-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, “Communication theory of secrecy systems,” Bell System Technical Journal, vol. 28, no. 4, pp. 656-715, April 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
7
-
-
84856043672
-
A mathematical theory of communication
-
nos. 7/10, July/October
-
C. E. Shannon, “A mathematical theory of communication,” Bell System Technical Journal, vol. 27, nos. 7/10, pp. 379-423/623-656, July/October 1948.
-
(1948)
Bell System Technical Journal
, vol.27
-
-
Shannon, C.E.1
-
8
-
-
0037272042
-
Capacity results for the discrete memoryless networks
-
G. Kramer, “Capacity results for the discrete memoryless networks,” IEEE Transactions on Information Theory, vol. 49, no. 1, pp. 4-21, January 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.1
, pp. 4-21
-
-
Kramer, G.1
-
9
-
-
0015648934
-
Noiseless coding of correlated information sources
-
D. Slepian and J. K. Wolf, “Noiseless coding of correlated information sources,” IEEE Transactions on Information Theory, vol. 19, no. 4, pp. 471-480, July 1973.
-
(1973)
IEEE Transactions on Information Theory
, vol.19
, Issue.4
, pp. 471-480
-
-
Slepian, D.1
Wolf, J.K.2
-
10
-
-
0020752342
-
“writing on dirty paper
-
M. H. M. Costa, “Writing on dirty paper,” IEEE Transactions on Information Theory, vol. 29, no. 3, pp. 439-441, May 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.3
, pp. 439-441
-
-
Costa, M.1
-
11
-
-
0016882596
-
The rate-distortion function for source coding with side information at the decoder
-
A. Wyner and J. Ziv, “The rate-distortion function for source coding with side information at the decoder,” IEEE Transactions on Information Theory, vol. 22, no. 1, pp. 1-10, January 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.1
, pp. 1-10
-
-
Wyner, A.1
Ziv, J.2
-
12
-
-
0002195239
-
Multi-way communication channels
-
Thakadsor, Armenian SSR, USSR, September
-
R. Ahlswede, “Multi-way communication channels,” in Proc. International Symposium on Information Theory, Thakadsor, Armenian SSR, USSR, September 1971, pp. 23-52.
-
(1971)
Proc. International Symposium on Information Theory
, pp. 23-52
-
-
Ahlswede, R.1
-
13
-
-
84926117755
-
-
“Multiple access channels,” Ph.D. dissertation, University of Hawaii
-
H. Liao, “Multiple access channels,” Ph.D. dissertation, University of Hawaii, 1972.
-
(1972)
-
-
Liao, H.1
-
14
-
-
0015287303
-
Broadcast channels
-
January
-
T. M. Cover, “Broadcast channels,” IEEE Transactions on Information Theory, vol. 18, no. 1, pp. 2-14, January 1972.
-
(1972)
IEEE Transactions on Information Theory
, vol.18
, Issue.1
, pp. 2-14
-
-
Cover, T.M.1
-
15
-
-
0015601146
-
Random coding theorem for broadcast channels with degraded components
-
March
-
P. Bergmans, “Random coding theorem for broadcast channels with degraded components,” IEEE Transactions on Information Theory, vol. 19, no. 2, pp. 197-207, March 1973.
-
(1973)
IEEE Transactions on Information Theory
, vol.19
, Issue.2
, pp. 197-207
-
-
Bergmans, P.1
-
16
-
-
0013082133
-
Capacity and coding for degraded broadcast channels
-
R. G. Gallager, “Capacity and coding for degraded broadcast channels,” Problemy Peredachi Informatsii, vol. 10, no. 3, pp. 3-14, 1974.
-
(1974)
Problemy Peredachi Informatsii
, vol.10
, Issue.3
, pp. 3-14
-
-
Gallager, R.G.1
-
17
-
-
0032184236
-
Comments on broadcast channels
-
October
-
T. M. Cover, “Comments on broadcast channels,” IEEE Transactions on Information Theory, vol. 44, no. 6, pp. 2524-2530, October 1998.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.6
, pp. 2524-2530
-
-
Cover, T.M.1
-
18
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Körner, “Broadcast channels with confidential messages,” IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Körner, J.2
-
19
-
-
0000478763
-
Cipher printing telegraph systems for secret wire and radio telegraphic communications
-
January
-
G. S. Vernam, “Cipher printing telegraph systems for secret wire and radio telegraphic communications,” Transactions of the American Institute of Electrical Engineers, vol. 45, no. 1, pp. 295-301, January 1926.
-
(1926)
Transactions of the American Institute of Electrical Engineers
, vol.45
, Issue.1
, pp. 295-301
-
-
Vernam, G.S.1
-
20
-
-
5144231861
-
On the role of mmse estimation in approaching the information-theoretic limits of linear gaussian channels: Shannon meets wiener
-
Monticello, IL, USA, October
-
G. D. Fomey Jr., “On the role of MMSE estimation in approaching the information-theoretic limits of linear Gaussian channels: Shannon meets Wiener,” in Proc. 41st Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, October 2003, pp. 430-439.
-
(2003)
Proc. 41St Annual Allerton Conference on Communication, Control, and Computing
, pp. 430-439
-
-
Fomey, G.D.1
-
21
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, “The wire-tap channel,” Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1367, October 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1367
-
-
Wyner, A.D.1
-
22
-
-
0017537504
-
On a special class of wiretap channels
-
September
-
S. Leung-Yan-Cheong, “On a special class of wiretap channels,” IEEE Transactions on Information Theory, vol. 23, no. 5, pp. 625-627, September 1977.
-
(1977)
IEEE Transactions on Information Theory
, vol.23
, Issue.5
, pp. 625-627
-
-
Leung-Yan-Cheong, S.1
-
23
-
-
0020993571
-
A simplified treatment of wyners wire-tap channels
-
Monticello, IL, USA, October
-
J. L. Massey, “A simplified treatment of Wyner’s wire-tap channels,” in Proc. 21st Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, October 1983, pp. 268-276.
-
(1983)
Proc. 21St Allerton Conference on Communication, Control, and Computing
, pp. 268-276
-
-
Massey, J.L.1
-
24
-
-
33750056552
-
Almost independence and secrecy capacity
-
January-March
-
I. Csiszar, “Almost independence and secrecy capacity,” Problemy Peredachi Informatsii, vol. 32, no. 1, pp. 40-47, January-March 1996.
-
(1996)
Problemy Peredachi Informatsii
, vol.32
, Issue.1
, pp. 40-47
-
-
Csiszar, I.1
-
25
-
-
33645727315
-
General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channels
-
April
-
M. Hayashi, “General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channels,” IEEE Transactions on Information Theory, vol. 52, no. 4, pp. 1562-1575, April 2006.
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.4
, pp. 1562-1575
-
-
Hayashi, M.1
-
26
-
-
64549110900
-
On the secrecy capacity of arbitrary wiretap channels
-
Monticello, IL, USA, September
-
M. Bloch and J. N. Laneman, “On the secrecy capacity of arbitrary wiretap channels,” in Proc. 46th Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, September 2008, pp. 818-825.
-
(2008)
Proc. 46Th Allerton Conference on Communication, Control, and Computing
, pp. 818-825
-
-
Bloch, M.1
Laneman, J.N.2
-
27
-
-
77950676737
-
Secure bits through queues
-
Volos, Greece, June
-
B. P. Dunn, M. Bloch, and J. N. Laneman, “Secure bits through queues,” in Proc. IEEE Information Theory Workshop on Networking and Information Theory, Volos, Greece, June 2009, pp. 37-41.
-
(2009)
Proc. IEEE Information Theory Workshop on Networking and Information Theory
, pp. 37-41
-
-
Dunn, B.P.1
Bloch, M.2
Laneman, J.N.3
-
28
-
-
35848968625
-
Comparison of two noisy channels
-
Keszthely, Hungary
-
J. Körner and K. Marton, “Comparison of two noisy channels,” in Proc. Topics in Information Theory, Keszthely, Hungary, 1977, pp. 411-423.
-
(1977)
Proc. Topics in Information Theory
, pp. 411-423
-
-
Körner, J.1
Marton, K.2
-
29
-
-
0031103783
-
On a special class of broadcast channels with confidential messages
-
March
-
M. van Dijk, “On a special class of broadcast channels with confidential messages,” IEEE Transactions on Information Theory, vol. 43, no. 2, pp. 712-714, March 1997.
-
(1997)
IEEE Transactions on Information Theory
, vol.43
, Issue.2
, pp. 712-714
-
-
Van Dijk, M.1
-
30
-
-
70449488911
-
Capacity regions of two new classes of 2-receiver broadcast channels
-
Seoul, South Korea, July
-
C. Nair, “Capacity regions of two new classes of 2-receiver broadcast channels,” in Proc. IEEE International Symposium on Information Theory, Seoul, South Korea, July 2009, pp. 1839-1843.
