-
1
-
-
33749438006
-
The secret key private key capacity region for three terminals
-
Adelaide, Australia, Sep.
-
C. Ye and P. Narayan, "The secret key private key capacity region for three terminals, " in Proc. Int. Symp. Inf. Theory (ISIT), Adelaide, Australia, Sep. 2005, pp. 2142-2146.
-
(2005)
Proc. Int. Symp. Inf. Theory (ISIT)
, pp. 2142-2146
-
-
Ye, C.1
Narayan, P.2
-
2
-
-
0027629488
-
Common randomness in information theory and cryptography. I. Secret sharing
-
Jul.
-
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography. I. Secret sharing, " IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
3
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information, " IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
4
-
-
0015648934
-
Noiseless coding of correlated information sources
-
Jul.
-
D. Slepian and J. K. Wolf, "Noiseless coding of correlated information sources, " IEEE Trans. Inf. Theory, vol. 19, no. 4, pp. 471-480, Jul. 1973.
-
(1973)
IEEE Trans. Inf. Theory
, vol.19
, Issue.4
, pp. 471-480
-
-
Slepian, D.1
Wolf, J.K.2
-
5
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec.
-
I. Csiszar and P. Narayan, "Secrecy capacities for multiple terminals, " IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszar, I.1
Narayan, P.2
-
6
-
-
0033097504
-
Unconditionally secure key agreement and the intrinsic conditional information
-
Mar.
-
U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and the intrinsic conditional information, " IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.2
, pp. 499-514
-
-
Maurer, U.M.1
Wolf, S.2
-
7
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
Mar.
-
I. Csiszar and P. Narayan, "Common randomness and secret key generation with a helper, " IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.2
, pp. 344-366
-
-
Csiszar, I.1
Narayan, P.2
-
8
-
-
0037396695
-
Secret-key agreement over unauthenticated public channels. I. Definitions and a completeness result
-
Apr.
-
U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels. I. Definitions and a completeness result, " IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822-831, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 822-831
-
-
Maurer, U.M.1
Wolf, S.2
-
9
-
-
0037399113
-
Secret-key agreement over unauthenticated public channels-Part II the simulatability condition
-
Apr.
-
U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part II: The simulatability condition, " IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 832-838, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 832-838
-
-
Maurer, U.M.1
Wolf, S.2
-
10
-
-
0037396951
-
Secret-key agreement over unauthenticated public channels. II. Privacy amplification
-
Apr.
-
U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels. II. Privacy amplification, " IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 839-851, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 839-851
-
-
Maurer, U.M.1
Wolf, S.2
-
11
-
-
84856830966
-
Secret key and private key constructions for simple multiterminal source models
-
Feb.
-
C. Ye and P. Narayan, "Secret key and private key constructions for simple multiterminal source models, " IEEE Trans. Inf. Theory, vol. 58, no. 2, pp. 639-651, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.2
, pp. 639-651
-
-
Ye, C.1
Narayan, P.2
-
12
-
-
84890400997
-
Simultaneously generating multiple keys in many to one networks
-
Istanbul, Turkey, Jul.
-
L. Lai and L. Huie, "Simultaneously generating multiple keys in many to one networks, " in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Istanbul, Turkey, Jul. 2013, pp. 2394-2398.
-
(2013)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 2394-2398
-
-
Lai, L.1
Huie, L.2
-
13
-
-
84873116301
-
Simultaneously generating multiple keys and multi-commodity flow in networks
-
Lausanne, Switzerland, Sep.
-
L. Lai and S.-W. Ho, "Simultaneously generating multiple keys and multi-commodity flow in networks, " in Proc. IEEE Inf. Theory Workshop (ITW), Lausanne, Switzerland, Sep. 2012, pp. 627-631.
-
(2012)
Proc. IEEE Inf. Theory Workshop (ITW)
, pp. 627-631
-
-
Lai, L.1
Ho, S.-W.2
-
14
-
-
77955669285
-
Information theoretic generation of multiple secret keys
-
Univ. Maryland, College Park, MD, USA
-
C. Ye, "Information theoretic generation of multiple secret keys, " Ph. D. dissertation, Dept. Elect. Eng., Univ. Maryland, College Park, MD, USA, 2005.
-
(2005)
Ph. D. Dissertation, Dept. Elect. Eng.
-
-
Ye, C.1
-
15
-
-
0034450066
-
From weak to strong information-theoretic key agreement
-
Sorrento, Italy, Jun.
-
U. M. Maurer and S. Wolf, "From weak to strong information-theoretic key agreement, " in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Sorrento, Italy, Jun. 2000, p. 18.
-
(2000)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 18
-
-
Maurer, U.M.1
Wolf, S.2
|