-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct
-
C. E. Shannon, "Communication Theory of Secrecy Systems," Bell Syst. Tech. J., vol. 28, no. 4, p. 656715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J
, vol.28
, Issue.4
, pp. 656715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The Wire-Tap Channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Information Theoretic Security," Foundations and Trends in Communications and Information Theory, vol. 5, no. 4-5, pp. 355-580, 2009.
-
(2009)
Foundations and Trends in Communications and Information Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai Shitz, S.3
-
5
-
-
84861309485
-
Secrecy on the physical layer in wireless networks
-
Mar
-
E. A. Jorswieck, A. Wolf, and S. Gerbracht, "Secrecy on the Physical Layer in Wireless Networks," Trends in Telecommunications Technologies, pp. 413-435, Mar. 2010.
-
(2010)
Trends in Telecommunications Technologies
, pp. 413-435
-
-
Jorswieck, E.A.1
Wolf, A.2
Gerbracht, S.3
-
7
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast Channels with Confidential Messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
8
-
-
84865357022
-
Capacity region of gaussian mimo broadcast channels with common and confidential messages
-
Sep
-
E. Ekrem and S. Ulukus, "Capacity Region of Gaussian MIMO Broadcast Channels With Common and Confidential Messages," IEEE Trans. Inf. Theory, vol. 58, no. 9, pp. 5669-5680, Sep. 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.9
, pp. 5669-5680
-
-
Ekrem, E.1
Ulukus, S.2
-
9
-
-
84873885571
-
New results on multiple-input multiple-output broadcast channels with confidential messages
-
Mar
-
R. Liu, T. Liu, H. V. Poor, and S. Shamai (Shitz), "New Results on Multiple-Input Multiple-Output Broadcast Channels With Confidential Messages," IEEE Trans. Inf. Theory, vol. 59, no. 3, pp. 1346-1359, Mar. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.3
, pp. 1346-1359
-
-
Liu, R.1
Liu, T.2
Poor, H.V.3
Shamai Shitz, S.4
-
10
-
-
84872345676
-
Strong secrecy in bidirectional broadcast channels with confidential messages
-
Feb
-
R. F. Wyrembelski, M. Wiese, and H. Boche, "Strong Secrecy in Bidirectional Broadcast Channels with Confidential Messages," IEEE Trans. Inf. Forensics Security, vol. 8, no. 2, pp. 324-334, Feb. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.2
, pp. 324-334
-
-
Wyrembelski, R.F.1
Wiese, M.2
Boche, H.3
-
11
-
-
40949147785
-
Multiple-access channels with confidential messages
-
Mar
-
Y. Liang and H. V. Poor, "Multiple-Access Channels With Confidential Messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.3
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
12
-
-
84901432018
-
-
Springer, ch. Strong Secrecy for Multiple Access Channels
-
M. Wiese and H. Boche, Information Theory, Combinatorics, and Search Theory. Springer, 2013, ch. Strong Secrecy for Multiple Access Channels, pp. 71-122.
-
(2013)
Information Theory, Combinatorics, and Search Theory
, pp. 71-122
-
-
Wiese, M.1
Boche, H.2
-
13
-
-
45249090083
-
Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
-
Jun
-
R. Liu, I. Marić, P. Spasojević, and R. D. Yates, "Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2493-2507
-
-
Liu, R.1
Marić, I.2
Spasojević, P.3
Yates, R.D.4
-
14
-
-
0031143282
-
Rate-distortion theory for the shannon cipher system
-
May
-
H. Yamamoto, "Rate-Distortion Theory for the Shannon Cipher System," IEEE Trans. Inf. Theory, vol. 43, no. 3, pp. 827-835, May 1997.
