-
1
-
-
84896963786
-
Compression with side information using turbo codes
-
Snowbird, UT, Apr.
-
A. Aaron and B. Girod, "Compression with side information using turbo codes," in Proc. IEEE Data Compression Conf., Snowbird, UT, Apr. 2002, pp. 252-261.
-
(2002)
Proc. IEEE Data Compression Conf.
, pp. 252-261
-
-
Aaron, A.1
Girod, B.2
-
2
-
-
0027629488
-
Common randomness in information theory and cryptography, Part I: Secret sharing
-
Jul.
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
3
-
-
84856814511
-
-
[Online]. Available
-
M. Andersson, V. Rathi, R. Thobaben, J. Kliewer, and M. Skoglund, Nested polar codes for wireless and relay channels 2010 [Online]. Available: http://arxiv.org/pdf/1006.3573
-
Nested Polar Codes for Wireless and Relay Channels 2010
-
-
Andersson, M.1
Rathi, V.2
Thobaben, R.3
Kliewer, J.4
Skoglund, M.5
-
4
-
-
67650099990
-
Channel polarization: A method for constructing capacity- achieving codes for symmetric binary-input memoryless channel
-
Jul.
-
E. Arikan, "Channel polarization: A method for constructing capacity- achieving codes for symmetric binary-input memoryless channel," IEEE Trans. Inf. Theory, vol. 55, no. 7, pp. 3051-3073, Jul. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.7
, pp. 3051-3073
-
-
Arikan, E.1
-
6
-
-
0029405656
-
Generalized privacy amplification
-
Nov.
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
7
-
-
45249104850
-
Wireless information theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. Rodrigues, and S. W. M. McLaughlin, "Wireless information theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.3
McLaughlin, S.W.M.4
-
8
-
-
2642586749
-
On some new approaches to practical Slepian-Wolf compression inspired by channel coding
-
Snowbird, UT, Mar.
-
T. P. Coleman, A. H. Lee, M. Médard, and M. Effros, "On some new approaches to practical Slepian-Wolf compression inspired by channel coding," in Proc. IEEE Data Compression Conf., Snowbird, UT, Mar. 2004, pp. 282-291.
-
(2004)
Proc. IEEE Data Compression Conf.
, pp. 282-291
-
-
Coleman, T.P.1
Lee, A.H.2
Médard, M.3
Effros, M.4
-
9
-
-
0020152829
-
Linear codes for sources and source networks: Error exponents, universal coding
-
Jul.
-
I. Csiszár, "Linear codes for sources and source networks: Error exponents, universal coding," IEEE Trans. Inf. Theory, vol. 28, no. 4, pp. 585-592, Jul. 1982.
-
(1982)
IEEE Trans. Inf. Theory
, vol.28
, Issue.4
, pp. 585-592
-
-
Csiszár, I.1
-
11
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
Mar.
-
I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.2
, pp. 344-366
-
-
Csiszár, I.1
Narayan, P.2
-
12
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec.
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
13
-
-
45249104852
-
Secrecy capacities for multiterminal channel models
-
Jun.
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiterminal channel models," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2437-2452, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2437-2452
-
-
Csiszár, I.1
Narayan, P.2
-
14
-
-
0001807543
-
Coding for noisy channels
-
P. Elias, "Coding for noisy channels," IRE Convention Rec., pt. 4, pp. 37-46, 1955.
-
(1955)
IRE Convention Rec.
, vol.PART.4
, pp. 37-46
-
-
Elias, P.1
-
15
-
-
84856812994
-
Bounds for the probability of decoding error when using linear codes over memoryless channels
-
E. M. Gabidulin, "Bounds for the probability of decoding error when using linear codes over memoryless channels," Prob. Pered. Inf., vol. 3, pp. 55-62, 1967.
-
(1967)
Prob. Pered. Inf.
, vol.3
, pp. 55-62
-
-
Gabidulin, E.M.1
-
16
-
-
0001287157
-
Compression of correlated binary sources using turbo codes
-
Oct.
-
J. Garcia-Frias and Y. Zhao, "Compression of correlated binary sources using turbo codes," IEEE Commun. Lett., vol. 5, no. 11, pp. 417-419, Oct. 2001.