-
(2009)
Proc. IEEE International Symposium on Information Theory
, pp. 1839-1843
-
-
Nair, C.1
-
31
-
-
0031143282
-
Rate-distortion theory for the shannon cipher systems
-
May
-
H. Yamamoto, “Rate-distortion theory for the Shannon cipher systems,” IEEE Transactions on Information Theory, vol. 43, no. 3, pp. 827-835, May 1997.
-
(1997)
IEEE Transactions on Information Theory
, vol.43
, Issue.3
, pp. 827-835
-
-
Yamamoto, H.1
-
32
-
-
84926104429
-
-
“Multi-user and wiretap channels including feedback,” Ph.D. dissertation, Stanford University
-
S. K. Leung-Yan-Cheong, “Multi-user and wiretap channels including feedback,” Ph.D. dissertation, Stanford University, 1976.
-
(1976)
-
-
Leung-Yan-Cheong, S.K.1
-
33
-
-
84870916633
-
Transmission, identification and common randomness capacities for wire-tap channels with secure feedback from the decoder
-
Springer-Verlag
-
R. Ahlswede and N. Cai, “Transmission, identification and common randomness capacities for wire-tap channels with secure feedback from the decoder,” in General Theory of Information Transfer and Combinatorics. Springer-Verlag, 2006, pp. 258-275.
-
(2006)
General Theory of Information Transfer and Combinatorics
, pp. 258-275
-
-
Ahlswede, R.1
Cai, N.2
-
34
-
-
77955641859
-
Wiretap channel with secure rate-limited feedback
-
December
-
E. Ardestanizadeh, M. Franceschetti, T. Javidi, and Y.-H. Kim, “Wiretap channel with secure rate-limited feedback,” IEEE Transactions on Information Theory, vol. 55, no. 12, pp. 5353-5361, December 2009.
-
(2009)
IEEE Transactions on Information Theory
, vol.55
, Issue.12
, pp. 5353-5361
-
-
Ardestanizadeh, E.1
Franceschetti, M.2
Javidi, T.3
Kim, Y.-H.4
-
35
-
-
0028273691
-
Relations between entropy and error probability
-
January
-
M. Feder and N. Merhav, “Relations between entropy and error probability,” IEEE Transactions on Information Theory, vol. 40, no. 1, pp. 259-266, January 1994.
-
(1994)
IEEE Transactions on Information Theory
, vol.40
, Issue.1
, pp. 259-266
-
-
Feder, M.1
Merhav, N.2
-
36
-
-
51649118624
-
An algorithm for computing the secrecy capacity of broadcast channels with confidential messages
-
Nice, France, July
-
K. Yasui, T. Suko, and T. Matsushima, “An algorithm for computing the secrecy capacity of broadcast channels with confidential messages,” in Proc. IEEE International Symposium on Information Theory, Nice, France, July 2007, pp. 936-940.
-
(2007)
Proc. IEEE International Symposium on Information Theory
, pp. 936-940
-
-
Yasui, K.1
Suko, T.2
Matsushima, T.3
-
37
-
-
52349106587
-
Computation of secrecy capacity for more-capable channel pairs
-
Toronto, Canada, July
-
K. R. Gowtham and A. Thangaraj, “Computation of secrecy capacity for more-capable channel pairs,” in Proc. IEEE International Symposium on Information Theory, Toronto, Canada, July 2008, pp. 529-533.
-
(2008)
Proc. IEEE International Symposium on Information Theory
, pp. 529-533
-
-
Gowtham, K.R.1
Thangaraj, A.2
-
40
-
-
0036013605
-
Quantum cryptography
-
January
-
N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Reviews of Modern Physics, vol. 74, no. 1, pp. 145-195, January 2002.
-
(2002)
Reviews of Modern Physics
, vol.74
, Issue.1
, pp. 145-195
-
-
Gisin, N.1
Ribordy, G.2
Tittel, W.3
Zbinden, H.4
-
41
-
-
77952412339
-
Unbreakable keys from random noise
-
P Tuyls, B. Skoric, and T. Kevenaar, Eds. Springer-Verlag
-
U. Maurer, R. Renner, and S. Wolf, “Unbreakable keys from random noise,” in Security with Noisy Data, P Tuyls, B. Skoric, and T. Kevenaar, Eds. Springer-Verlag, 2007, pp. 21-44.
-
(2007)
Security with Noisy Data
, pp. 21-44
-
-
Maurer, U.1
Renner, R.2
Wolf, S.3
-
42
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. Maurer, “Secret key agreement by public discussion from common information,” IEEE Transactions on Information Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
43
-
-
0027629488
-
Common randomness in information theory and cryptography. I. Secret sharing
-
July
-
R. Ahlswede and I. Csiszar, “Common randomness in information theory and cryptography. I. Secret sharing,”IEEE Transactions on Information Theory, vol. 39, no. 4, pp. 1121-1132, July 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
44
-
-
77954600460
-
Information-theoretic key agreement of multiple terminals - part i
-
August
-
A. A. Gohari and V. Anantharam, “Information-theoretic key agreement of multiple terminals - part I,” IEEE Transactions on Information Theory, vol. 56, no. 8, pp. 3973-3996, August 2010.
-
(2010)
IEEE Transactions on Information Theory
, vol.56
, Issue.8
, pp. 3973-3996
-
-
Gohari, A.A.1
Anantharam, V.2
-
45
-
-
77954570193
-
Information-theoretic key agreement of multiple terminals - part ii: Channel models
-
August
-
A. A. Gohari and V. Anatharam, “Information-theoretic key agreement of multiple terminals - part II: Channel models,” IEEE Transactions on Information Theory, vol. 56, no. 8, pp. 3997-4010, August 2010.
-
(2010)
IEEE Transactions on Information Theory
, vol.56
, Issue.8
, pp. 3997-4010
-
-
Gohari, A.A.1
Anatharam, V.2
-
46
-
-
0033097504
-
Unconditionally secure key agreement and intrinsic conditional information
-
March
-
U. M. Maurer and S. Wolf, “Unconditionally secure key agreement and intrinsic conditional information,”IEEE Transactions on Information Theory, vol. 45, no. 2, pp. 499-514, March 1999.
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, Issue.2
, pp. 499-514
-
-
Maurer, U.M.1
Wolf, S.2
-
47
-
-
85032421159
-
“new bounds in secret-key agreement: The gap between formation and secrecy extraction,” in
-
R. Renner and S. Wolf, “New bounds in secret-key agreement: The gap between formation and secrecy extraction,” in Proc. EUROCRYPT, 2003, pp. 652-577.
-
(2003)
Proc. EUROCRYPT
, pp. 577-652
-
-
Renner, R.1
Wolf, S.2
-
48
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
March
-
I. Csiszar and P Narayan, “Common randomness and secret key generation with a helper,”IEEE Transactions on Information Theory, vol. 46, no. 2, pp. 344-366, March 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.2
, pp. 344-366
-
-
Csiszar, I.1
Narayan, P.2
-
49
-
-
52349090484
-
Secret-key generation with correlated sources and noisy channels
-
Toronto, Canada, July
-
A. Khisti, S. N. Diggavi, and G. Wornell, “Secret-key generation with correlated sources and noisy channels,” in Proc. IEEE International Symposium on Information Theory, Toronto, Canada, July 2008, pp. 1005-1009.
-
(2008)
Proc. IEEE International Symposium on Information Theory
, pp. 1005-1009
-
-
Khisti, A.1
Diggavi, S.N.2
Wornell, G.3
-
50
-
-
84926135063
-
A separation result for secure communication
-
Monticello, IL, USA, September
-
V. Prabhakaran and K. Ramchandran, “A separation result for secure communication,” in Proc. 45th Allerton Conference on Communications, Control and Computing, Monticello, IL, USA, September 2007, pp. 34-41.
-
(2007)
Proc. 45Th Allerton Conference on Communications, Control and Computing
, pp. 34-41
-
-
Prabhakaran, V.1
Ramchandran, K.2
-
51
-
-
77955682475
-
Secret key agreement from vector gaussian sources by rate limited public communications
-
Austin, TX, USA, June, see also arXiv:1001.3705v1
-
S. Watanabe and Y. Oohama, “Secret key agreement from vector Gaussian sources by rate limited public communications,” in Proc. IEEE International Symposium on Information Theory, Austin, TX, USA, June 2010, pp. 2597-2601; see also arXiv:1001.3705v1.
-
(2010)
Proc. IEEE International Symposium on Information Theory
, pp. 2597-2601
-
-
Watanabe, S.1
Oohama, Y.2
-
52
-
-
84894314901
-
On the secret-key rate of binary random variables
-
Trondheim, Norway, June
-
M. J. Gander and U. M. Maurer, “On the secret-key rate of binary random variables,” in Proc. IEEE International Symposium on Information Theory, Trondheim, Norway, June 1994, p. 351.
