-
1
-
-
0027629488
-
Common randomness in information theory and cryptography-part I: Secret sharing
-
R. Ahlswede and I. Csisźar, "Common randomness in information theory and cryptography-part i: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, pp. 1121-1132, 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csisźar, I.2
-
2
-
-
0031701886
-
Common randomness in information theory and cryptography-part ii: Cr capacity
-
PII S0018944898000777
-
R. Ahlswede and I. Csisźar, "Common randomness in information theory and cryptography-part ii: CR capacity," IEEE Trans. Inf. Theory, vol. 44, pp. 225-240, 1998. (Pubitemid 128737891)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.1
, pp. 225-240
-
-
Ahlswede, R.1
Csiszar, I.2
-
3
-
-
84856086676
-
Multiterminal secure source coding for a common secret source
-
C. Chan, "Multiterminal secure source coding for a common secret source," in Proc.f 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 188-195, 2011.
-
(2011)
Proc.f 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton)
, pp. 188-195
-
-
Chan, C.1
-
4
-
-
0029706655
-
Almost independence and secrecy capacity
-
I. Csisźar, "Almost independence and secrecy capacity," Prob. Pered. Inform., vol. 32, no. 1, pp. 48-57, 1996.
-
(1996)
Prob. Pered. Inform
, vol.32
, Issue.1
, pp. 48-57
-
-
Csisźar, I.1
-
6
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
I. Csisźar and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csisźar, I.1
Narayan, P.2
-
7
-
-
45249104852
-
Secrecy capacities for multiterminal channel models
-
I. Csisźar and P. Narayan, "Secrecy capacities for multiterminal channel models," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2437-2452, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2437-2452
-
-
Csisźar, I.1
Narayan, P.2
-
8
-
-
0023981825
-
Finding parity in a simple broadcast nework
-
R. G. Gallager, "Finding parity in a simple broadcast nework," IEEE Trans. Inf. Theory, vol. 34, no. 2, pp. 176-180, 1988.
-
(1988)
IEEE Trans. Inf. Theory
, vol.34
, Issue.2
, pp. 176-180
-
-
Gallager, R.G.1
-
9
-
-
17144395505
-
Computing and communicating functions over sensor networks
-
DOI 10.1109/JSAC.2005.843543
-
A. Giridhar and P. Kumar, "Computing and communicating functions over sensor networks," IEEE J. Sel. Areas Commun., vol. 23, no. 4, pp. 755-764, 2005. (Pubitemid 40519630)
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.4
, pp. 755-764
-
-
Giridhar, A.1
Kumar, P.R.2
-
11
-
-
70449514183
-
Information-theoretic bounds for multiround function computation in collocated networks
-
N. Ma, P. Ishwar, and P. Gupta, "Information-theoretic bounds for multiround function computation in collocated networks," IEEE International Symposium on Information Theory (ISIT), pp. 2306-2310, 2009.
-
(2009)
IEEE International Symposium on Information Theory (ISIT)
, pp. 2306-2310
-
-
Ma, N.1
Ishwar, P.2
Gupta, P.3
-
12
-
-
77957602848
-
Information inequalities for joint distributions, with interpretations and applications
-
M. Madiman and P. Tetali, "Information inequalities for joint distributions, with interpretations and applications," IEEE Trans. Inf. Theory, vol. 56, pp. 2699-2713, 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, pp. 2699-2713
-
-
Madiman, M.1
Tetali, P.2
-
13
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, pp. 733-742, 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.M.1
-
14
-
-
0005059185
-
-
R.E. Blahut et al., Eds. ed. Norwell, MA: Kluwer, ch. 26
-
Communications and Cryptography: Two sides of One Tapestry, R.E. Blahut et al., Eds. ed. Norwell, MA: Kluwer, ch. 26, pp. 271-285, 1994.
-
(1994)
Communications and Cryptography: Two Sides of One Tapestry
, pp. 271-285
-
-
Maurer, U.M.1
-
16
-
-
0035271234
-
Coding for computing
-
DOI 10.1109/18.915643, PII S0018944801003704
-
A. Orlitsky and J. R. Roche, "Coding for computing," IEEE Trans. Inf. Theory, vol. 47, no. 3, pp. 903-917, 2001. (Pubitemid 32425425)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.3
, pp. 903-917
-
-
Orlitsky, A.1
Roche, J.R.2
-
17
-
-
0015648934
-
Noiseless coding of correlated information source
-
D. Slepian and J. Wolf, "Noiseless coding of correlated information source," IEEE Trans. Inf. Theory, vol. 19, no. 4, pp. 471-480, 1973.
-
(1973)
IEEE Trans. Inf. Theory
, vol.19
, Issue.4
, pp. 471-480
-
-
Slepian, D.1
Wolf, J.2
-
18
-
-
77955694833
-
Secure computing
-
June
-
H. Tyagi, P. Narayan, and P. Gupta, "Secure computing," Proc. Int. Symp. Inform. Theory, pp. 2612-2616, June 2010.
-
(2010)
Proc. Int. Symp. Inform. Theory
, pp. 2612-2616
-
-
Tyagi, H.1
Narayan, P.2
Gupta, P.3
-
19
-
-
80053961199
-
When is a function securely computable?
-
H. Tyagi, P. Narayan, and P. Gupta, "When is a function securely computable?" IEEE Trans. Inf. Theory, vol. 57, no. 10, 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.10
-
-
Tyagi, H.1
Narayan, P.2
Gupta, P.3
-
20
-
-
85039623622
-
Some complexity questions related to distributive computing
-
A. C. Yao, "Some complexity questions related to distributive computing," Proc. 11th Ann. Symp. on Theory of Computing, pp. 209-213, 1979.
-
(1979)
Proc. 11th Ann. Symp. on Theory of Computing
, pp. 209-213
-
-
Yao, A.C.1
|