-
1
-
-
0027629488
-
Common randomness in information theory and cryptography-Part I: Secret sharing
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, pp. 1121-1132, 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
4
-
-
0029706655
-
Almost independence and secrecy capacity
-
I. Csiszár, "Almost independence and secrecy capacity," Prob. Pered. Inf. , vol. 32, no. 1, pp. 48-57, 1996.
-
(1996)
Prob. Pered. Inf.
, vol.32
, Issue.1
, pp. 48-57
-
-
Csiszár, I.1
-
5
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.2
, pp. 344-366
-
-
Csiszár, I.1
Narayan, P.2
-
6
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
7
-
-
45249104852
-
Secrecy capacities for multiterminal channel models
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiterminal channel models," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2437-2452, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2437-2452
-
-
Csiszár, I.1
Narayan, P.2
-
8
-
-
0006932810
-
Common information is far less than mutual information
-
P. Gács and J. Körner, "Common information is far less than mutual information," Probl. Contr. Inf. Theory, vol. 2, no. 2, pp. 149-162, 1973.
-
(1973)
Probl. Contr. Inf. Theory
, vol.2
, Issue.2
, pp. 149-162
-
-
Gács, P.1
Körner, J.2
-
9
-
-
0023981825
-
Finding parity in a simple broadcast network
-
R. G. Gallager, "Finding parity in a simple broadcast network," IEEE Trans. Inf. Theory, vol. 34, no. 2, pp. 176-180, 1988.
-
(1988)
IEEE Trans. Inf. Theory
, vol.34
, Issue.2
, pp. 176-180
-
-
Gallager, R.G.1
-
10
-
-
77954600460
-
Information-theoretic key agreement of multiple terminals-Part I
-
A. A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals-Part I," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3973-3996, 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3973-3996
-
-
Gohari, A.A.1
Anantharam, V.2
-
11
-
-
17144395505
-
Computing and communicating functions over sensor networks
-
A. Giridhar and P. Kumar, "Computing and communicating functions over sensor networks," IEEE J. Sel. Areas Commun., vol. 23, no. 4, pp. 755-764, 2005.
-
(2005)
IEEE J. Sel. Areas Commun.
, vol.23
, Issue.4
, pp. 755-764
-
-
Giridhar, A.1
Kumar, P.2
-
12
-
-
0018442936
-
How to encode the modulo-two sum of binary sources
-
J. Korner and K. Marton, "How to encode the modulo-two sum of binary sources," IEEE Trans. Inf. Theory, vol. 25, no. 2, pp. 219-221, 1979.
-
(1979)
IEEE Trans. Inf. Theory
, vol.25
, Issue.2
, pp. 219-221
-
-
Korner, J.1
Marton, K.2
-
13
-
-
0003981320
-
-
New York: Van Nostrand, 28-42
-
M. Loeve, Probability Theory. New York: Van Nostrand, 1955, pp. 157, 28-42.
-
(1955)
Probability Theory
, pp. 157
-
-
Loeve, M.1
-
14
-
-
70449514183
-
Information-theoretic bounds formultiround function computation in collocated networks
-
N. Ma, P. Ishwar, and P.Gupta, "Information-theoretic bounds formultiround function computation in collocated networks," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), 2009, pp. 2306-2310.
-
(2009)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 2306-2310
-
-
Ma, N.1
Ishwar, P.2
Gupta, P.3
-
15
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, pp. 733-742, 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.M.1
-
16
-
-
0005059185
-
-
R. E.Blahut,Ed. et al. Norwell, MA: Kluwer, ch. 26
-
U. M. Maurer, Communications and Cryptography: Two Sides of One Tapestry, R. E.Blahut,Ed. et al. Norwell, MA: Kluwer, 1994, ch. 26, pp. 271-285.
-
(1994)
Communications and Cryptography: Two Sides of One Tapestry
, pp. 271-285
-
-
Maurer, U.M.1
-
19
-
-
0035271234
-
Coding for computing
-
A. Orlitsky and J. R. Roche, "Coding for computing," IEEE Trans. Inf. Theory, vol. 47, no. 3, pp. 903-917, 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.3
, pp. 903-917
-
-
Orlitsky, A.1
Roche, J.R.2
-
20
-
-
0015992185
-
Recent results in the Shannon theory
-
A. D. Wyner, "Recent results in the Shannon theory," IEEE Trans. Inf. Theory, vol. 20, pp. 2-10, 1974.
-
(1974)
IEEE Trans. Inf. Theory
, vol.20
, pp. 2-10
-
-
Wyner, A.D.1
-
21
-
-
85039623622
-
Some complexity questions related to distributive computing
-
A. C. Yao, "Some complexity questions related to distributive computing," in Proc. ACM Symp. on Theory of Comput. (STOC), 1979, pp. 209-213.
-
(1979)
Proc. ACM Symp. on Theory of Comput. (STOC)
, pp. 209-213
-
-
Yao, A.C.1
-
22
-
-
77955669285
-
-
Ph.D. thesis, Dept. Elect. and Comput. Eng., Univ. Maryland, College Park
-
C. Ye, "Information Theoretic Generation of Multiple Secret Keys," Ph.D. thesis, Dept. Elect. and Comput. Eng., Univ. Maryland, College Park, 2005.
-
(2005)
Information Theoretic Generation of Multiple Secret Keys
-
-
Ye, C.1
-
23
-
-
33749443558
-
Secret key and private key constructions for simple multiterminal source models
-
C. Ye and P. Narayan, "Secret key and private key constructions for simple multiterminal source models," in Proc. Int. Symp. Inf. Theory, 2005, pp. 2133-2137.
-
(2005)
Proc. Int. Symp. Inf. Theory
, pp. 2133-2137
-
-
Ye, C.1
Narayan, P.2
-
24
-
-
84856830966
-
Secret key and private constructions for simple multiterminal source models
-
accepted for publication
-
C. Ye and P. Narayan, "Secret key and private constructions for simple multiterminal source models," IEEE Trans. Inf. Theory, accepted for publication.
-
IEEE Trans. Inf. Theory
-
-
Ye, C.1
Narayan, P.2
|