-
3
-
-
0016562514
-
The wire-tap channel
-
A. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
4
-
-
0017973511
-
Broadcast channels with condential messages
-
I. Csiszar and J. Korner, "Broadcast channels with condential messages," IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339-348, 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
5
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Transactions on Information Theory, vol. 39, no. 3, pp. 733-742, 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
6
-
-
0027629488
-
Common randomness in information theory and cryptography. I. Secret sharing
-
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography. i. secret sharing," IEEE Transactions on Information Theory, vol. 39, no. 4, pp. 1121-1132, 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
9
-
-
33847353721
-
Secret communication in presence of colluding eavesdroppers
-
S. Goel and R. Negi, "Secret communication in presence of colluding eavesdroppers," in IEEE Military Communications Conference, 2005, pp. 1501-1506.
-
(2005)
IEEE Military Communications Conference
, pp. 1501-1506
-
-
Goel, S.1
Negi, R.2
-
10
-
-
84958598231
-
Unconditional security against memorybounded adversaries
-
C. Cachin and U. Maurer, "Unconditional security against memorybounded adversaries," Advances in Cryptology, pp. 292-306, 1997.
-
(1997)
Advances in Cryptology
, pp. 292-306
-
-
Cachin, C.1
Maurer, U.2
-
11
-
-
84883329227
-
Imft 25-nm mlc nand: Technology scaling barriers broken
-
R. Kuchibhatla, "Imft 25-nm mlc nand: technology scaling barriers broken," EE Times News and Analysis, 2010.
-
(2010)
EE Times News and Analysis
-
-
Kuchibhatla, R.1
-
13
-
-
78149250982
-
A fundamental physical limit to data transmission and processing
-
S. Krone and G. Fettweis, "A fundamental physical limit to data transmission and processing," Signal Processing Letters, IEEE, vol. 17, no. 3, pp. 305-307, 2010.
-
(2010)
Signal Processing Letters, IEEE
, vol.17
, Issue.3
, pp. 305-307
-
-
Krone, S.1
Fettweis, G.2
-
14
-
-
84875711517
-
Exploiting the noncommutativity of nonlinear operators for information-theoretic security in disadvantaged wireless environments
-
A. Sheikholeslami, D. Goeckel, and H. Pishro-nik, "Exploiting the noncommutativity of nonlinear operators for information-theoretic security in disadvantaged wireless environments," 50th Annual Allerton Conference, pp. 233-240, 2012.
-
(2012)
50th Annual Allerton Conference
, pp. 233-240
-
-
Sheikholeslami, A.1
Goeckel, D.2
Pishro-Nik, H.3
-
16
-
-
0017996501
-
The gaussian wire-tap channel
-
S. Leung-Yan-Cheong and M. Hellman, "The gaussian wire-tap channel," IEEE Transactions on Information Theory, vol. 24, no. 4, pp. 451-456, 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
-
17
-
-
0017018484
-
New directions in cryptography
-
W. Dife and M. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Dife, W.1
Hellman, M.2
|