-
(2001)
IEEE Commun. Lett.
, vol.5
, Issue.11
, pp. 417-419
-
-
Garcia-Frias, J.1
Zhao, Y.2
-
17
-
-
0037351875
-
LDPC codes for compression of multi-terminal sources with hidden Markov correlation
-
Mar.
-
J. Garcia-Frias and W. Zhong, "LDPC codes for compression of multi-terminal sources with hidden Markov correlation," IEEE Commun. Lett., vol. 7, no. 3, pp. 115-117, Mar. 2003.
-
(2003)
IEEE Commun. Lett.
, vol.7
, Issue.3
, pp. 115-117
-
-
Garcia-Frias, J.1
Zhong, W.2
-
19
-
-
77954600460
-
Information-theoretic key agreement of multiple terminals-part I
-
Aug.
-
A. A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals-part I," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3973-3996, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3973-3996
-
-
Gohari, A.A.1
Anantharam, V.2
-
20
-
-
39049123787
-
On the duality between Slepian-Wolf coding and channel coding
-
Seattle, WA, Jul.
-
D.-K. He and E.-H. Yang, "On the duality between Slepian-Wolf coding and channel coding," in Proc. Int. Symp. Inf. Theory, Seattle, WA, Jul. 2006, pp. 2546-2550.
-
(2006)
Proc. Int. Symp. Inf. Theory
, pp. 2546-2550
-
-
He, D.-K.1
E.-H. Yang2
-
21
-
-
18144395071
-
A new coding scheme for the noisychannel Slepian-Wolf problem: Separate design and joint decoding
-
Dallas, TX
-
R. Hu, R. Viswanathan, and J. Li, "A new coding scheme for the noisychannel Slepian-Wolf problem: Separate design and joint decoding," in Proc. Global Commun. Conf., Dallas, TX, 2004.
-
(2004)
Proc. Global Commun. Conf.
-
-
Hu, R.1
Viswanathan, R.2
Li, J.3
-
23
-
-
2642523128
-
Slepian-Wolf coding of multiple M-ary sources using LDPC code
-
Snowbird, UT, Mar.
-
C. Lan, A. Liveris, K. Narayanan, Z. Xiong, and C. N. Georghiades, "Slepian-Wolf coding of multiple M-ary sources using LDPC code," in Proc. IEEE Data Compression Conf., Snowbird, UT, Mar. 2004, p. 549.
-
(2004)
Proc. IEEE Data Compression Conf.
, pp. 549
-
-
Lan, C.1
Liveris, A.2
Narayanan, K.3
Xiong, Z.4
Georghiades, C.N.5
-
24
-
-
2642563901
-
Slepian-Wolf coding for nonuniform sources using turbo codes
-
Snowbird, UT, Mar.
-
J. Li, Z. Tu, and R. Blum, "Slepian-Wolf coding for nonuniform sources using turbo codes," in Proc. IEEE Data Compression Conf., Snowbird, UT, Mar. 2004, pp. 312-321.
-
(2004)
Proc. IEEE Data Compression Conf.
, pp. 312-321
-
-
Li, J.1
Tu, Z.2
Blum, R.3
-
25
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. Shamai, "Information theoretic security," Found. rends Commun. Inf. Theory, vol. 5, no. 4-5, pp. 355-580, 2008.
-
(2008)
Found. rends Commun. Inf. Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
26
-
-
0036810616
-
Compression of binary sources with side information at the decoding using LDPC codes
-
Oct.
-
A. D. Liveris, Z. Xiong, and C. N. Georghiades, "Compression of binary sources with side information at the decoding using LDPC codes," IEEE Commun. Lett., vol. 6, no. 10, pp. 440-442, Oct. 2002.
-
(2002)
IEEE Commun. Lett.
, vol.6
, Issue.10
, pp. 440-442
-
-
Liveris, A.D.1
Xiong, Z.2
Georghiades, C.N.3
-
27
-
-
2642555455
-
Slepian-Wolf coding of three binary sources using LDPC codes
-
Brest, France, Sep.
