-
1
-
-
84855255474
-
-
publications, http://goo.gl/4YZLT
-
C. Chan, publications. http://chungc.net63.net/pub, http://goo.gl/4YZLT.
-
-
-
Chan, C.1
-
3
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, no. 4, pp. 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
4
-
-
45249104852
-
Secrecy capacities for multiterminal channel models
-
June
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiterminal channel models," IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2437-2452, June 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2437-2452
-
-
Csiszár, I.1
Narayan, P.2
-
6
-
-
80054797796
-
-
Ph. D. dissertation, Massachusetts Institute of Technology, see 1
-
C. Chan, "Generating secret in a network," Ph. D. dissertation, Massachusetts Institute of Technology, 2010, see [1].
-
(2010)
Generating Secret in a Network
-
-
Chan, C.1
-
10
-
-
78649383176
-
Perfect omniscience, perfect secrecy, and steiner tree packing
-
December
-
S. Nitinawarat and P. Narayan, "Perfect omniscience, perfect secrecy, and steiner tree packing," IEEE Transactions on Information Theory, vol. 56, no. 12, pp. 6490-6500, December 2010.
-
(2010)
IEEE Transactions on Information Theory
, vol.56
, Issue.12
, pp. 6490-6500
-
-
Nitinawarat, S.1
Narayan, P.2
-
14
-
-
0042329697
-
On decomposing a hypergraph into k-connected sub-hypergraphs
-
September
-
A. Frank, T. Király, and M. Kriesell, "On decomposing a hypergraph into k-connected sub-hypergraphs," Discrete Applied Mathematics, vol. 131, no. 2, pp. 373-383, September 2003.
-
(2003)
Discrete Applied Mathematics
, vol.131
, Issue.2
, pp. 373-383
-
-
Frank, A.1
Király, T.2
Kriesell, M.3
-
15
-
-
84855281783
-
Decompositions and orientations of hypergraphs
-
Department of Mathematics and Computer Science, University of Southern Denmark, May
-
J. Bang-Jensen and S. Thomassé, "Decompositions and orientations of hypergraphs," Preprint no. 10, Department of Mathematics and Computer Science, University of Southern Denmark, May 2001.
-
(2001)
Preprint No. 10
-
-
Bang-Jensen, J.1
Thomassé, S.2
-
16
-
-
79957890468
-
Wireless network information flow: A deterministic approach
-
vol. Abs/cs/0906.5394
-
A. S. Avestimehr, S. N. Diggavi, and D. N. C. Tse, "Wireless network information flow: A deterministic approach," CoRR, vol. Abs/cs/0906.5394, 2009.
-
(2009)
CoRR
-
-
Avestimehr, A.S.1
Diggavi, S.N.2
Tse, D.N.C.3
-
17
-
-
80054806545
-
The hidden flow of information
-
St. Petersburg, Russia, Jul, see 1
-
C. Chan, "The hidden flow of information," in 2011 IEEE International Symposium on Information Theory Proceedings (ISIT2011), St. Petersburg, Russia, Jul. 2011, see [1].
-
(2011)
2011 IEEE International Symposium on Information Theory Proceedings (ISIT2011)
-
-
Chan, C.1
-
19
-
-
77949621374
-
An algorithmic framework for wireless information flow
-
M. Goemans, S. Iwata, and R. Zenklusen, "An algorithmic framework for wireless information flow," in Communication, Control, and Computing, 2009. Allerton 2009. 47th Annual Allerton Conference on, 30 2009-oct. 2 2009, pp. 294-300.
-
(2009)
Communication, Control, and Computing, 2009. Allerton 2009. 47th Annual Allerton Conference On, 30 2009-oct
, vol.2
, pp. 294-300
-
-
Goemans, M.1
Iwata, S.2
Zenklusen, R.3
-
20
-
-
0006714578
-
Matroids and linking systems
-
A. Schrijver, "Matroids and linking systems," Journal of Combinatorial Theory, Series B, vol. 26, no. 3, pp. 349-369, 1979.
-
(1979)
Journal of Combinatorial Theory, Series B
, vol.26
, Issue.3
, pp. 349-369
-
-
Schrijver, A.1
-
21
-
-
33947399169
-
A random linear network coding approach to multicast
-
oct.
-
T. Ho, M. Medard, R. Koetter, D. Karger, M. Effros, J. Shi, and B. Leong, "A random linear network coding approach to multicast," Information Theory, IEEE Transactions on, vol. 52, no. 10, pp. 4413-4430, oct. 2006.
-
(2006)
Information Theory, IEEE Transactions on
, vol.52
, Issue.10
, pp. 4413-4430
-
-
Ho, T.1
Medard, M.2
Koetter, R.3
Karger, D.4
Effros, M.5
Shi, J.6
Leong, B.7
-
23
-
-
83655175354
-
When is a function securely computable?
-
vol. Abs/1007.2945
-
H. Tyagi, P. Narayan, and P. Gupta, "When is a function securely computable?" CoRR, vol. Abs/1007.2945, 2010.
-
(2010)
CoRR
-
-
Tyagi, H.1
Narayan, P.2
Gupta, P.3
-
25
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
January
-
U. M. Maurer, "Conditionally-perfect secrecy and a provably-secure randomized cipher," J. Cryptol., vol. 5, pp. 53-66, January 1992.
-
(1992)
J. Cryptol.
, vol.5
, pp. 53-66
-
-
Maurer, U.M.1
|