-
(1994)
Proc. IEEE International Symposium on Information Theory
, pp. 351
-
-
Gander, M.J.1
Maurer, U.M.2
-
53
-
-
0041426716
-
A practical protocol for advantage distillation and information reconciliation
-
August
-
S. Liu, H. C. A. VanTilborg, and M. VanDijk, “A practical protocol for advantage distillation and information reconciliation,” Designs, Codes and Cryptography, vol. 30, no. 1, pp. 3962, August 2003.
-
(2003)
Designs, Codes and Cryptography
, vol.30
, Issue.1
, pp. 3962
-
-
Liu, S.1
Van Tilborg, H.C.2
Van Dijk, M.3
-
54
-
-
52349105079
-
Secret key agreement by reliability information of signals in gaussian maurers models
-
Toronto, Canada, July
-
M. Naito, S. Watanabe, R. Matsumoto, and T. Uyematsu, “Secret key agreement by reliability information of signals in Gaussian Maurer’s models,” in Proc. IEEE International Symposium on Information Theory, Toronto, Canada, July 2008, pp. 727-731.
-
(2008)
Proc. IEEE International Symposium on Information Theory
, pp. 727-731
-
-
Naito, M.1
Watanabe, S.2
Matsumoto, R.3
Uyematsu, T.4
-
55
-
-
39049142200
-
Secret key capacity and advantage distillation capacity
-
Seattle, WA, USA, July
-
J. Muramatsu, K. Yoshimura, and P. Davis, “Secret key capacity and advantage distillation capacity,” in Proc. IEEE International Symposium on Information Theory, Seattle, WA, USA, July 2006, pp. 2598-2602.
-
(2006)
Proc. IEEE International Symposium on Information Theory
, pp. 2598-2602
-
-
Muramatsu, J.1
Yoshimura, K.2
Davis, P.3
-
56
-
-
0001598288
-
Secret-key reconciliation by public discussion
-
T. Helleseth, Ed. Springer-Verlag, May
-
G. Brassard and L. Salvail, “Secret-key reconciliation by public discussion,” in Proc. Advances in Cryptology - Eurocrypt, T. Helleseth, Ed. Springer-Verlag, May 1993, pp. 411-423.
-
(1993)
Proc. Advances in Cryptology - Eurocrypt
, pp. 411-423
-
-
Brassard, G.1
Salvail, L.2
-
57
-
-
0038783533
-
Fast, efficient error reconciliation for quantum cryptography
-
May
-
W. T. Buttler, S. K. Lamoreaux, J. R. Torgerson, G. H. Nickel, C. H. Donahue, and C. G. Peterson, “Fast, efficient error reconciliation for quantum cryptography,” Physical Review A, vol. 67, no. 5, pp. 052 303/1-8, May 2003.
-
(2003)
Physical Review A
, vol.67
, Issue.5
-
-
Buttler, W.T.1
Lamoreaux, S.K.2
Torgerson, J.R.3
Nickel, G.H.4
Donahue, C.H.5
Peterson, C.G.6
-
58
-
-
70449485057
-
Efficient reconciliation protocol for discrete-variable quantum key distribution
-
Seoul, South Korea, July
-
D. Elkouss, A. Leverrier, R. Alleaume, and J. J. Boutros, “Efficient reconciliation protocol for discrete-variable quantum key distribution,” in Proc. IEEE International Symposium on Information Theory, Seoul, South Korea, July 2009, pp. 1879-1883.
-
(2009)
Proc. IEEE International Symposium on Information Theory
, pp. 1879-1883
-
-
Elkouss, D.1
Leverrier, A.2
Alleaume, R.3
Boutros, J.J.4
-
59
-
-
1442337635
-
Reconciliation of a quantum-distributed gaussian key
-
February
-
G. Van Assche, J. Cardinal, and N. J. Cerf, “Reconciliation of a quantum-distributed Gaussian key,” IEEE Transactions on Information Theory, vol. 50, no. 2, pp. 394-400, February 2004.
-
(2004)
IEEE Transactions on Information Theory
, vol.50
, Issue.2
, pp. 394-400
-
-
Van Assche, G.1
Cardinal, J.2
Cerf, N.J.3
-
60
-
-
33751057953
-
Side-information coding with turbo codes and its application to quantum key distribution
-
Parma, Italy, October
-
K.-C. Nguyen, G. Van Assche, and N. J. Cerf, “Side-information coding with turbo codes and its application to quantum key distribution,” in Proc. International Symposium on Information Theory and its Applications, Parma, Italy, October 2004, pp. 1274-1279.
-
(2004)
Proc. International Symposium on Information Theory and Its Applications
, pp. 1274-1279
-
-
Nguyen, K.-C.1
Van Assche, G.2
Cerf, N.J.3
-
61
-
-
33751025487
-
Ldpc-based gaussian key reconciliation
-
Punta del Este, Uruguay, March, extended report
-
M. Bloch, A. Thangaraj, S. W. McLaughlin, and J.-M. Merolla, “LDPC-based Gaussian key reconciliation,” in Proc. IEEE Information Theory Workshop, Punta del Este, Uruguay, March 2006, pp. 116-120; extended report available at arXiv:cs.IT/0509041.
-
(2006)
Proc. IEEE Information Theory Workshop
, pp. 116-120
-
-
Bloch, M.1
Thangaraj, A.2
Mc Laughlin, S.W.3
Merolla, J.-M.4
-
62
-
-
39049156464
-
Extracting secrecy fromjointly gaussian random variables
-
Seattle, WA, USA, July
-
C. Ye, A. Reznik, and Y. Shah, “Extracting secrecy fromjointly Gaussian random variables,” in Proc. IEEE International Symposium on Information Theory, Seattle, WA, USA, July 2006, pp. 2593-2597.
-
(2006)
Proc. IEEE International Symposium on Information Theory
, pp. 2593-2597
-
-
Ye, C.1
Reznik, A.2
Shah, Y.3
-
63
-
-
0002408684
-
On measures of entropy and information
-
Berkeley, CA, USA
-
A. Renyi, “On measures of entropy and information,” in Proc. Fourth Berkeley Symposium on Mathematical Statistics and Probability, vol. 1, Berkeley, CA, USA, 1961, pp. 547-561.
-
(1961)
Proc. Fourth Berkeley Symposium on Mathematical Statistics and Probability
, vol.1
, pp. 547-561
-
-
Renyi, A.1
-
64
-
-
0029405656
-
Generalized privacy amplification
-
November
-
C. H. Bennett, G. Brassard, C. Crepeau, and U. Maurer, “Generalized privacy amplification,”IEEE Transactions on Information Theory, vol. 41, no. 6, pp. 1915-1923, November 1995.
-
(1995)
IEEE Transactions on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Maurer, U.4
-
65
-
-
0018456171
-
Universal classes of hash functions
-
April
-
J. L. Carter and M. N. Wegman, “Universal classes of hash functions,” Journal of Computer and System Sciences, vol. 18, no. 2, pp. 143-154, April 1979.
-
(1979)
Journal of Computer and System Sciences
, vol.18
, Issue.2
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
66
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
June
-
M. N. Wegman and J. Carter, “New hash functions and their use in authentication and set equality,” Journal of Computer Sciences and Systems, vol. 22, no. 3, pp. 265-279, June 1981.
-
(1981)
Journal of Computer Sciences and Systems
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.2
-
67
-
-
0000410707
-
“universal hashing and authentication codes
-
October
-
D. R. Stinson, “Universal hashing and authentication codes,” Designs, Codes and Cryptography, vol. 4, no. 4, pp. 369-380, October 1994.
-
(1994)
Designs, Codes and Cryptography
, vol.4
, Issue.4
, pp. 369-380
-
-
Stinson, D.R.1
-
68
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
B. Preneel, Ed. SpringerVerlag
-
U. M. Maurer and S. Wolf, “Information-theoretic key agreement: From weak to strong secrecy for free,” in Advances in Cryptology - Eurocrypt 2000, B. Preneel, Ed. SpringerVerlag, 2000, p. 351.
-
(2000)
Advances in Cryptology - Eurocrypt
, vol.2000
, pp. 351
-
-
Maurer, U.M.1
Wolf, S.2
-
69
-
-
84926074182
-
-
“Extracting all the randomness from a weakly random source,” Massachusetts Institute of Technology, Cambridge, MA, USA, Technical Report
-
S. Vadhan, “Extracting all the randomness from a weakly random source,” Massachusetts Institute of Technology, Cambridge, MA, USA, Technical Report, 1998.
-
(1998)
-
-
Vadhan, S.1
-
70
-
-
84926109194
-
-
“Entropy measures and unconditional security in cryptography.” Ph.D. dissertation, ETH Zürich, Zurich, Switzerland
-
C. Cachin, “Entropy measures and unconditional security in cryptography.” Ph.D. dissertation, ETH Zürich, Zurich, Switzerland, 1997.
-
(1997)
-
-
Cachin, C.1
-
71
-
-
0001777508
-
Linking information reconciliation and privacy amplification
-
March
-
C. Cachin and U. M. Maurer, “Linking information reconciliation and privacy amplification,” Journal of Cryptology, vol. 10, no. 2, pp. 97-110, March 1997.
