-
1
-
-
0027629488
-
Common randomness in information theory and cryptography-part i: Secret sharing
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-part i: Secret sharing", IEEE Trans. Inform. Theory, vol. 39, pp. 1121-1132, 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
2
-
-
0029706655
-
Almost independence and secrecy capacity
-
I. Csiszár, "Almost independence and secrecy capacity", Prob. Pered. Inform., vol. 32, no. 1, pp. 48-57, 1996.
-
(1996)
Prob. Pered. Inform.
, vol.32
, Issue.1
, pp. 48-57
-
-
Csiszár, I.1
-
4
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
March
-
I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper", IEEE Trans. Inform. Theory, vol. 46, pp. 344-366, March 2000.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, pp. 344-366
-
-
Csiszár, I.1
Narayan, P.2
-
5
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals", IEEE Trans. Inform. Theory, vol. 50, no. 12, pp. 3047-3061, 2004.
-
(2004)
IEEE Trans. Inform. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
6
-
-
45249104852
-
Secrecy capacities for multiterminal channel models
-
-, "Secrecy capacities for multiterminal channel models", IEEE Trans. Inform. Theory, vol. 54, no. 6, pp. 2437-2452, 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, Issue.6
, pp. 2437-2452
-
-
Csiszár, I.1
Narayan, P.2
-
7
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information", IEEE Trans. Inform. Theory, vol. 39, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.M.1
-
8
-
-
0005059185
-
-
R. E. Blahut et al., Eds. ed. Norwell, MA: Kluwer, ch. 26
-
U. M. Maurer, Communications and Cryptography: Two sides of One Tapestry, R. E. Blahut et al., Eds. ed. Norwell, MA: Kluwer, 1994, ch. 26, pp. 271-285.
-
(1994)
Communications and Cryptography: Two Sides of One Tapestry
, pp. 271-285
-
-
Maurer, U.M.1
-
9
-
-
77955694833
-
Secure computing
-
June
-
H. Tyagi, P. Narayan, and P. Gupta, "Secure computing", Proc. Int. Symp. Inform. Theory, pp. 2612-2616, June 2010.
-
(2010)
Proc. Int. Symp. Inform. Theory
, pp. 2612-2616
-
-
Tyagi, H.1
Narayan, P.2
Gupta, P.3
-
10
-
-
80054800767
-
When is a function securely computable?
-
submitted, arXiv:1007.2945v1 cs. IT
-
H. Tyagi, P. Narayan, and P. Gupta, "When is a function securely computable?" IEEE Trans. Inform. Theory, submitted, 2010; arXiv:1007.2945v1 [cs. IT].
-
(2010)
IEEE Trans. Inform. Theory
-
-
Tyagi, H.1
Narayan, P.2
Gupta, P.3
|