메뉴 건너뛰기




Volumn , Issue , 2012, Pages 406-410

Secure channel simulation

Author keywords

[No Author keywords available]

Indexed keywords

ACHIEVABILITY; LOWER BOUNDS; RANDOM BINNING; SECURE CHANNELS; SHARED SECRETS; SOURCE MODELS;

EID: 84873149214     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITW.2012.6404703     Document Type: Conference Paper
Times cited : (9)

References (8)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography. Part I: Secret sharing
    • R. Ahlswede and I. Csiszar, "Common Randomness in Information Theory and Cryptography. Part I: Secret sharing," IEEE Trans. IT, 39 (4), 1121-1132, 1993.
    • (1993) IEEE Trans. IT , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., 54 (8), 1355-1387, 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 3
    • 80053961199 scopus 로고    scopus 로고
    • When is a function securely computable?
    • H. Tyagi, P. Narayan and P. Gupta, "When Is a Function Securely Computable?," IEEE Trans. IT, 57(10), 6337-6350, 2011.
    • (2011) IEEE Trans. IT , vol.57 , Issue.10 , pp. 6337-6350
    • Tyagi, H.1    Narayan, P.2    Gupta, P.3
  • 7
    • 77954600460 scopus 로고    scopus 로고
    • Information-theoretic key agreement of multiple terminals: Part I
    • A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals: part I," IEEE Trans. IT, 56(8): 3973-3996 (2010).
    • (2010) IEEE Trans. IT , vol.56 , Issue.8 , pp. 3973-3996
    • Gohari, A.1    Anantharam, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.