-
(1997)
Journal of Cryptology
, vol.10
, Issue.2
, pp. 97-110
-
-
Cachin, C.1
Maurer, U.M.2
-
72
-
-
33747886952
-
Secret key agreement from correlated source outputs using low density parity check matrices
-
July
-
J. Muramatsu, “Secret key agreement from correlated source outputs using low density parity check matrices,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E89-A, no. 7, pp. 2036-2046, July 2006.
-
(2006)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.89
, Issue.7
, pp. 2036-2046
-
-
Muramatsu, J.1
-
73
-
-
45249118588
-
Secret key generation for correlated gaussian sources
-
Monticello, IL, USA, September
-
S. Nitinawarat, “Secret key generation for correlated Gaussian sources,” in Proc. 45th Allerton Conference on Communications, Control and Computing, Monticello, IL, USA, September 2007, pp. 1054-1058.
-
(2007)
Proc. 45th Allerton Conference on Communications, Control and Computing
, pp. 1054-1058
-
-
Nitinawarat, S.1
-
74
-
-
0037396695
-
Secret-key agreement over unauthenticated public channels-part i. Definitions and a completeness result
-
April
-
U. Maurer and S. Wolf, “Secret-key agreement over unauthenticated public channels-part I. Definitions and a completeness result,” IEEE Transactions on Information Theory, vol. 49, no. 4, pp. 822-831, April 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.4
, pp. 822-831
-
-
Maurer, U.1
Wolf, S.2
-
75
-
-
0037399113
-
Secret-key agreement over unauthenticated public channels -part ii. The simulatability condition
-
April
-
U. Maurer and S. Wolf, “Secret-key agreement over unauthenticated public channels -part II. The simulatability condition,” IEEE Transactions on Information Theory, vol. 49, no. 4, pp. 832-838, April 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.4
, pp. 832-838
-
-
Maurer, U.1
Wolf, S.2
-
76
-
-
0037396951
-
Secret-key agreement over unauthenticated public channels -part iii. Privacy amplification
-
April
-
U. Maurer and S. Wolf, “Secret-key agreement over unauthenticated public channels -part III. Privacy amplification,” IEEE Transactions on Information Theory, vol. 49, no. 4, pp. 839-851, April 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.4
, pp. 839-851
-
-
Maurer, U.1
Wolf, S.2
-
77
-
-
38549116073
-
On the possibility of key agreement using variable directional antenna
-
Seoul, South Korea, September
-
H. Imai, K. Kobara, and K. Morozov, “On the possibility of key agreement using variable directional antenna,” in Proc. 1st Joint Workshop on Information Security, Seoul, South Korea, September 2006, pp. 153-167.
-
(2006)
Proc. 1St Joint Workshop on Information Security
, pp. 153-167
-
-
Imai, H.1
Kobara, K.2
Morozov, K.3
-
78
-
-
77952604175
-
Information-theoretically secret key generation for fading wireless channels
-
June
-
C. Ye, S. Mathur, A. Reznik, Y. Shah, W Trappe, and N. B. Mandayam, “Information-theoretically secret key generation for fading wireless channels,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 240-254, June 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.2
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Shah, Y.4
Trappe, W.5
Mandayam, N.B.6
-
79
-
-
84860686731
-
Secret key establishment using temporally and spatially correlated wireless channel coefficients
-
February
-
C. Chen and M. A. Jensen, “Secret key establishment using temporally and spatially correlated wireless channel coefficients,” IEEE Transactions on Mobile Computing, vol. 10, no. 2, pp. 205-215, February 2011.
-
(2011)
IEEE Transactions on Mobile Computing
, vol.10
, Issue.2
, pp. 205-215
-
-
Chen, C.1
Jensen, M.A.2
-
80
-
-
0037448569
-
Quantum key distribution using gaussian-modulated coherent states
-
January
-
F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P Grangier, “Quantum key distribution using Gaussian-modulated coherent states,” Letters to Nature, vol. 421, no. 6920, pp. 238-241, January 2003.
-
(2003)
Letters to Nature
, vol.421
, Issue.6920
, pp. 238-241
-
-
Grosshans, F.1
Van Assche, G.2
Wenger, J.3
Brouri, R.4
Cerf, N.J.5
Grangier, P.6
-
81
-
-
34948846190
-
Quantum key distribution over 25 km with an all-fiber continuous-variable system
-
October
-
J. Lodewyck, M. Bloch, R. Garcia-Patron, S. Fossier, E. Karpov, E. Diamanti, T. Debuiss-chert, N. J. Cerf, R. Tualle-Brouri, S. W McLaughlin, and P Grangier, “Quantum key distribution over 25 km with an all-fiber continuous-variable system,” Physical Review A, vol. 76, pp. 042 305/1-10, October 2007.
-
(2007)
Physical Review A
, vol.76
-
-
Lodewyck, J.1
Bloch, M.2
Garcia-Patron, R.3
Fossier, S.4
Karpov, E.5
Diamanti, E.6
Debuiss-Chert, T.7
Cerf, N.J.8
Tualle-Brouri, R.9
Mc Laughlin, S.W.10
Grangier, P.11
-
82
-
-
33746644820
-
Noisy cryptographic protocols for low-cost rfid tags
-
August
-
H. Chabanne and G. Fumaroli, “Noisy cryptographic protocols for low-cost RFID tags,” IEEE Transactions on Information Theory, vol. 52, no. 8, pp. 3562-3566, August 2006.
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.8
, pp. 3562-3566
-
-
Chabanne, H.1
Fumaroli, G.2
-
83
-
-
78650025803
-
The mimome channel
-
Monticello, IL, USA, September
-
A. Khisti and G. Wornell, “The MIMOME channel,” in Proc. 45th Allerton Conference on Communication, Control and Computing, Monticello, IL, USA, September 2007, pp. 625-632; available online: http://allegro.mit.edu/pubs/posted/journal/2008-khisti-wornell-it.pdf.
-
(2007)
Proc. 45Th Allerton Conference on Communication, Control and Computing
, pp. 625-632
-
-
Khisti, A.1
Wornell, G.2
-
84
-
-
77958560746
-
Secure transmission with multiple antennas - ii: The mimome wiretap channels
-
November
-
A. Khisti and G. Wornell, “Secure transmission with multiple antennas - II: The MIMOME wiretap channels,” IEEE Transactions on Information Theory, vol. 56, no. 11, pp. 5515-5532, November 2010.
-
(2010)
IEEE Transactions on Information Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.2
-
85
-
-
45249119255
-
“secure communication over fading channels
-
June
-
Y. Liang, H. V Poor, and S. Shamai Shitz, “Secure communication over fading channels,” IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2470-2492, June 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai Shitz, S.3
-
86
-
-
54749106691
-
On the secrecy capacity of fading channels
-
October
-
P. K. Gopala, L. Lai, and H. El Gamal, “On the secrecy capacity of fading channels,” IEEE Transactions on Information Theory, vol. 54, no. 10, pp. 4687-4698, October 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
87
-
-
0017996501
-
The gaussian wire-tap channels
-
July
-
S. K. Leung-Yan-Cheong and M. E. Hellman, “The Gaussian wire-tap channels,” IEEE Transactions on Information Theory, vol. 24, no. 4, pp. 451-456, July 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
88
-
-
69249208566
-
An mmse approach to the secrecy capacity of the mimo gaussian wiretap channels
-
2009
-
R. Bustin, R. Liu, H. V. Poor, and S. Shamai, “An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channels,” EURASIP Journal on Wireless Communications and Networking, vol. 2009, pp. 370 970/1-8, 2009.
-
(2009)
EURASIP Journal on Wireless Communications and Networking
-
-
Bustin, R.1
Liu, R.2
Poor, H.V.3
Shamai, S.4
-
89
-
-
52349090496
-
The secrecy capacity of the mimo wiretap channels
-
Toronto, Canada, July
-
F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretap channels,” in Proc. IEEE International Symposium on Information Theory, Toronto, Canada, July 2008, pp. 524-528.
-
(2008)
Proc. IEEE International Symposium on Information Theory
, pp. 524-528
-
-
Oggier, F.1
Hassibi, B.2
-
90
-
-
66949180834
-
A note on the secrecy capacity of the multiple-antenna wiretap channel
-
June
-
T. Liu and S. Shamai, “A note on the secrecy capacity of the multiple-antenna wiretap channel,” IEEE Transactions on Information Theory, vol. 55, no. 6, pp. 2547-2553, June 2009.
-
(2009)
IEEE Transactions on Information Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
91
-
-
69449086815
-
Towards the secrecy capacity of the gaussian mimo wire-tap channel: The 2-2-1 channels
-
September
-
S. Shafiee, N. Liu, and S. Ulukus, “Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channels,” IEEE Transactions on Information Theory, vol. 55, no. 9, pp. 4033-4039, September 2009.
