-
1
-
-
0027629488
-
Common randomness in information theory and cryptography, Part I: Secret sharing
-
Jul
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part I: Secret sharing", IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages", IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
4
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals", IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
5
-
-
45249104852
-
Secrecy capacities for multiterminal channel model
-
Jun
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiterminal channel model", IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2437-2452, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2437-2452
-
-
Csiszár, I.1
Narayan, P.2
-
6
-
-
51849115215
-
Effects of cooperation on the secrecy of multiple access channels with generalized feedback
-
Princeton, NJ, Mar
-
E. Ekrem and S. Ulukus, "Effects of cooperation on the secrecy of multiple access channels with generalized feedback", in Proc. 42nd Ann. Conf. Information Sciences and Systems (CISS), Princeton, NJ, Mar. 2008, pp. 791-796.
-
(2008)
Proc. 42nd Ann. Conf. Information Sciences and Systems (CISS)
, pp. 791-796
-
-
Ekrem, E.1
Ulukus, S.2
-
7
-
-
52349099669
-
New bounds on the information-theoretic key agreement of multiple terminals
-
Toronto, Canada, Jul
-
A. A. Gohari and V. Anantharam, "New bounds on the information-theoretic key agreement of multiple terminals", in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Toronto, Canada, Jul. 2008, pp. 742-746.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 742-746
-
-
Gohari, A.A.1
Anantharam, V.2
-
8
-
-
77954600460
-
Information-theoretic key agreement of multiple terminals-Part I: Source model
-
Aug
-
A. A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals-Part I: Source model", IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3973-3996, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3973-3996
-
-
Gohari, A.A.1
Anantharam, V.2
-
9
-
-
77954570193
-
Information-theoretic key agreement of multiple terminals-Part II: Channel model
-
Aug
-
A. A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals-Part II: Channel model", IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3997-4010, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3997-4010
-
-
Gohari, A.A.1
Anantharam, V.2
-
10
-
-
40949147785
-
Multiple-access channels with confidential messages
-
DOI 10.1109/TIT.2007.915978
-
Y. Liang and V. Poor, "Multiple access channels with confidential messages", IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008. (Pubitemid 351410914)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.3
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
11
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information", IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
12
-
-
35248888499
-
New bounds in secret-key agreement: The gap between formation and secrecy extraction
-
Warsaw, Poland, May, Springer-Verlag
-
R. Renner and S. Wolf, "New bounds in secret-key agreement: the gap between formation and secrecy extraction", in Proc. EUROCRYPT'03, LNCS, Warsaw, Poland, May 2003, pp. 562-577, Springer-Verlag.
-
(2003)
Proc. EUROCRYPT'03, LNCS
, pp. 562-577
-
-
Renner, R.1
Wolf, S.2
-
13
-
-
78651338137
-
Secret key rate region of multiple access channel model
-
Taichung, Taiwan, Oct
-
S. Salimi, M. Salmasizadeh, and M. R. Aref, "Secret key rate region of multiple access channel model", in Proc. Int. Symp. Information Theory and Applications (ISITA), Taichung, Taiwan, Oct. 2010, pp. 197-202.
-
(2010)
Proc. Int. Symp. Information Theory and Applications (ISITA)
, pp. 197-202
-
-
Salimi, S.1
Salmasizadeh, M.2
Aref, M.R.3
-
14
-
-
77951482183
-
Secret key sharing in a new source model: Rate regions
-
Canberra, Australia, Feb
-
S. Salimi, M. Salmasizadeh, and M. R. Aref, "Secret key sharing in a new source model: Rate regions", in Proc. IEEE Australian Communication Theory Workshop (AusCTW), Canberra, Australia, Feb. 2010, pp. 117-122.
-
(2010)
Proc. IEEE Australian Communication Theory Workshop (AusCTW)
, pp. 117-122
-
-
Salimi, S.1
Salmasizadeh, M.2
Aref, M.R.3
-
15
-
-
79952428511
-
Rate regions of secret key sharing in a new source model
-
Mar
-
S. Salimi, M. Salmasizadeh, and M. R. Aref, "Rate regions of secret key sharing in a new source model", IET Commun. J., vol. 5, no. 4, pp. 443-455, Mar. 2011.
-
(2011)
IET Commun. J.
, vol.5
, Issue.4
, pp. 443-455
-
-
Salimi, S.1
Salmasizadeh, M.2
Aref, M.R.3
-
16
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems", AT&T Bell Labs. Tech. J., vol. 28, pp. 656-715, 1949.
-
(1949)
AT&T Bell Labs. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
17
-
-
0016562514
-
The wire-tap channel
-
A. Wyner, "The wire-tap channel", AT&T Bell Labs. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
AT&T Bell Labs. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.1
-
18
-
-
5044250721
-
The private key capacity region for three terminals
-
Chicago, IL, Jun
-
C. Ye and P. Narayan, "The private key capacity region for three terminals", in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Chicago, IL, Jun. 2004, pp. 44-44.
-
(2004)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 44-44
-
-
Ye, C.1
Narayan, P.2
|