-
1
-
-
0016562514
-
The wire-tap channel
-
A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
2
-
-
0015287303
-
Broadcast channels
-
Jan
-
T. Cover, "Broadcast channels," IEEE Trans. Inf. Theory, vol. IT-18, no. 1, pp. 2-14, Jan. 1972.
-
(1972)
IEEE Trans. Inf. Theory
, vol.IT-18
, Issue.1
, pp. 2-14
-
-
Cover, T.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
4
-
-
0027629488
-
Common randomness in information theory and cryptography-Part I: Secret sharing
-
Jul
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography - Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
5
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
6
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
DOI 10.1109/18.825796
-
I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000. (Pubitemid 30582727)
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.2
, pp. 344-366
-
-
Csiszar, I.1
Narayan, P.2
-
7
-
-
70449517098
-
On the delay limited secrecy capacity of fading channels
-
K. Khalil, M. Youssef, O. O. Koyluoglu, and H. E. Gamal, "On the delay limited secrecy capacity of fading channels," in Proc. IEEE Int. Symp. Inf. Theory, 2009, pp. 2617-2621.
-
(2009)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2617-2621
-
-
Khalil, K.1
Youssef, M.2
Koyluoglu, O.O.3
Gamal, H.E.4
-
8
-
-
38349115043
-
Wiretap channel with side information
-
Jan
-
Y. Chen and A. HanVinck, "Wiretap channel with side information," IEEE Trans. Inf. Theory, vol. 54, no. 1, pp. 395-402, Jan. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.1
, pp. 395-402
-
-
Chen, Y.1
Hanvinck, A.2
-
9
-
-
80051780323
-
Secret-key agreement with channel state information at the transmitter
-
Sep
-
A. Khisti, S. Diggavi, and G. Wornell, "Secret-key agreement with channel state information at the transmitter," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 672-681, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 672-681
-
-
Khisti, A.1
Diggavi, S.2
Wornell, G.3
-
10
-
-
84856821725
-
Secret-key generation using correlated sources and channels
-
Feb
-
A. Khisti, S. Diggavi, and G. Wornell, "Secret-key generation using correlated sources and channels," IEEE Trans. Inf. Theory, vol. 58, no. 2, pp. 652-670, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.2
, pp. 652-670
-
-
Khisti, A.1
Diggavi, S.2
Wornell, G.3
-
11
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
New York: Springer Verlag
-
U. Maurer and S. Wolf, Information-theoretic key agreement: From Weak to Strong Secrecy for Free, ser. Lecture Notes in Computer Science. New York: Springer-Verlag, 2000, pp. 351-368.
-
(2000)
Ser. Lecture Notes in Computer Science
, pp. 351-368
-
-
Maurer, U.1
Wolf, S.2
-
15
-
-
84867976707
-
Secrecy via sources and channels: Secure transmission of an independent source with decoder side information
-
presented at the, Monticello, IL, Sep.
-
K. Eswaran and K. Ramchandran, "Secrecy via sources and channels: Secure transmission of an independent source with decoder side information," presented at the 46th Annu.Allerton Conf. Commun., Control Comput., Monticello, IL, Sep. 2008.
-
(2008)
46th Annu.Allerton Conf. Commun., Control Comput.
-
-
Eswaran, K.1
Ramchandran, K.2
-
16
-
-
33646073724
-
An achievable region for the Gaussian wiretap channel with side information
-
May
-
C. Mitrpant, H. Vinck, and Y. Luo, "An achievable region for the Gaussian wiretap channel with side information," IEEE Trans. Inf. Theory, vol. 52, no. 5, pp. 2181-2190, May 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.5
, pp. 2181-2190
-
-
Mitrpant, C.1
Vinck, H.2
Luo, Y.3
-
17
-
-
70349696400
-
Secret communication using sources and channels
-
presented at the, Pacific Grove, CA
-
K. Eswaran, V. Prabhakaran, and K. Ramchandran, "Secret communication using sources and channels," presented at the 42nd Asilomar Conf. Signals, Syst. Comput., Pacific Grove, CA, 2008.
-
(2008)
42nd Asilomar Conf. Signals, Syst. Comput.
-
-
Eswaran, K.1
Prabhakaran, V.2
Ramchandran, K.3
|