-
(2009)
IEEE Transactions on Information Theory
, vol.55
, Issue.9
, pp. 4033-4039
-
-
Shafiee, S.1
Liu, N.2
Ulukus, S.3
-
92
-
-
70449487065
-
Secure communication in the low-snr regime: A characterization of the energy-secrecy tradeoff
-
Seoul, South Korea, July
-
M. Gursoy, “Secure communication in the low-SNR regime: A characterization of the energy-secrecy tradeoff,” in Proc. IEEE International Symposium on Information Theory, Seoul, South Korea, July 2009, pp. 2291-2295.
-
(2009)
Proc. IEEE International Symposium on Information Theory
, pp. 2291-2295
-
-
Gursoy, M.1
-
93
-
-
84931425598
-
Secret communication using artificial noise
-
Dallas, TX, USA, September
-
R. Negi and S. Goel, “Secret communication using artificial noise,” in 62nd Vehicular Technology Conference (VTC), vol. 3, Dallas, TX, USA, September 2005, pp. 1906-1910.
-
(2005)
62Nd Vehicular Technology Conference (VTC)
, vol.3
, pp. 1906-1910
-
-
Negi, R.1
Goel, S.2
-
94
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
June
-
S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180-2189, June 2008.
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
95
-
-
51649117832
-
On the gaussian mimo wiretap channels
-
Nice, France, July
-
A. Khisti, G. Wornell, A. Wiesel, and Y. Eldar, “On the Gaussian MIMO wiretap channels,” in Proc. IEEE International Symposium on Information Theory, Nice, France, July 2007, pp. 2471-2475.
-
(2007)
Proc. IEEE International Symposium on Information Theory
, pp. 2471-2475
-
-
Khisti, A.1
Wornell, G.2
Wiesel, A.3
Eldar, Y.4
-
96
-
-
39049144353
-
Secrecy capacity of wireless channels
-
Seattle, WA, USA, July
-
J. Barros and M. R. D. Rodrigues, “Secrecy capacity of wireless channels,” in Proc. IEEE International Symposium on Information Theory, Seattle, WA, USA, July 2006, pp. 356-360.
-
(2006)
Proc. IEEE International Symposium on Information Theory
, pp. 356-360
-
-
Barros, J.1
Rodrigues, M.R.2
-
97
-
-
45249085230
-
Secret communication with a fading eavesdropper channel
-
Nice, France, June
-
Z. Li, R. Yates, and W. Trappe, “Secret communication with a fading eavesdropper channel,” in Proc. IEEE International Symposium on Information Theory, Nice, France, June 2007, pp. 1296-1300.
-
(2007)
Proc. IEEE International Symposium on Information Theory
, pp. 1296-1300
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
98
-
-
62349095351
-
Secrecy capacity over correlated ergodic fading channels
-
San Diego, CA, USA, November
-
H. Jeon, N. Kim, M. Kim, H. Lee, and J. Ha, “Secrecy capacity over correlated ergodic fading channels,” in Proc. IEEE Military Communications Conference, San Diego, CA, USA, November 2008, pp. 1-7.
-
(2008)
Proc. IEEE Military Communications Conference
, pp. 1-7
-
-
Jeon, H.1
Kim, N.2
Kim, M.3
Lee, H.4
Ha, J.5
-
99
-
-
52349105722
-
On the secure degrees of freedom in the ¿-user gaussian interference channels
-
Toronto, Canada, July
-
O. O. Koyluoglu, H. El Gamal, L. Lai, and H. V Poor, “On the secure degrees of freedom in the ¿-user Gaussian interference channels,” in Proc. IEEE International Symposium on Information Theory, Toronto, Canada, July 2008, pp. 384-388.
-
(2008)
Proc. IEEE International Symposium on Information Theory
, pp. 384-388
-
-
Koyluoglu, O.O.1
El Gamal, H.2
Lai, L.3
Poor, H.V.4
-
100
-
-
70349925048
-
Secured communication over frequency-selective fading channels: A practical vandermonde precoding
-
M. Kobayashi, M. Debbah, and S. S. Shitz, “Secured communication over frequency-selective fading channels: A practical Vandermonde precoding,” EURASIP Journal on Wireless Communications and Networking, vol. 2009, pp. 386 547/1-19, 2009.
-
(2009)
EURASIP Journal on Wireless Communications and Networking
-
-
Kobayashi, M.1
Debbah, M.2
Shitz, S.S.3
-
101
-
-
70349297353
-
Information-spectrum methods for information-theoretic security
-
San Diego, CA, USA, February
-
M. Bloch and J. N. Laneman, “Information-spectrum methods for information-theoretic security,” in Proc. Information Theory and Applications Workshop, San Diego, CA, USA, February 2009, pp. 23-28.
-
(2009)
Proc. Information Theory and Applications Workshop
, pp. 23-28
-
-
Bloch, M.1
Laneman, J.N.2
-
102
-
-
64249156371
-
On the throughput of secure hybrid-arq protocols for gaussian block-fading channels
-
April
-
X. Tang, R. Liu, P Spasojevic, and H. V Poor, “On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels,” IEEE Transactions on Information Theory, vol. 55, no. 4, pp. 1575-1591, April 2009.
-
(2009)
IEEE Transactions on Information Theory
, vol.55
, Issue.4
, pp. 1575-1591
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.V.4
-
103
-
-
70449472881
-
Secret-key sharing based on layered broadcast coding over fading channels
-
Seoul, South Korea, July
-
X. Tang, H. Poor, R. Liu, and P Spasojevic, “Secret-key sharing based on layered broadcast coding over fading channels,” in Proc. IEEE International Symposium on Information Theory, Seoul, South Korea, July 2009, pp. 2762-2766.
-
(2009)
Proc. IEEE International Symposium on Information Theory
, pp. 2762-2766
-
-
Tang, X.1
Poor, H.2
Liu, R.3
Spasojevic, P.4
-
104
-
-
76249121155
-
The broadcast approach over fading gaussian wiretap channels
-
Taormina, Italy, October
-
Y. Liang, L. Lai, H. Poor, and S. Shamai, “The broadcast approach over fading Gaussian wiretap channels,” in Proc. Information Theory Workshop, Taormina, Italy, October 2009, pp.1-5.
-
(2009)
Proc. Information Theory Workshop
, pp. 1-5
-
-
Liang, Y.1
Lai, L.2
Poor, H.3
Shamai, S.4
-
105
-
-
45249104850
-
Wireless information-theoretic security
-
June
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wireless information-theoretic security,”IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2515-2534, June 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.3
Mc Laughlin, S.W.4
-
106
-
-
75649096426
-
Secret sharing over fast-fading mimo wiretap channels
-
2009
-
T. F. Wong, M. Bloch, and J. M. Shea, “Secret sharing over fast-fading MIMO wiretap channels,” EURASIP Journal on Wireless Communications and Networking, vol. 2009, pp. 506 973/1-17, 2009.
-
(2009)
EURASIP Journal on Wireless Communications and Networking
-
-
Wong, T.F.1
Bloch, M.2
Shea, J.M.3
-
107
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
September
-
R. Wilson, D. Tse, and R. A. Scholtz, “Channel identification: Secret sharing using reciprocity in ultrawideband channels,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 364-375, September 2007.
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.A.3
-
109
-
-
33749424801
-
Block error iterative decoding capacity for ldpc codes
-
Adelaide, Australia
-
H. Jin and T. Richardson, “Block error iterative decoding capacity for LDPC codes,” in Proc. International Symposium on Information Theory, Adelaide, Australia, 2005, pp. 52-56.
-
(2005)
Proc. International Symposium on Information Theory
, pp. 52-56
-
-
Jin, H.1
Richardson, T.2
-
110
-
-
84926103897
-
-
“Low density parity check codes,” Ph.D. dissertation, Massachusetts Institute of Technology, Cambridge, MA, USA
-
R. G. Gallager, “Low density parity check codes,” Ph.D. dissertation, Massachusetts Institute of Technology, Cambridge, MA, USA, 1963.
-
(1963)
-
-
Gallager, R.G.1
-
111
-
-
0035246307
-
The capacity of low-density parity-check codes under message-passing decoding
-
February
-
T. J. Richardson and R. L. Urbanke, “The capacity of low-density parity-check codes under message-passing decoding,” IEEE Transactions on Information Theory, vol. 47, no. 2, pp. 599-618, February 2001.
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.2
, pp. 599-618
-
-
Richardson, T.J.1
Urbanke, R.L.2
-
112
-
-
0035246128
-
Analysis of sum-product decoding of low-density parity-check codes using a gaussian approximation
-
February
-
S. -Y. Chung, T. J. Richardson, and R. L. Urbanke, “Analysis of sum-product decoding of low-density parity-check codes using a Gaussian approximation,” IEEE Transactions on Information Theory, vol. 47, no. 2, pp. 657-670, February 2001.