-
(1997)
IEEE Trans. Inf. Theory
, vol.43
, Issue.3
, pp. 827-835
-
-
Yamamoto, H.1
-
15
-
-
45249086542
-
Shannon's secrecy system with informed receivers and its application to systematic coding for wiretapped channels
-
Jun
-
N. Merhav, "Shannon's Secrecy System With Informed Receivers and its Application to Systematic Coding for Wiretapped Channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2723-2734, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2723-2734
-
-
Merhav, N.1
-
16
-
-
80051921757
-
Wiretap channel with shared key
-
Dublin, Ireland, Aug
-
W. Kang and N. Liu, "Wiretap Channel with Shared Key," in Proc. IEEE Inf. Theory Workshop, Dublin, Ireland, Aug. 2010, pp. 1-5.
-
(2010)
Proc. IEEE Inf. Theory Workshop
, pp. 1-5
-
-
Kang, W.1
Liu, N.2
-
17
-
-
84870916633
-
-
Lecture Notes in Computer Science. Springer, ch. Transmission, Identification and Common Randomness Capacities for Wire-Tape Channels with Secure Feedback from the Decoder
-
R. Ahlswede and N. Cai, General Theory of Information Transfer and Combinatorics, Lecture Notes in Computer Science. Springer, 2006, vol. 4123, ch. Transmission, Identification and Common Randomness Capacities for Wire-Tape Channels with Secure Feedback from the Decoder, pp. 258-275.
-
(2006)
General Theory of Information Transfer and Combinatorics
, vol.4123
, pp. 258-275
-
-
Ahlswede, R.1
Cai, N.2
-
18
-
-
77951118738
-
Secret communication with feedback
-
Auckland, New Zealand, Dec
-
D. Gündüz, D. R. B. III, and H. V. Poor, "Secret Communication with Feedback," in Proc. Int. Symp. Inf. Theory Applications, Auckland, New Zealand, Dec. 2008, pp. 1-6.
-
(2008)
Proc. Int. Symp. Inf. Theory Applications
, pp. 1-6
-
-
Gündüz III, D.R.B.1
Poor, H.V.2
-
19
-
-
77955641859
-
Wiretap channel with secure rate-limited feedback
-
Dec
-
E. Ardestanizadeh, M. Franceschetti, T. Javidi, and Y.-H. Kim, "Wiretap Channel With Secure Rate-Limited Feedback," IEEE Trans. Inf. Theory, vol. 55, no. 12, pp. 5353-5361, Dec. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.12
, pp. 5353-5361
-
-
Ardestanizadeh, E.1
Franceschetti, M.2
Javidi, T.3
Kim, Y.-H.4
-
20
-
-
0029706655
-
Almost independence and secrecy capacity
-
I. Csiszár, "Almost Independence and Secrecy Capacity," Probl. Pered. Inform., vol. 32, no. 1, pp. 48-57, 1996.
-
(1996)
Probl. Pered. Inform
, vol.32
, Issue.1
, pp. 48-57
-
-
Csiszár, I.1
-
21
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Springer-Verlag, May
-
U. M. Maurer and S. Wolf, "Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free," in EUROCRYPT 2000, Lecture Notes in Computer Science. Springer-Verlag, May 2000, vol. 1807, pp. 351-368.
-
(2000)
EUROCRYPT 2000, Lecture Notes in Computer Science
, vol.1807
, pp. 351-368
-
-
Maurer, U.M.1
Wolf, S.2
-
23
-
-
84876274641
-
Secrecy results for compound wiretap channels
-
Mar
-
I. Bjelaković, H. Boche, and J. Sommerfeld, "Secrecy Results for Compound Wiretap Channels," Probl. Inf. Transmission, vol. 49, no. 1, pp. 73-98, Mar. 2013.
-
(2013)
Probl. Inf. Transmission
, vol.49
, Issue.1
, pp. 73-98
-
-
Bjelaković, I.1
Boche, H.2
Sommerfeld, J.3
-
24
-
-
84889587094
-
Strong secrecy from channel resolvability
-
Dec
-
M. R. Bloch and J. N. Laneman, "Strong Secrecy from Channel Resolvability," IEEE Trans. Inf. Theory, vol. 59, no. 12, pp. 8077-8098, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.12
, pp. 8077-8098
-
-
Bloch, M.R.1
Laneman, J.N.2
|