-
1
-
-
84867518740
-
Strong secrecy in compound broadcast channels with confidential messages
-
Cambridge, MA, USA, Jul.
-
R. F. Wyrembelski and H. Boche, "Strong secrecy in compound broadcast channels with confidential messages," in Proc. IEEE Int. Symp. Inf. Theory, Cambridge, MA, USA, Jul. 2012, pp. 76-80.
-
(2012)
Proc IEEE Int. Symp. Inf. Theory
, pp. 76-80
-
-
Wyrembelski, R.F.1
Boche, H.2
-
2
-
-
84905280852
-
Strong secrecy and decoding performance analysis for robust broadcasting under channel uncertainty
-
Florence, Italy, May
-
R. F. Schaefer and H. Boche, "Strong secrecy and decoding performance analysis for robust broadcasting under channel uncertainty," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Florence, Italy, May 2014, pp. 3973-3977.
-
(2014)
Proc IEEE Int. Conf. Acoust., Speech, Signal Process
, pp. 3973-3977
-
-
Schaefer, R.F.1
Boche, H.2
-
3
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
4
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
5
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
6
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Information theoretic security," Found. Trends Commun. Inf. Theory, vol. 5, nos. 4-5, pp. 355-580, 2009.
-
(2009)
Found. Trends Commun. Inf. Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai Shitz, S.3
-
8
-
-
84861309485
-
Secrecy on the physical layer in wireless networks
-
Rijeka, Croatia: InTech, Mar.
-
E. A. Jorswieck, A. Wolf, and S. Gerbracht, "Secrecy on the physical layer in wireless networks," in Trends in Telecommunications Technologies. Rijeka, Croatia: InTech, Mar. 2010, pp. 413-435.
-
(2010)
Trends in Telecommunications Technologies
, pp. 413-435
-
-
Jorswieck, E.A.1
Wolf, A.2
Gerbracht, S.3
-
10
-
-
85032752264
-
Physical layer service integration in wireless networks: Signal processing challenges
-
May
-
R. F. Schaefer and H. Boche, "Physical layer service integration in wireless networks: Signal processing challenges," IEEE Signal Process. Mag., vol. 31, no. 3, pp. 147-156, May 2014.
-
(2014)
IEEE Signal Process. Mag.
, vol.31
, Issue.3
, pp. 147-156
-
-
Schaefer, R.F.1
Boche, H.2
-
11
-
-
84905245430
-
-
Deutsche Telekom AG Laboratories Technology Radar Edition III, Feature Paper. [Online]. Available
-
Deutsche Telekom AG Laboratories. (2010). "Next generation mobile networks: Revolution in mobile communications," Technology Radar Edition III, Feature Paper. [Online]. Available: http://www.lti.ei.tum.de/index.php?id=boche
-
(2010)
Next Generation Mobile Networks: Revolution in Mobile Communications
-
-
-
12
-
-
84905270741
-
New challenges for IT-security research in ICT
-
Aug.
-
U. Helmbrecht and R. Plaga, "New challenges for IT-security research in ICT," in Proc. World Federation Scientists Int. Seminars Planetary Emergencies, Erice, Italy, Aug. 2008, pp. 1-6.
-
(2008)
Proc. World Federation Scientists Int. Seminars Planetary Emergencies, Erice, Italy
, pp. 1-6
-
-
Helmbrecht, U.1
Plaga, R.2
-
13
-
-
0029706655
-
Almost independence and secrecy capacity
-
I. Csiszár, "Almost independence and secrecy capacity," Probl. Pered. Inf., vol. 32, no. 1, pp. 48-57, 1996.
-
(1996)
Probl. Pered. Inf.
, vol.32
, Issue.1
, pp. 48-57
-
-
Csiszár, I.1
-
14
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Berlin, Germany: Springer-Verlag, May
-
U. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Advances in Cryptology-EUROCRYPT (Lecture Notes in Computer Science), vol. 1807. Berlin, Germany: Springer-Verlag, May 2000, pp. 351-368.
-
(2000)
Advances in Cryptology-EUROCRYPT (Lecture Notes in Computer Science)
, vol.1807
, pp. 351-368
-
-
Maurer, U.1
Wolf, S.2
-
15
-
-
84876274641
-
Secrecy results for compound wiretap channels
-
Mar.
-
I. Bjelakovíc, H. Boche, and J. Sommerfeld, "Secrecy results for compound wiretap channels," Problems Inf. Transmission, vol. 49, no. 1, pp. 73-98, Mar. 2013.
-
(2013)
Problems Inf. Transmission
, vol.49
, Issue.1
, pp. 73-98
-
-
Bjelakovíc, I.1
Boche, H.2
Sommerfeld, J.3
-
16
-
-
0037670845
-
The capacity of a class of channels
-
Dec.
-
D. Blackwell, L. Breiman, and A. J. Thomasian, "The capacity of a class of channels," Ann. Math. Statist., vol. 30, no. 4, pp. 1229-1241, Dec. 1959.
-
(1959)
Ann. Math. Statist.
, vol.30
, Issue.4
, pp. 1229-1241
-
-
Blackwell, D.1
Breiman, L.2
Thomasian, A.J.3
-
17
-
-
29144441674
-
Simultaneous channels
-
J. Wolfowitz, "Simultaneous channels," Archive Rational Mech. Anal., vol. 4, no. 1, pp. 371-386, 1960.
-
(1960)
Archive Rational Mech. Anal.