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.2
, pp. 657-670
-
-
Chung, S.-Y.1
Richardson, T.J.2
Urbanke, R.L.3
-
113
-
-
0035248618
-
On the design of low-density parity-check codes within 0.0045 db of the shannon limit
-
February
-
S. -Y. Chung, J. G. D. Forney, T. J. Richardson, and R. Urbanke, “On the design of low-density parity-check codes within 0.0045 dB of the Shannon limit,” IEEE Communications Letters, vol. 5, no. 2, pp. 58-60, February 2001.
-
(2001)
IEEE Communications Letters
, vol.5
, Issue.2
, pp. 58-60
-
-
Chung, S.-Y.1
Forney, J.G.2
Richardson, T.J.3
Urbanke, R.4
-
114
-
-
0035246127
-
Design of capacity-approaching irregular low-density parity-check codes
-
February
-
T. J. Richardson, M. A. Shokrollahi, and R. L. Urbanke, “Design of capacity-approaching irregular low-density parity-check codes,” IEEE Transactions on Information Theory, vol. 47, no. 2, pp. 619-637, February 2001.
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.2
, pp. 619-637
-
-
Richardson, T.J.1
Shokrollahi, M.A.2
Urbanke, R.L.3
-
115
-
-
0034449457
-
Design of efficient erasure codes with differential evolution
-
Sorrento, Italy, June
-
A. Shokrollahi and R. Storn, “Design of efficient erasure codes with differential evolution,” in Proc. IEEE International Symposium on Information Theory, Sorrento, Italy, June 2000.
-
Proc. IEEE International Symposium on Information Theory
, pp. 2000
-
-
Shokrollahi, A.1
Storn, R.2
-
116
-
-
0021595510
-
Wire tap channel ii
-
December
-
L. H. Ozarow and A. D. Wyner, “Wire tap channel II,” AT&T Bell Laboratories Technical Journal, vol. 63, no. 10, pp. 2135-2157, December 1984.
-
(1984)
At&T Bell Laboratories Technical Journal
, vol.63
, Issue.10
, pp. 2135-2157
-
-
Ozarow, L.H.1
Wyner, A.D.2
-
117
-
-
34547922334
-
Applications of ldpc codes to the wiretap channels
-
August
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J.-M. Merolla, “Applications of LDPC codes to the wiretap channels,” IEEE Transactions on Information Theory, vol. 53, no. 8, pp. 2933-2945, August 2007.
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
Mc Laughlin, S.W.4
Merolla, J.-M.5
-
118
-
-
80051953037
-
Strong secrecy for erasure wiretap channels
-
Dublin, Ireland
-
A. T. Suresh, A. Subramanian, A. Thangaraj, M. Bloch, and S. McLaughlin, “Strong secrecy for erasure wiretap channels,” in Proc. IEEE Information Theory Workshop, Dublin, Ireland, 2010, pp. 1-5.
-
(2010)
Proc. IEEE Information Theory Workshop
, pp. 1-5
-
-
Suresh, A.T.1
Subramanian, A.2
Thangaraj, A.3
Bloch, M.4
Mc Laughlin, S.5
-
119
-
-
84926122161
-
“strong secrecy on the binary erasure wiretap channel using large-girth ldpc codes
-
submitted to, September, Available online
-
A. Subramanian, A. Thangaraj, M. Bloch, and S. W. McLaughlin, “Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes,” submitted to IEEE Transactions on Information Forensics and Security, September 2010. Available online: arXiv:1009.3130.
-
(2010)
IEEE Transactions on Information Forensics and Security
-
-
Subramanian, A.1
Thangaraj, A.2
Bloch, M.3
Mc Laughlin, S.W.4
-
120
-
-
77953825394
-
Two edge type ldpc codes for the wiretap channels
-
Pacific Grove, CA, USA, November
-
V Rathi, M. Andersson, R. Thobaben, J. Kliewer, and M. Skoglund, “Two edge type LDPC codes for the wiretap channels,” in Proc. 43rd Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, November 2009, pp. 834-838.
-
(2009)
Proc. 43Rd Asilomar Conference on Signals, Systems and Computers
, pp. 834-838
-
-
Rathi, V.1
Andersson, M.2
Thobaben, R.3
Kliewer, J.4
Skoglund, M.5
-
121
-
-
48649107830
-
Syndrome-coding for the wiretap channel revisited
-
Chengdu, China, October
-
G. Cohen and G. Zemor, “Syndrome-coding for the wiretap channel revisited,” in Proc. IEEE Information Theory Workshop, Chengdu, China, October 2006, pp. 33-36.
-
(2006)
Proc. IEEE Information Theory Workshop
, pp. 33-36
-
-
Cohen, G.1
Zemor, G.2
-
122
-
-
45249114841
-
Secure nested codes for type ii wiretap channels
-
Lake Tahoe, CA, USA, September
-
R. Liu, Y. Liang, H. V Poor, and P Spasojevic, “Secure nested codes for type II wiretap channels,” in Proc. IEEE Information Theory Workshop, Lake Tahoe, CA, USA, September 2007, pp. 337-342.
-
(2007)
Proc. IEEE Information Theory Workshop
, pp. 337-342
-
-
Liu, R.1
Liang, Y.2
Poor, H.V.3
Spasojevic, P.4
-
123
-
-
0018441323
-
Convolutional encoding for wyners wiretap channels
-
March
-
E. Verriest and M. Hellman, “Convolutional encoding for Wyner’s wiretap channels,” IEEE Transactions on Information Theory, vol. 25, no. 2, pp. 234-236, March 1979.
-
(1979)
IEEE Transactions on Information Theory
, vol.25
, Issue.2
, pp. 234-236
-
-
Verriest, E.1
Hellman, M.2
-
124
-
-
0026219389
-
Generalized hamming weights for linear codes
-
September
-
V. Wei, “Generalized Hamming weights for linear codes,” IEEE Transactions on Information Theory, vol. 37, no. 5, pp. 1412-1418, September 1991.
-
(1991)
IEEE Transactions on Information Theory
, vol.37
, Issue.5
, pp. 1412-1418
-
-
Wei, V.1
-
125
-
-
77955673446
-
Achieving the secrecy capacity of wiretap channels using polar codes
-
Austin, TX, USA, June, Available online
-
H. Mahdavifar and A. Vardy, “Achieving the secrecy capacity of wiretap channels using polar codes,” in Proc. IEEE International Symposium on Information Theory, Austin, TX, USA, June 2010, pp. 913-917. Available online: arXiv:1001.0210v1.
-
(2010)
Proc. IEEE International Symposium on Information Theory
, pp. 913-917
-
-
Mahdavifar, H.1
Vardy, A.2
-
126
-
-
77955596749
-
Nested polar codes for wiretap and relay channels
-
June
-
M. Andersson, V Rathi, R. Thobaben, J. Kliewer, and M. Skoglund, “Nested polar codes for wiretap and relay channels,” IEEE Communications Letters, vol. 14, no. 4, pp. 752-754, June 2010.
-
(2010)
IEEE Communications Letters
, vol.14
, Issue.4
, pp. 752-754
-
-
Andersson, M.1
Rathi, V.2
Thobaben, R.3
Kliewer, J.4
Skoglund, M.5
-
127
-
-
78751480777
-
Polar coding for secure transmission and key agreement
-
Istanbul, Turkey
-
O. O. Koyluoglu and H. E. Gamal, “Polar coding for secure transmission and key agreement,” in Proc. IEEE International Symposium on Personal Indoor and Mobile Radio Communications, Istanbul, Turkey, 2010, pp. 2698-2703.
-
(2010)
Proc. IEEE International Symposium on Personal Indoor and Mobile Radio Communications
, pp. 2698-2703
-
-
Koyluoglu, O.O.1
Gamal, H.E.2
-
128
-
-
84926094930
-
Secrecy-achieving polar-coding for binary-input memoryless symmetric wire-tap channels
-
Dublin, Ireland
-
E. Hof and S. Shamai, “Secrecy-achieving polar-coding for binary-input memoryless symmetric wire-tap channels,” in Proc. IEEE Information Theory Workshop, Dublin, Ireland, 2010, pp. 1-5.
-
(2010)
Proc. IEEE Information Theory Workshop
, pp. 1-5
-
-
Hof, E.1
Shamai, S.2
-
129
-
-
76249131348
-
Ldpc codes for the gaussian wiretap channels
-
Taormina, Sicily, October
-
D. Klinc, J. Ha, S. McLaughlin, J. Barros, and B.-J. Kwak, “LDPC codes for the Gaussian wiretap channels,” in Proc. IEEE Information Theory Workshop, Taormina, Sicily, October 2009, pp. 95-99.
-
(2009)
Proc. IEEE Information Theory Workshop
, pp. 95-99
-
-
Klinc, D.1
Ha, J.2
Mc Laughlin, S.3
Barros, J.4
Kwak, B.-J.5
-
130
-
-
80051940473
-
Unimodular lattices for the gaussian wiretap channels
-
Dublin, Ireland, September
-
J.-C. Belfiore and P Sole, “Unimodular lattices for the Gaussian wiretap channels,” in Proc. IEEE Information Theory Workshop, Dublin, Ireland, September 2010, pp 1-5.
