-
1
-
-
0027629488
-
Common randomness in information theory and cryptography-Part I: Secret sharing
-
Jul.
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
2
-
-
0016037985
-
A simple converse for broadcast channels with additive white Gaussian noise (corresp.)
-
P. Bergmans, "A simple converse for broadcast channels with additive white Gaussian noise (corresp.)," IEEE Trans. Inf. Theory, vol. 20, pp. 279-280, 1974.
-
(1974)
IEEE Trans. Inf. Theory
, vol.20
, pp. 279-280
-
-
Bergmans, P.1
-
3
-
-
45249104850
-
Wireless information theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information theoretic security," IEEE Trans. Inf. Theory, vol. 54, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
5
-
-
84939435969
-
Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
-
Workshops, Taiwan, Oct.
-
S. Cherukuri, K. Venkatsubramanian, and S. Gupta, "Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body," in Proc. Workshop on Wireless Security and Privacy (WiSPr), Int. Conf. Parallel Process. Workshops, Taiwan, Oct. 2003, pp. 432-439.
-
(2003)
Proc. Workshop on Wireless Security and Privacy (WiSPr), Int. Conf. Parallel Process.
, pp. 432-439
-
-
Cherukuri, S.1
Venkatsubramanian, K.2
Gupta, S.3
-
6
-
-
33750056552
-
Almost independence and secrecy capacity (in russian)
-
I. Csiszár, "Almost independence and secrecy capacity (in russian)," Probl. Inf. Transmiss., vol. 32, pp. 48-57, 1996.
-
(1996)
Probl. Inf. Transmiss.
, vol.32
, pp. 48-57
-
-
Csiszár, I.1
-
7
-
-
0017973511
-
Broadcast channels with confidential messages
-
Mar.
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, pp. 339-348, Mar. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
9
-
-
0033891095
-
Common randomness and secret-key generation with a helper
-
Mar.
-
I. Csiszár and P. Narayan, "Common randomness and secret-key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, pp. 344-366, Mar. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, pp. 344-366
-
-
Csiszár, I.1
Narayan, P.2
-
10
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, pp. 3047-3061, 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
11
-
-
84888076958
-
The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel
-
submitted for publication
-
E. Ekrem and S. Ulukus, "The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel," IEEE Trans. Inf. Theory, submitted for publication.
-
IEEE Trans. Inf. Theory
-
-
Ekrem, E.1
Ulukus, S.2
-
12
-
-
0003179124
-
Capacity of the product and sum of two un-matched broadcast channels
-
Jan.-Mar.
-
A. A. E. Gamal, "Capacity of the product and sum of two un-matched broadcast channels," Probl. Inf. Transmiss., pp. 3-23, Jan.-Mar. 1980.
-
(1980)
Probl. Inf. Transmiss.
, pp. 3-23
-
-
Gamal, A.A.E.1
-
14
-
-
77954600460
-
Information-theoretic key agreement of multiple terminals-Part I
-
Jun.
-
A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals-Part I," IEEE Trans. Inf. Theory, vol. 56, pp. 3973-3996, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, pp. 3973-3996
-
-
Gohari, A.1
Anantharam, V.2
-
15
-
-
52349088659
-
Lossless compression with security constraints
-
Toronto, Jul.
-
D. Gunduz, E. Erkip, and H. V. Poor, "Lossless compression with security constraints," in Proc. Int. Symp. Inf. Theory, Toronto, Jul. 2008.
-
(2008)
Proc. Int. Symp. Inf. Theory
-
-
Gunduz, D.1
Erkip, E.2
Poor, H.V.3
-
16
-
-
77952701255
-
Secure degrees of freedom for Gaussian channels with interference: Structured codes outperform Gaussian signaling
-
submitted for publication
-
X. He and A. Yener, "Secure degrees of freedom for Gaussian channels with interference: Structured codes outperform Gaussian signaling," IEEE Trans. Inf. Theory, submitted for publication.
-
IEEE Trans. Inf. Theory
-
-
He, X.1
Yener, A.2
-
18
-
-
52349090484
-
Secret key generation using correlated sources and noisy channels
-
Toronto, Canada, Jun.
-
A. Khisti, S. N. Diggavi, and G. W. Wornell, "Secret key generation using correlated sources and noisy channels," in Proc. Int. Symp. Inf. Theory, Toronto, Canada, Jun. 2008.
-
(2008)
Proc. Int. Symp. Inf. Theory
-
-
Khisti, A.1
Diggavi, S.N.2
Wornell, G.W.3
-
19
-
-
45249092485
-
Secure broadcasting over fading channels
-
Jun.
-
A. Khisti, A. Tchamkerten, and G. W. Wornell, "Secure broadcasting over fading channels," IEEE Trans. Inf. Theory, Special Issue on Inf. Theoret. Secur., vol. 54, pp. 2453-2469, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory, Special Issue on Inf. Theoret. Secur.
, vol.54
, pp. 2453-2469
-
-
Khisti, A.1
Tchamkerten, A.2
Wornell, G.W.3
-
20
-
-
77958560746
-
Secure transmission with multiple antennas: The MIMOME wiretap channel
-
Nov.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
21
-
-
77953802876
-
Secure transmission with multiple antennas: The MISOME wiretap channel
-
Jul.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
22
-
-
79957667257
-
Interference alignment for secrecy
-
Jun.
-
O. O. Koyluoglu, H. E. Gamal, L. Lai, and H. V. Poor, "Interference alignment for secrecy," IEEE Trans. Inf. Theory, vol. 56, no. 6, pp. 3323-3332, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.56
, Issue.6
, pp. 3323-3332
-
-
Koyluoglu, O.O.1
Gamal, H.E.2
Lai, L.3
Poor, H.V.4
-
23
-
-
51349109773
-
The relay eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L. Lai and H. E. Gamal, "The relay eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, pp. 4005-4019
-
-
Lai, L.1
Gamal, H.E.2
-
24
-
-
66949180834
-
A note on the secrecy capacity of the multiple- antenna wiretap channel
-
Jun.
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multiple- antenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, pp. 2547-2553, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
25
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
U. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Proc. EUROCRYPT 2000, 2000, vol. 1807, pp. 351-368.
-
(2000)
Proc. EUROCRYPT 2000
, vol.1807
, pp. 351-368
-
-
Maurer, U.1
Wolf, S.2
-
26
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
Mar.
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, pp. 733-742, Mar. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.M.1
-
27
-
-
45249086542
-
Shannon's secrecy system with informed receivers an its application to systematic coding for wiretapped channels
-
N. Merhav, "Shannon's secrecy system with informed receivers an its application to systematic coding for wiretapped channels," IEEE Trans. Inf. Theory, vol. 54, pp. 2723-2734, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, pp. 2723-2734
-
-
Merhav, N.1
-
30
-
-
45249101530
-
The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
31
-
-
0016562514
-
The wiretap channel
-
A. D. Wyner, "The wiretap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
32
-
-
0031143282
-
Rate distortion theory for the shannon cipher system
-
May
-
H. Yamamoto, "Rate distortion theory for the shannon cipher system," IEEE Trans. Inf. Theory, vol. 43, May 1997.
-
(1997)
IEEE Trans. Inf. Theory
, vol.43
-
-
Yamamoto, H.1
|