-
1
-
-
0027629488
-
Common randomness in information theory and cryptography, part i: Secret sharing
-
July
-
R. Ahlswede and I. Csisźar, "Common randomness in information theory and cryptography, Part I: Secret sharing, " IEEE Trans. Inform. Theory, vol. 39, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
2
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret key agreement by public discussion from common information, " IEEE Trans. Inform. Theory, vol. 39, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.1
-
3
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec
-
I. Csisźar and P. Narayan, "Secrecy capacities for multiple terminals, " IEEE Trans. Inform. Theory, vol. 50, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inform. Theory
, vol.50
, pp. 3047-3061
-
-
Csiszar, I.1
Narayan, P.2
-
4
-
-
78649346776
-
Secret key generation for a pairwise independent network model
-
Dec
-
S. Nitinawarat, C. Ye, A. Barg, P. Narayan, and A. Reznik, "Secret key generation for a pairwise independent network model, " IEEE Trans. Inform. Theory, vol. 56, pp. 6482-6489, Dec. 2010.
-
(2010)
IEEE Trans. Inform. Theory
, vol.56
, pp. 6482-6489
-
-
Nitinawarat, S.1
Ye, C.2
Barg, A.3
Narayan, P.4
Reznik, A.5
-
5
-
-
84856821725
-
Secret-key generation using correlated sources and channels
-
Feb
-
A. Khisti, S. N. Diggavi, and G. W. Wornell, "Secret-key generation using correlated sources and channels, " IEEE Trans. Inform. Theory, vol. 58, pp. 652-670, Feb. 2012.
-
(2012)
IEEE Trans. Inform. Theory
, vol.58
, pp. 652-670
-
-
Khisti, A.1
Diggavi, S.N.2
Wornell, G.W.3
-
6
-
-
52349084992
-
Secrecy via sources and channels: A secret key-secret message rate trade-off region
-
(Toronto, Canada), July
-
V. Prabhakaran, K. Eswaran, and K. Ramchandran, "Secrecy via sources and channels: A secret key-secret message rate trade-off region, " in Proc. IEEE Intl. Symposium on Inform. Theory, (Toronto, Canada), July 2008.
-
(2008)
Proc. IEEE Intl. Symposium on Inform. Theory
-
-
Prabhakaran, V.1
Eswaran, K.2
Ramchandran, K.3
-
7
-
-
5044250721
-
The private key capacity region for three terminals
-
Jun. /Jul
-
C. Ye and P. Narayan, "The private key capacity region for three terminals, " in Proc. IEEE Intl. Symposium on Inform. Theory, (Chicago, IL), p. 44, Jun. /Jul. 2007.
-
(2007)
Proc. IEEE Intl. Symposium on Inform. Theory, (Chicago, IL)
, pp. 44
-
-
Ye, C.1
Narayan, P.2
-
8
-
-
33749438006
-
The secret key-private key capacity region for three terminals
-
Sept. 4-9
-
C. Ye and P. Narayan, "The secret key-private key capacity region for three terminals, " in Proc. IEEE Intl. Symposium on Inform. Theory, (Adelaide, Australia), pp. 2142-2146, Sept. 4-9, 2005.
-
(2005)
Proc. IEEE Intl. Symposium on Inform. Theory, (Adelaide, Australia)
, pp. 2142-2146
-
-
Ye, C.1
Narayan, P.2
-
9
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
Mar
-
I. Csisźar and P. Narayan, "Common randomness and secret key generation with a helper, " IEEE Trans. Inform. Theory, vol. 46, pp. 344-366, Mar. 2000.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, pp. 344-366
-
-
Csiszar, I.1
Narayan, P.2
-
10
-
-
51649130417
-
Group secret key generation algorithms
-
Jun
-
C. Ye and A. Reznik, "Group secret key generation algorithms, " in Proc. IEEE Intl. Symposium on Inform. Theory, (Nice, France), pp. 2896-2900, Jun. 2007.
-
(2007)
Proc. IEEE Intl. Symposium on Inform. Theory, (Nice, France)
, pp. 2896-2900
-
-
Ye, C.1
Reznik, A.2
-
11
-
-
77952604175
-
Information-theoretic key generation from wireless channels
-
Jun
-
C. Ye, S. Mathur, A. Reznik, W. Trappe, and N. Mandayam, "Information-theoretic key generation from wireless channels, " IEEE Trans. Inform. Forensics and Security, vol. 5, pp. 240-254, Jun. 2010.
-
(2010)
IEEE Trans. Inform. Forensics and Security
, vol.5
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Trappe, W.4
Mandayam, N.5
-
13
-
-
84890337852
-
Simultaneously generating multiple keys in many to one networks
-
Submitted. Available at "wpi. edu/?llai
-
L. Lai and L. Huie, "Simultaneously generating multiple keys in many to one networks, " IEEE Trans. Inform. Theory, 2012. Submitted. Available at "wpi. edu/?llai".
-
(2012)
IEEE Trans. Inform. Theory
-
-
Lai, L.1
Huie, L.2
|