-
(2010)
Proc. IEEE Information Theory Workshop
, pp. 1-5
-
-
Belfiore, J.-C.1
Sole, P.2
-
131
-
-
78651284967
-
Secrecy gain: A wiretap lattice code design
-
Taichung, Taiwan, October
-
J.-C. Belfiore and F. Oggier, “Secrecy gain: A wiretap lattice code design,” in Proc. International Symposium on Information Theory and its Applications, Taichung, Taiwan, October 2010.
-
Proc. International Symposium on Information Theory and Its Applications
, pp. 2010
-
-
Belfiore, J.-C.1
Oggier, F.2
-
132
-
-
0015992185
-
Recent results in the shannon theory
-
January
-
A. Wyner, “Recent results in the Shannon theory,” IEEE Transactions on Information Theory, vol. 20, no. 1, pp. 2-10, January 1974.
-
(1974)
IEEE Transactions on Information Theory
, vol.20
, Issue.1
, pp. 2-10
-
-
Wyner, A.1
-
133
-
-
0036810616
-
Compression of binary sources with side information at the decoder using ldpc codes
-
October
-
A. D. Liveris, Z. Xiong, and C. N. Georghiades, “Compression of binary sources with side information at the decoder using LDPC codes,” IEEE Communications Letters, vol. 6, no. 10, pp. 440-442, October 2002.
-
(2002)
IEEE Communications Letters
, vol.6
, Issue.10
, pp. 440-442
-
-
Liveris, A.D.1
Xiong, Z.2
Georghiades, C.N.3
-
134
-
-
39049099931
-
Slepian-wolf code design via source-channel correspondence
-
Seattle, WA, USA, July
-
J. Chen, D. He, and A. Jagmohan, “Slepian-Wolf code design via source-channel correspondence,” in Proc. IEEE International Symposium on Information Theory, Seattle, WA, USA, July 2006, pp. 2433-2437.
-
(2006)
Proc. IEEE International Symposium on Information Theory
, pp. 2433-2437
-
-
Chen, J.1
He, D.2
Jagmohan, A.3
-
135
-
-
43049105016
-
Multidimensional reconciliation for a continuous-variable quantum key distribution
-
April
-
A. Leverrier, R. Alleaume, J. Boutros, G. Zemor, and P Grangier, “Multidimensional reconciliation for a continuous-variable quantum key distribution,” Physical Review A, vol. 77, no. 4, p. 42325, April 2008.
-
(2008)
Physical Review A
, vol.77
, Issue.4
, pp. 42325
-
-
Leverrier, A.1
Alleaume, R.2
Boutros, J.3
Zemor, G.4
Grangier, P.5
-
136
-
-
0032680475
-
Multilevel codes: Theoretical concepts and practical design rules
-
July
-
U. Wachsmann, R. F. H. Fischer, and J. B. Huber, “Multilevel codes: Theoretical concepts and practical design rules,” IEEE Transactions on Information Theory, vol. 45, no. 5, pp. 1361-1391, July 1999.
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, Issue.5
, pp. 1361-1391
-
-
Wachsmann, U.1
Fischer, R.F.2
Huber, J.B.3
-
137
-
-
0032072372
-
Bit-interleaved coded modulation
-
May
-
G. Caire, G. Taricco, and E. Biglieri, “Bit-interleaved coded modulation,” IEEE Transactions on Information Theory, vol. 44, no. 3, pp. 927-946, May 1998.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.3
, pp. 927-946
-
-
Caire, G.1
Taricco, G.2
Biglieri, E.3
-
138
-
-
0041779659
-
Capacity-approaching bandwidth-efficient coded modulation schemes based on low-density parity-check codes
-
September
-
J. Hou, P. H. Siegel, L. B. Milstein, and H. D. Pfister, “Capacity-approaching bandwidth-efficient coded modulation schemes based on low-density parity-check codes,” IEEE Transactions on Information Theory, vol. 49, no. 9, pp. 2141-2155, September 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.9
, pp. 2141-2155
-
-
Hou, J.1
Siegel, P.H.2
Milstein, L.B.3
Pfister, H.D.4
-
140
-
-
0017018484
-
New directions in cryptography
-
November
-
W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, November 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
141
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
February
-
R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120-126, February 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
144
-
-
0031143862
-
Security issues in all-optical networks
-
May-June
-
M. Medard, D. Marquis, R. Barry, and S. Finn, “Security issues in all-optical networks,” IEEE Network, vol. 11, no. 3, pp. 42-48, May-June 1997.
-
(1997)
IEEE Network
, vol.11
, Issue.3
, pp. 42-48
-
-
Medard, M.1
Marquis, D.2
Barry, R.3
Finn, S.4
-
145
-
-
0034228863
-
Authentication theory and hypothesis testing
-
July
-
U. M. Maurer, “Authentication theory and hypothesis testing,” IEEE Transactions on Information Theory, vol. 46, no. 4, pp. 1350-1356, July 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1350-1356
-
-
Maurer, U.M.1
-
146
-
-
34247339387
-
Securing wireless systems via lower layer enforcements
-
Los Angeles, CA, USA, September
-
Z. Li, W. Xu, R. Miller, and W. Trappe, “Securing wireless systems via lower layer enforcements,” in Proc. 5th ACM Workshop on Wireless Security, Los Angeles, CA, USA, September 2006, pp. 33-42.
-
(2006)
Proc. 5Th ACM Workshop on Wireless Security
, pp. 33-42
-
-
Li, Z.1
Xu, W.2
Miller, R.3
Trappe, W.4
-
149
-
-
45249101530
-
The general gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
-
June
-
E. Tekin and A. Yener, “The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming,” IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2735-2751, June 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
150
-
-
70349678716
-
On the role of feedback in two-way secure communications
-
Pacific Grove, CA, USA, October
-
X. He and A. Yener, “On the role of feedback in two-way secure communications,” in Proc. 42nd Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, October 2008, pp. 1093-1097.
-
(2008)
Proc. 42nd Asilomar Conference on Signals, Systems and Computers
, pp. 1093-1097
-
-
He, X.1
Yener, A.2
-
151
-
-
70449504460
-
Channel scrambling for secrecy
-
Seoul, South Korea, July
-
M. Bloch, “Channel scrambling for secrecy,” in Proc. of IEEE International Symposium on Information Theory, Seoul, South Korea, July 2009, pp. 2452-2456.
-
(2009)
Proc. Of IEEE International Symposium on Information Theory
, pp. 2452-2456
-
-
Bloch, M.1
-
152
-
-
4143137728
-
Capacity of correlated jamming channels
-
Monticello, IL, USA, October
-
M. Medard, “Capacity of correlated jamming channels,” in Proc. Allerton Conference on Communications, Computing and Control, Monticello, IL, USA, October 1997.
-
Proc. Allerton Conference on Communications, Computing and Control
, pp. 1997
-
-
Medard, M.1
-
153
-
-
51849144195
-
Interference-assisted secret communications
-
Porto, Portugal, May
-
X. Tang, R. Liu, P Spasojevic, and H. V Poor, “Interference-assisted secret communications,” in Proc. IEEE Information Theory Workshop, Porto, Portugal, May 2008, pp. 164-168.
-
(2008)
Proc. IEEE Information Theory Workshop
, pp. 164-168
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.V.4
-
154
-
-
52349118726
-
The gaussian wiretap channel with a helping interferer
-
Toronto, Canada, July
-
X. Tang, R. Liu, P Spasojevic, and H. V Poor, “The Gaussian wiretap channel with a helping interferer,” in Proc. IEEE International Symposium on Information Theory, Toronto, Canada, July 2008, pp. 389-393.
-
(2008)
Proc. IEEE International Symposium on Information Theory
, pp. 389-393
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.V.4
-
155
-
-
64549085982
-
Providing secrecy with lattice codes
-
Monticello, IL, USA, September
-
X. He and A. Yener, “Providing secrecy with lattice codes,” in Proc. 46th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, September 2008, pp. 1199-1206.
-
(2008)
Proc. 46Th Annual Allerton Conference on Communication, Control, and Computing
, pp. 1199-1206
-
-
He, X.1
Yener, A.2
-
156
-
-
77951565555
-
Secure degrees of freedom for gaussian channels with interference: Structured codes outperform gaussian signaling
-
Honolulu, HI, USA, December
-
X. He and A. Yener, “Secure degrees of freedom for Gaussian channels with interference: Structured codes outperform Gaussian signaling,” in Proc. IEEE Global Telecommunications Conference, Honolulu, HI, USA, December 2009, pp. 1-6.