, vol.4
, Issue.1
, pp. 371-386
-
-
Wolfowitz, J.1
-
18
-
-
73449104694
-
Compound wiretap channels
-
Mar. Art. ID 142374
-
Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), "Compound wiretap channels," EURASIP J. Wireless Commun. Netw., vol. 2009, pp. 1-13, Mar. 2009, Art. ID 142374.
-
(2009)
EURASIP J. Wireless Commun. Netw.
, pp. 1-13
-
-
Liang, Y.1
Kramer, G.2
Poor, H.V.3
Shamai Shitz, S.4
-
19
-
-
77953692409
-
On Gaussian MIMO compound wiretap channels
-
Princeton, NJ, USA, Mar.
-
E. Ekrem and S. Ulukus, "On Gaussian MIMO compound wiretap channels," in Proc. 44th Annu. Conf. Inf. Sci. Syst., Princeton, NJ, USA, Mar. 2010, pp. 1-6.
-
(2010)
Proc. 44th Annu. Conf. Inf. Sci. Syst.
, pp. 1-6
-
-
Ekrem, E.1
Ulukus, S.2
-
20
-
-
79955497445
-
Interference alignment for the multiantenna compound wiretap channel
-
May
-
A. Khisti, "Interference alignment for the multiantenna compound wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 2976-2993, May 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.5
, pp. 2976-2993
-
-
Khisti, A.1
-
21
-
-
70449513409
-
On the compound MIMO broadcast channels with confidential messages
-
Seoul, Korea, Jun./Jul.
-
M. Kobayashi, Y. Liang, S. Shamai (Shitz), and M. Debbah, "On the compound MIMO broadcast channels with confidential messages," in Proc. IEEE Int. Symp. Inf. Theory, Seoul, Korea, Jun./Jul. 2009, pp. 1283-1287.
-
(2009)
Proc IEEE Int. Symp. Inf. Theory
, pp. 1283-1287
-
-
Kobayashi, M.1
Liang, Y.2
Shamai Shitz, S.3
Debbah, M.4
-
23
-
-
84880866367
-
Wiretap channels with side information-Strong secrecy capacity and optimal transceiver design
-
Aug.
-
H. Boche and R. F. Schaefer, "Wiretap channels with side information-Strong secrecy capacity and optimal transceiver design," IEEE Trans. Inf. Forensics Security, vol. 8, no. 8, pp. 1397-1408, Aug. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.8
, pp. 1397-1408
-
-
Boche, H.1
Schaefer, R.F.2
-
25
-
-
84897525383
-
Ratedistortion-based physical layer secrecy with applications to multimode fiber
-
Mar.
-
E. C. Song, E. Soljanin, P. Cuff, H. V. Poor, and K. Guan, "Ratedistortion-based physical layer secrecy with applications to multimode fiber," IEEE Trans. Commun., vol. 62, no. 3, pp. 1080-1090, Mar. 2014.
-
(2014)
IEEE Trans. Commun.
, vol.62
, Issue.3
, pp. 1080-1090
-
-
Song, E.C.1
Soljanin, E.2
Cuff, P.3
Poor, H.V.4
Guan, K.5
-
26
-
-
0017417797
-
General broadcast channels with degraded message sets
-
Jan.
-
J. Körner and K. Marton, "General broadcast channels with degraded message sets," IEEE Trans. Inf. Theory, vol. 23, no. 1, pp. 60-64, Jan. 1977.
-
(1977)
IEEE Trans. Inf. Theory
, vol.23
, Issue.1
, pp. 60-64
-
-
Körner, J.1
Marton, K.2
-
27
-
-
85027929407
-
Optimal coding strategies for bidirectional broadcast channels under channel uncertainty
-
Oct.
-
R. F. Wyrembelski, I. Bjelakovíc, T. J. Oechtering, and H. Boche, "Optimal coding strategies for bidirectional broadcast channels under channel uncertainty," IEEE Trans. Commun., vol. 58, no. 10, pp. 2984-2994, Oct. 2010.
-
(2010)
IEEE Trans. Commun.
, vol.58
, Issue.10
, pp. 2984-2994
-
-
Wyrembelski, R.F.1
Bjelakovíc, I.2
Oechtering, T.J.3
Boche, H.4
-
29
-
-
0036495139
-
Strong converse for identification via quantum channels
-
Mar.
-
R. Ahlswede and A. Winter, "Strong converse for identification via quantum channels," IEEE Trans. Inf. Theory, vol. 48, no. 3, pp. 569-579, Mar. 2002.
-
(2002)
IEEE Trans. Inf. Theory
, vol.48
, Issue.3
, pp. 569-579
-
-
Ahlswede, R.1
Winter, A.2
-
31
-
-
33646320755
-
Über die Verteilung der Wurzeln bei gewissen algebraischen Gleichungen mit ganzzahligen Koeffizienten
-
M. Fekete, "Über die Verteilung der Wurzeln bei gewissen algebraischen Gleichungen mit ganzzahligen Koeffizienten," Math. Zeitschrift, vol. 17, no. 1, pp. 228-249, 1923.
-
(1923)
Math. Zeitschrift
, vol.17
, Issue.1
, pp. 228-249
-
-
Fekete, M.1
|