-
1
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
4
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
6
-
-
0027602480
-
Approximation theory of output statistics
-
May
-
T. S. Han and S. Verdú, "Approximation theory of output statistics," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 752-772, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 752-772
-
-
Han, T.S.1
Verdú, S.2
-
7
-
-
33747102990
-
Identification via channels
-
Jan
-
R. Ahlswede and G. Dueck, "Identification via channels," IEEE Trans. Inf. Theory, vol. 35, no. 1, pp. 5-29, Jan. 1989.
-
(1989)
IEEE Trans. Inf. Theory
, vol.35
, Issue.1
, pp. 5-29
-
-
Ahlswede, R.1
Dueck, G.2
-
8
-
-
12444299059
-
The private classical capacity and quantum capacity of a quantum channel
-
DOI 10.1109/TIT.2004.839515
-
I. Devetak, "The private classical information capacity and quantum information capacity of a quantum channel," IEEE Trans. Inf. Theory, vol. 51, no. 1, pp. 44-55, Jan. 2005. (Pubitemid 40145986)
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.1
, pp. 44-55
-
-
Devetak, I.1
-
9
-
-
33645727315
-
General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel
-
Apr
-
M. Hayashi, "General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel," IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1562-1575, Apr. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.4
, pp. 1562-1575
-
-
Hayashi, M.1
-
10
-
-
0027582866
-
Spectrum invariancy under output approximation for full-rank discrete memoryless channels
-
T. S. Han and S. Verdú, "Spectrum invariancy under output approximation for full-rank discrete memoryless channels," Probl. Peredachi Inf., vol. 29, no. 2, pp. 9-27, 1993.
-
(1993)
Probl. Peredachi Inf
, vol.29
, Issue.2
, pp. 9-27
-
-
Han, T.S.1
Verdú, S.2
-
12
-
-
0036713329
-
Random codes: Minimum distances and error exponents
-
DOI 10.1109/TIT.2002.800480, PII 1011092002800480
-
A. Barg and G. D. Forney, "Random codes: minimum distance and error exponent," IEEE Trans. Inf. Theory, vol. 48, no. 9, pp. 2568-2573, Sep. 2002. (Pubitemid 35032681)
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.9
, pp. 2568-2573
-
-
Barg, A.1
Forney Jr., G.D.2
-
13
-
-
79960429161
-
Secrecy coding for the binary symmetric wiretap channel
-
Aug
-
Y. Chen and A. J. H. Vinck, "Secrecy coding for the binary symmetric wiretap channel," Security Commun. Netw., vol. 4, no. 8, pp. 966-978, Aug. 2011.
-
(2011)
Security Commun. Netw
, vol.4
, Issue.8
, pp. 966-978
-
-
Chen, Y.1
Vinck, A.J.H.2
-
14
-
-
84948960386
-
Information-theoretic key agreement: From week to strong secrecy for free
-
U. Maurer and S. Wolf, "Information-theoretic key agreement: From week to strong secrecy for free," in Proc. 19th Int. Conf. Theory Appl. Cryptographic Tech., 2000, pp. 351-368, 1807.
-
(2000)
Proc. 19th Int. Conf. Theory Appl. Cryptographic Tech
, vol.1807
, pp. 351-368
-
-
Maurer, U.1
Wolf, S.2
-
15
-
-
0141913937
-
Secret sharing system using threshold scheme
-
Japanese, (English translation: Electronics and Communications in Japan, Part I, vol. 69, no. 9, pp. 46-54, Scripta Technica, Inc., 1986)
-
H. Yamamoto, "Secret sharing system using threshold scheme," (in Japanese) Trans. IECE Jpn., vol. J68-A, no. 9, pp. 945-952, 1985, (English translation: Electronics and Communications in Japan, Part I, vol. 69, no. 9, pp. 46-54, Scripta Technica, Inc., 1986).
-
(1985)
Trans. IECE Jpn
, vol.J68-A
, Issue.9
, pp. 945-952
-
-
Yamamoto, H.1
-
16
-
-
70449482308
-
Strongly secure linear network coding
-
K. Harada and H. Yamamoto, "Strongly secure linear network coding," IEICE Trans. Fund., vol. E91, no. 10, pp. 2720-2728, 2008.
-
(2008)
IEICE Trans. Fund
, vol.E91
, Issue.10
, pp. 2720-2728
-
-
Harada, K.1
Yamamoto, H.2
-
17
-
-
51649088455
-
Multiplex coding of bit commitment based on a discrete memoryless channel
-
Nice, France, Jun. 24-29
-
H. Yamamoto and D. Isami, "Multiplex coding of bit commitment based on a discrete memoryless channel," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 24-29, 2007, pp. 721-725.
-
(2007)
Proc IEEE Int. Symp. Inf. Theory
, pp. 721-725
-
-
Yamamoto, H.1
Isami, D.2
|