-
A. D. Liveris, C. Lan, K. R. Narayanan, Z. Xiong, and C. N. Georghiades, "Slepian-Wolf coding of three binary sources using LDPC codes," in Proc. Int. Symp. Turbo Codes and Related Topics, Brest, France, Sep. 2003.
-
(2003)
Proc. Int. Symp. Turbo Codes and Related Topics
-
-
Liveris, A.D.1
Lan, C.2
Narayanan, K.R.3
Xiong, Z.4
Georghiades, C.N.5
-
28
-
-
0033099611
-
Good error correcting codes based on very sparse matrices
-
Mar.
-
D. J. C. Mackay, "Good error correcting codes based on very sparse matrices," IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 399-431, Mar. 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.2
, pp. 399-431
-
-
Mackay, D.J.C.1
-
30
-
-
0016046144
-
Probabilistic characteristics of graphs with large connectivity
-
Apr.
-
G. A. Margulis, "Probabilistic characteristics of graphs with large connectivity," Probl. Inf. Trans., vol. 10, pp. 174-179, Apr. 1974.
-
(1974)
Probl. Inf. Trans.
, vol.10
, pp. 174-179
-
-
Margulis, G.A.1
-
31
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
32
-
-
84948410230
-
Turbo source coding: A noise-robust approach to data compression
-
Snowbird, UT, Apr.
-
P. Mitran and J. Bajcsy, "Turbo source coding: A noise-robust approach to data compression," in IEEE Data Compression Conf., Snowbird, UT, Apr. 2002, p. 465.
-
(2002)
IEEE Data Compression Conf.
, pp. 465
-
-
Mitran, P.1
Bajcsy, J.2
-
33
-
-
33747886952
-
Secret key agreement from correlated source outputs using LDPC matrices
-
Jul.
-
J. Muramatsu, "Secret key agreement from correlated source outputs using LDPC matrices," IEICE Trans. Fundamentals, vol. E89-A, pp. 2036-2046, Jul. 2006.
-
(2006)
IEICE Trans. Fundamentals
, vol.E89-A
, pp. 2036-2046
-
-
Muramatsu, J.1
-
34
-
-
45249118588
-
Secret key generation for correlated Gaussian sources
-
Monticello, IL, Sep.
-
S. Nitinawarat, "Secret key generation for correlated Gaussian sources," in Proc. Allerton Conf. Commun., Control, and Computing, Monticello, IL, Sep. 2007, pp. 1054-1058.
-
(2007)
Proc. Allerton Conf. Commun., Control, and Computing
, pp. 1054-1058
-
-
Nitinawarat, S.1
-
35
-
-
84856814516
-
Secret key generation for correlated Gaussian sources
-
to be published
-
S. Nitinawarat and P. Narayan, "Secret key generation for correlated Gaussian sources," IEEE Trans. Inf. Theory, 2011, to be published.
-
(2011)
IEEE Trans. Inf. Theory
-
-
Nitinawarat, S.1
Narayan, P.2
-
37
-
-
0037356065
-
Distributed source coding using syndromes (DISCUS): Design and construction
-
Mar.
-
S. S. Pradhan and K. Ramchandran, "Distributed source coding using syndromes (DISCUS): Design and construction," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 626-643, Mar. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.3
, pp. 626-643
-
-
Pradhan, S.S.1
Ramchandran, K.2
-
38
-
-
35248888499
-
New bounds in secret-key agreement: The gap between formation and secrecy extraction
-
Lecture Notes in Computer Science
-
R. Renner and S. Wolf, "New bounds in secret-key agreement: The gap between formation and secrecy extraction," in Proc. EUROCRYPT, 2003, vol. 2656, Lecture Notes in Computer Science, pp. 562-577.
-
(2003)
Proc. EUROCRYPT
, vol.2656
, pp. 562-577
-
-
Renner, R.1
Wolf, S.2
-
39
-
-
0035246307
-
The capacity of low-density parity-check codes under message-passing decoding
-
Feb.
