/18.825796
-
I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper", IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000. (Pubitemid 30582727)
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.2
, pp. 344-366
-
-
Csiszar, I.1
Narayan, P.2
-
17
-
-
77955682475
-
Secret key agreement from vector Gaussian sources by rate-limited public communication
-
Austin, TX, Jun
-
S. Watanabe and Y. Oohama, "Secret key agreement from vector Gaussian sources by rate-limited public communication", in Proc. IEEE Int. Symp. Inf. Theory, Austin, TX, Jun. 2010, pp. 2597-2601.
-
(2010)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2597-2601
-
-
Watanabe, S.1
Oohama, Y.2
-
18
-
-
0027602480
-
Approximation theory of output statistics
-
May
-
T. Han and S. Verdú, "Approximation theory of output statistics", IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 752-772, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 752-772
-
-
Han, T.1
Verdú, S.2
-
19
-
-
0032022516
-
Resolvability theory for the multiple-access channel
-
PII S0018944898009304
-
Y. Steinberg, "Resolvability theory for the multiple-access channel", IEEE Trans. Inf. Theory, vol. 44, no. 2, pp. 472-487, Mar. 1998. (Pubitemid 128737616)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.2
, pp. 472-487
-
-
Steinberg, Y.1
-
21
-
-
33645727315
-
General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channels
-
Apr
-
M. Hayashi, "General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channels", IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1562-1575, Apr. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.4
, pp. 1562-1575
-
-
Hayashi, M.1
-
22
-
-
64549110900
-
On the secrecy capacity of arbitrary wiretap channels
-
Monticello, IL, Sep
-
M. Bloch and J. N. Laneman, "On the secrecy capacity of arbitrary wiretap channels", in Proc. 46th Allerton Conf. Communication, Control, and Computing, Monticello, IL, Sep. 2008, pp. 818-825.
-
(2008)
Proc. 46th Allerton Conf. Communication, Control, and Computing
, pp. 818-825
-
-
Bloch, M.1
Laneman, J.N.2
-
24
-
-
80051928178
-
Multiple access wiretap channels with strong secrecy
-
Dublin, Ireland, Sep
-
M. H. Yassaee and M. R. Aref, "Multiple access wiretap channels with strong secrecy", in Proc. IEEE Inf. Theory Workshop, Dublin, Ireland, Sep. 2010.
-
(2010)
Proc. IEEE Inf. Theory Workshop
-
-
Yassaee, M.H.1
Aref, M.R.2
-
25
-
-
5144231861
-
On the role of MMSE estimation in approaching the information-theoretic limits of linear gaussian channels: Shannon meets Wiener
-
Monticello, IL, Oct
-
J. G. D. Forney, "On the role of MMSE estimation in approaching the information-theoretic limits of linear gaussian channels: Shannon meets Wiener", in Proc. 41st Ann. Allerton Conf. Communication, Control, and Computing, Monticello, IL, Oct. 2003, pp. 430-439.
-
(2003)
Proc. 41st Ann. Allerton Conf. Communication, Control, and Computing
, pp. 430-439
-
-
Forney, J.G.D.1
-
26
-
-
77955354714
-
A new outer bound for the secrecy capacity region of the Gaussian two-way wiretap channel
-
May
-
X. He and A. Yener, "A new outer bound for the secrecy capacity region of the Gaussian two-way wiretap channel", in Proc. IEEE Int. Communications (ICC) Conf., May 2010, pp. 1-5.
-
(2010)
Proc. IEEE Int. Communications (ICC) Conf.
, pp. 1-5
-
-
He, X.1
Yener, A.2
-
27
-
-
78650025803
-
The MIMOME channel
-
Allerton, IL, Sep
-
A. Khisti and G. Wornell, "The MIMOME channel", in Proc. 45th Allerton Conf. Communication, Control and Computing, Allerton, IL, Sep. 2007, pp. 625-632.
-
(2007)
Proc. 45th Allerton Conf. Communication, Control and Computing
, pp. 625-632
-
-
Khisti, A.1
Wornell, G.2
-
28
-
-
84940667036
-
The secrecy capacity of the MIMO wiretap channels
-
Allerton, IL, Sep
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channels", in Proc. 45th Allerton Conf. Communication, Control and Computing, Allerton, IL, Sep. 2007, pp. 848-855.
-
(2007)
Proc. 45th Allerton Conf. Communication, Control and Computing
, pp. 848-855
-
-
Oggier, F.1
Hassibi, B.2
-
29
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct
-
P. K. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels", IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
Gamal, H.E.3
-
30
-
-
45249119255
-
Secure communication over fading channels
-
Jun, Shitz
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels", IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
|