-
1
-
-
84856089981
-
-
publications. http://goo.gl/4YZLT
-
C. Chan, publications. http://chungc.net63.net/pub, http://goo.gl/4YZLT.
-
-
-
Chan, C.1
-
3
-
-
45249104852
-
Secrecy capacities for multiterminal channel models
-
June
-
-, "Secrecy capacities for multiterminal channel models," IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2437-2452, June 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2437-2452
-
-
Csiszár, I.1
Narayan, P.2
-
4
-
-
0029405656
-
Generalized privacy amplification
-
Nov
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, "Generalized privacy amplification," IEEE Transactions on Information Theory, vol. 41, no. 6, pp. 1915-1923, Nov 1995.
-
(1995)
IEEE Transactions on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
5
-
-
79957636296
-
Exponential decreasing rate of leaked information in universal random privacy amplification
-
june
-
M. Hayashi, "Exponential decreasing rate of leaked information in universal random privacy amplification," Information Theory, IEEE Transactions on, vol. 57, no. 6, pp. 3989-4001, june 2011.
-
(2011)
Information Theory, IEEE Transactions on
, vol.57
, Issue.6
, pp. 3989-4001
-
-
Hayashi, M.1
-
6
-
-
83655175354
-
When is a function securely computable?
-
vol. abs/1007.2945
-
H. Tyagi, P. Narayan, and P. Gupta, "When is a function securely computable?" CoRR, vol. abs/1007.2945, 2010.
-
(2010)
CoRR
-
-
Tyagi, H.1
Narayan, P.2
Gupta, P.3
-
7
-
-
80054797796
-
-
Ph.D. dissertation, Massachusetts Institute of Technology, see [1]
-
C. Chan, "Generating secret in a network," Ph.D. dissertation, Massachusetts Institute of Technology, 2010, see [1].
-
(2010)
Generating Secret in A Network
-
-
Chan, C.1
-
9
-
-
83655191085
-
Linear perfect secret key agreement
-
see [1]
-
C. Chan, "Linear perfect secret key agreement," in 2011 IEEE Information Theory Workshop Proceedings (ITW2011), Paraty, Brazil, Oct. 2011, see [1].
-
2011 IEEE Information Theory Workshop Proceedings (ITW2011), Paraty, Brazil, Oct. 2011
-
-
Chan, C.1
-
12
-
-
84856120033
-
Secure multiplex network coding
-
vol. abs/1102.3002
-
R. Matsumoto and M. Hayashi, "Secure multiplex network coding," CoRR, vol. abs/1102.3002, 2011.
-
(2011)
CoRR
-
-
Matsumoto, R.1
Hayashi, M.2
-
15
-
-
80054806545
-
The hidden flow of information
-
see [1]
-
-, "The hidden flow of information," in 2011 IEEE International Symposium on Information Theory Proceedings (ISIT2011), St. Petersburg, Russia, Jul. 2011, see [1].
-
2011 IEEE International Symposium on Information Theory Proceedings (ISIT2011), St. Petersburg, Russia, Jul. 2011
-
-
Chan, C.1
|