-
T. J. Richardson and R. L. Urbanke, "The capacity of low-density parity-check codes under message-passing decoding," IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 599-618, Feb. 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.2
, pp. 599-618
-
-
Richardson, T.J.1
Urbanke, R.L.2
-
43
-
-
2642523145
-
Distributed code constructions for the entire Slepian-Wolf rate region for arbitrarily correlated sources
-
Snowbird, UT, Mar.
-
D. Schonberg, K. Ramchandran, and S. S. Pradhan, "Distributed code constructions for the entire Slepian-Wolf rate region for arbitrarily correlated sources," in Proc. IEEE Data Compression Conf., Snowbird, UT, Mar. 2004, pp. 292-301.
-
(2004)
Proc. IEEE Data Compression Conf.
, pp. 292-301
-
-
Schonberg, D.1
Ramchandran, K.2
Pradhan, S.S.3
-
44
-
-
0019608335
-
A recursive approach to low complexity codes
-
Sep.
-
R. M. Tanner, "A recursive approach to low complexity codes," IEEE Trans. Inf. Theory, vol. 27, no. 5, pp. 533-547, Sep. 1981.
-
(1981)
IEEE Trans. Inf. Theory
, vol.27
, Issue.5
, pp. 533-547
-
-
Tanner, R.M.1
-
45
-
-
33749441856
-
Capacity achieving codes for the wiretap channel with applications to quantum key distribution
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. McLaughlin, and J. M. Merolla, "Capacity achieving codes for the wiretap channel with applications to quantum key distribution," e-print cs. IT/0411003, 2004.
-
(2004)
E-print CS. IT/0411003
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.4
Merolla, J.M.5
-
46
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
Aug.
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. McLaughlin, and J. M. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.4
Merolla, J.M.5
-
47
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
Sep.
-
R. Wilson, D. Tse, and R. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Trans. Inf. Foren. Secur., vol. 2, no. 3, pp. 364-375, Sep. 2007.
-
(2007)
IEEE Trans. Inf. Foren. Secur.
, vol.2
, Issue.3
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.3
-
48
-
-
0015992185
-
Recent results in the Shannon theory
-
Jan.
-
A. D. Wyner, "Recent results in the Shannon theory," IEEE Trans. Inf. Theory, vol. 20, no. 1, pp. 2-10, Jan. 1974.
-
(1974)
IEEE Trans. Inf. Theory
, vol.20
, Issue.1
, pp. 2-10
-
-
Wyner, A.D.1
-
49
-
-
33749443558
-
Secret key and private key constructions for simple multiterminal source models
-
Adelaide, Australia, Sep.
-
C. Ye and P. Narayan, "Secret key and private key constructions for simple multiterminal source models," in Proc. IEEE Int. Symp. Inf. Theory, Adelaide, Australia, Sep. 2005, pp. 2133-2137.
-
(2005)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2133-2137
-
-
Ye, C.1
Narayan, P.2
-
50
-
-
84856897739
-
Secret key constructions for simple multiterminal source models
-
San Diego, CA, Feb.
-
C. Ye and P. Narayan, "Secret key constructions for simple multiterminal source models," in Proc. Inf. Theory and ApplicationsWorkshop, San Diego, CA, Feb. 2006.
-
(2006)
Proc. Inf. Theory and Applications Workshop
-
-
Ye, C.1
Narayan, P.2
-
51
-
-
39049156464
-
Extracting secrecy from jointly Gaussian random variables
-
Jul.
-
C. Ye, A. Reznik, and Y. Shah, "Extracting secrecy from jointly Gaussian random variables," in Proc. Int. Symp. Inf. Theory, Jul. 2006, pp. 2593-2597.
-
(2006)
Proc. Int. Symp. Inf. Theory
, pp. 2593-2597
-
-
Ye, C.1
Reznik, A.2
Shah, Y.3
-
52
-
-
77952604175
-
Information-theoretically secret key generation for fading wireless channels
-
Jun.
-
C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. Mandayam, "Information-theoretically secret key generation for fading wireless channels," IEEE Trans. Inf. Foren. Secur., vol. 5, no. 2, pp. 240-254, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Foren. Secur.
, vol.5
, Issue.2
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Shah, Y.4
Trappe, W.5
Mandayam, N.6
|