-
1
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Information theoretic security," Found. Trends Commun. Inf. Theory, vol. 5, no. 4-5, pp. 355-580, 2009.
-
(2009)
Found. Trends Commun. Inf. Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai Shitz, S.3
-
3
-
-
84861309485
-
Secrecy on the physical layer in wireless networks
-
Mar.
-
E. A. Jorswieck, A. Wolf, and S. Gerbracht, "Secrecy on the physical layer in wireless networks," Trends Telecomm. Technol., pp. 413-435, Mar. 2010.
-
(2010)
Trends Telecomm. Technol.
, pp. 413-435
-
-
Jorswieck, E.A.1
Wolf, A.2
Gerbracht, S.3
-
4
-
-
84892287919
-
-
NewYork,NY, USA: Springer
-
, R. Liu and W. Trappe, Eds., Securing Wireless Communications at the Physical Layer. NewYork,NY, USA: Springer, 2010.
-
(2010)
Securing Wireless Communications at the Physical Layer
-
-
Liu, R.1
Trappe, W.2
-
7
-
-
0344438837
-
The capacities of certain channel classes under random coding
-
D. Blackwell, L. Breiman, and A. J. Thomasian, "The capacities of certain channel classes under random coding," Ann. Math. Stat., vol. 31, no. 3, pp. 558-567, 1960.
-
(1960)
Ann. Math. Stat.
, vol.31
, Issue.3
, pp. 558-567
-
-
Blackwell, D.1
Breiman, L.2
Thomasian, A.J.3
-
8
-
-
0000095922
-
Elimination of correlation in random codes for arbitrarily varying channels
-
R. Ahlswede, "Elimination of correlation in random codes for arbitrarily varying channels," Z.Wahrscheinlichkeitstheorie verw. Gebiete, vol. 44, pp. 159-175, 1978.
-
(1978)
Z.Wahrscheinlichkeitstheorie Verw. Gebiete
, vol.44
, pp. 159-175
-
-
Ahlswede, R.1
-
9
-
-
0023984409
-
Capacity of the arbitrarily varying channel revisited: Positivity, constraints
-
DOI 10.1109/18.2627
-
I. Csiszár and P. Narayan, "The capacity of the arbitrarily varying channel revisited: Positivity, constraints," IEEE Trans. Inf. Theory, vol. 34, no. 2, pp. 181-193, Mar. 1988. (Pubitemid 18639971)
-
(1988)
IEEE Transactions on Information Theory
, vol.34
, Issue.2
, pp. 181-193
-
-
Csiszar, I.1
Narayan, P.2
-
10
-
-
77949624888
-
Arbitrary jamming can preclude secure communication
-
Control, Computing, Urbana-Champaign, IL, USA, Sep.
-
E. MolavianJazi, M. Bloch, and J. N. Laneman, "Arbitrary jamming can preclude secure communication," in Proc. Allerton Conf. Commun., Control, Computing, Urbana-Champaign, IL, USA, Sep. 2009, pp. 1069-1075.
-
(2009)
Proc. Allerton Conf. Commun.
, pp. 1069-1075
-
-
Molavianjazi, E.1
Bloch, M.2
Laneman, J.N.3
-
11
-
-
84875981940
-
Capacity results for arbitrarily varyingwiretap channels
-
New York, NY, USA: Springer
-
I. Bjelakovi?, H. Boche, and J. Sommerfeld, "Capacity Results for Arbitrarily VaryingWiretap Channels," in Information Theory, Combinatorics, and Search Theory. New York, NY, USA: Springer, 2013, pp. 123-144.
-
(2013)
Information Theory, Combinatorics, and Search Theory
, pp. 123-144
-
-
Bjelakovi, I.1
Boche, H.2
Sommerfeld, J.3
-
12
-
-
0029706655
-
Almost independence and secrecy capacity
-
I. Csiszár, "Almost independence and secrecy capacity," Probl. Pered. Inform., vol. 32, no. 1, pp. 48-57, 1996.
-
(1996)
Probl. Pered. Inform.
, vol.32
, Issue.1
, pp. 48-57
-
-
Csiszár, I.1
-
13
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
May, Springer-Verlag.
-
U. M. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Proc. EUROCRYPT 2000, Lecture Notes in Computer Science, May 2000, vol. 1807, pp. 351-368, Springer-Verlag.
-
(2000)
Proc. EUROCRYPT 2000, Lecture Notes in Computer Science
, vol.1807
, pp. 351-368
-
-
Maurer, U.M.1
Wolf, S.2
-
14
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
15
-
-
80053546706
-
Quantum communication with gaussian channels of zero quantum capacity
-
Oct
-
G. Smith, J. A. Smolin, and J. Yard, "Quantum communication with Gaussian channels of zero quantum capacity," Nature Photon., vol. 5, no. 10, pp. 624-627, Oct. 2011.
-
(2011)
Nature Photon.
, vol.5
, Issue.10
, pp. 624-627
-
-
Smith, G.1
Smolin, J.A.2
Yard, J.3
-
16
-
-
80053529602
-
Quantum communication: Super-activated channels
-
Oct
-
G. Giedke and M. M. Wolf, "Quantum communication: Super-activated channels," Nature Photon., vol. 5, no. 10, pp. 578-580, Oct. 2011.
-
(2011)
Nature Photon.
, vol.5
, Issue.10
, pp. 578-580
-
-
Giedke, G.1
Wolf, M.M.2
-
17
-
-
84876274641
-
Secrecy results for compound wiretap channels
-
Mar
-
I. Bjelakovi?, H. Boche, and J. Sommerfeld, "Secrecy results for compound wiretap channels," Probl. Inf. Transmission, vol. 49, no. 1, pp. 73-98, Mar. 2013.
-
(2013)
Probl. Inf. Transmission
, vol.49
, Issue.1
, pp. 73-98
-
-
Bjelakovi, I.1
Boche, H.2
Sommerfeld, J.3
-
18
-
-
73449104694
-
Compound wiretap channels
-
Article ID 142374
-
Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), "Compound wiretap channels," EURASIP J. Wireless Commun. Netw., pp. 1-13, 2009, Article ID 142374.
-
(2009)
EURASIP J. Wireless Commun. Netw.
, pp. 1-13
-
-
Liang, Y.1
Kramer, G.2
Poor, H.V.3
Shamai Shitz, S.4
|