-
(2009)
Proc. IEEE Global Telecommunications Conference
, pp. 1-6
-
-
He, X.1
Yener, A.2
-
157
-
-
52349113391
-
Secrecy in cooperative relay broadcast channels
-
Toronto, Canada, July
-
E. Ekrem and S. Ulukus, “Secrecy in cooperative relay broadcast channels,” in Proc. IEEE International Symposium on Information Theory, Toronto, Canada, July 2008, pp. 2217-2221.
-
(2008)
Proc. IEEE International Symposium on Information Theory
, pp. 2217-2221
-
-
Ekrem, E.1
Ulukus, S.2
-
158
-
-
51849134999
-
Confidential messages to a cooperative relay
-
Porto, Portugal, May
-
M. Bloch and A. Thangaraj, “Confidential messages to a cooperative relay,” in Proc. IEEE Information Theory Workshop, Porto, Portugal, May 2008, pp. 154-158.
-
(2008)
Proc. IEEE Information Theory Workshop
, pp. 154-158
-
-
Bloch, M.1
Thangaraj, A.2
-
159
-
-
77955397265
-
Friendly jamming for wireless secrecy
-
Cape Town, South Africa, May
-
J. P Vilela, M. Bloch, J. Barros, and S. W. McLaughlin, “Friendly jamming for wireless secrecy,” in Proc. IEEE International Conference on Communications, Cape Town, South Africa, May 2010, pp. 1550-3607.
-
(2010)
Proc. IEEE International Conference on Communications
, pp. 1550-3607
-
-
Vilela, J.P.1
Bloch, M.2
Barros, J.3
Mc Laughlin, S.W.4
-
160
-
-
70349705882
-
The cognitive multiple access wire-tap channel
-
Baltimore, MD, USA, March
-
O. Simeone and A. Yener, “The cognitive multiple access wire-tap channel,” in Proc. 43rd Annual Conference on Information Sciences and Systems, Baltimore, MD, USA, March 2009, pp. 158-163.
-
(2009)
Proc. 43Rd Annual Conference on Information Sciences and Systems
, pp. 158-163
-
-
Simeone, O.1
Yener, A.2
-
161
-
-
61349186445
-
Capacity of cognitive interference channels with and without secrecy
-
February
-
Y. Liang, A. Somekh-Baruch, H. V Poor, S. Shamai, and S. Verdir, “Capacity of cognitive interference channels with and without secrecy,” IEEE Transactions on Information Theory, vol. 55, no. 2, pp. 604-619, February 2009.
-
(2009)
IEEE Transactions on Information Theory
, vol.55
, Issue.2
, pp. 604-619
-
-
Liang, Y.1
Somekh-Baruch, A.2
Poor, H.V.3
Shamai, S.4
Verdir, S.5
-
162
-
-
33646073724
-
An achievable region for the gaussian wiretap channel with side information
-
May
-
C. Mitrpant, A. J. H. Vinck, and Y. Luo, “An achievable region for the Gaussian wiretap channel with side information,” IEEE Transactions on Information Theory, vol. 52, no. 5, pp. 2181-2190, May 2006.
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.5
, pp. 2181-2190
-
-
Mitrpant, C.1
Vinck, A.J.2
Luo, Y.3
-
163
-
-
51849094090
-
Secrecy rates of binary wiretapper channels using feedback schemes
-
Princeton, NJ, USA, March
-
G. T. Amariucai and S. Wei, “Secrecy rates of binary wiretapper channels using feedback schemes,” in Proc. 42nd Annual Conference on Information Sciences and Systems, Princeton, NJ, USA, March 2008, pp. 624-629.
-
(2008)
Proc. 42Nd Annual Conference on Information Sciences and Systems
, pp. 624-629
-
-
Amariucai, G.T.1
Wei, S.2
-
164
-
-
55349095058
-
The wiretap channel with feedback: Encryption over the channel
-
November
-
L. Lai, H. El Gamal, and H. V Poor, “The wiretap channel with feedback: Encryption over the channel,” IEEE Transactions on Information Theory, vol. 54, no. 11, pp. 5059-5067, November 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.11
, pp. 5059-5067
-
-
Lai, L.1
El Gamal, H.2
Poor, H.V.3
-
165
-
-
77951118738
-
Secret communication with feedback
-
Auckland, New Zealand, May
-
D. Gündüz, D. R. Brown, and H. V Poor, “Secret communication with feedback,” in Proc. International Symposium on Information Theory and Its Applications, Auckland, New Zealand, May 2008, pp. 1-6.
-
(2008)
Proc. International Symposium on Information Theory and Its Applications
, pp. 1-6
-
-
Gündüz, D.1
Brown, D.R.2
Poor, H.V.3
-
166
-
-
77954826162
-
“new achievable secrecy rate regions for the two way wiretap channels
-
Cairo, Egypt, January
-
A. El Gamal, O. O. Koyluoglu, M. Youssef, and H. El Gamal, “New achievable secrecy rate regions for the two way wiretap channels,” in Proc. IEEE Information Theory Workshop, Cairo, Egypt, January 2010, pp. 1-5.
-
(2010)
Proc. IEEE Information Theory Workshop
, pp. 1-5
-
-
El Gamal, A.1
Koyluoglu, O.O.2
Youssef, M.3
El Gamal, H.4
-
167
-
-
77955354714
-
A new outer bound for the secrecy capacity region of the gaussian two-way wiretap channels
-
Cape Town, South Africa, May
-
X. He and A. Yener, “A new outer bound for the secrecy capacity region of the Gaussian two-way wiretap channels,” in Proc. IEEE International Conference on Communications, Cape Town, South Africa, May 2010, pp. 1-5.
-
(2010)
Proc. IEEE International Conference on Communications
, pp. 1-5
-
-
He, X.1
Yener, A.2
-
168
-
-
84938932265
-
Coding for relay channels with confidential messages
-
Cairns, Australia, September
-
Y. Oohama, “Coding for relay channels with confidential messages,” in Proc. IEEE Information Theory Workshop, Cairns, Australia, September 2001, pp. 87-89.
-
(2001)
Proc. IEEE Information Theory Workshop
, pp. 87-89
-
-
Oohama, Y.1
-
169
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
September
-
L. Lai and H. El Gamal, “The relay-eavesdropper channel: Cooperation for secrecy,” IEEE Transactions on Information Theory, vol. 54, no. 9, pp. 4005-4019, September 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
170
-
-
45249083184
-
Secure communication with a relay helping the wire-tapper
-
Lake Tahoe, CA, USA, September
-
M. Yuksel and E. Erkip, “Secure communication with a relay helping the wire-tapper,” in Proc. IEEE Information Theory Workshop, Lake Tahoe, CA, USA, September 2007, pp. 595-600.
-
(2007)
Proc. IEEE Information Theory Workshop
, pp. 595-600
-
-
Yuksel, M.1
Erkip, E.2
-
171
-
-
70449463810
-
Secure communication with a byzantine relay
-
Seoul, South Korea, July
-
X. He and A. Yener, “Secure communication with a Byzantine relay,” in Proc. IEEE International Symposium on Information Theory, Seoul, South Korea, July 2009, pp. 2096-2100.
-
(2009)
Proc. IEEE International Symposium on Information Theory
, pp. 2096-2100
-
-
He, X.1
Yener, A.2
-
173
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
August
-
X. He and A. Yener, “Cooperation with an untrusted relay: A secrecy perspective,” IEEE Transactions on Information Theory, vol. 56, no. 8, pp. 3807-3827, August 2010.
-
(2010)
IEEE Transactions on Information Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
174
-
-
45249092485
-
Secure broadcasting over fading channels
-
June
-
A. Khisti, A. Tchamkerten, and G. W. Wornell, “Secure broadcasting over fading channels,” IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2453-2469, June 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2453-2469
-
-
Khisti, A.1
Tchamkerten, A.2
Wornell, G.W.3
-
175
-
-
73449104694
-
Compound wiretap channels
-
2009
-
Y. Liang, G. Kramer, H. V Poor, and S.S Shitz, “Compound wiretap channels,” EURASIP Journal on Wireless Communications and Networking, vol. 2009, pp. 142 374/1-12, 2009.
-
(2009)
EURASIP Journal on Wireless Communications and Networking
-
-
Liang, Y.1
Kramer, G.2
Poor, H.V.3
Shitz, S.S.4
-
176
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
December
-
I. Csiszâr and P. Narayan, “Secrecy capacities for multiple terminals,” IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3047-3061, December 2004.
-
(2004)
IEEE Transactions on Information Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszâr, I.1
Narayan, P.2
-
177
-
-
45249104852
-
Secrecy capacities for multiterminal channel models
-
June
-
I. Csiszar and P Narayan, “Secrecy capacities for multiterminal channel models,” IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2437-2452, June 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2437-2452
-
-
Csiszar, I.1
Narayan, P.2
-
178
-
-
70449515425
-
Secrecy generation for multiple input multiple output channel models
-
Seoul, South Korea, July
-
I. Csiszar and P Narayan, “Secrecy generation for multiple input multiple output channel models,” in Proc. IEEE International Symosium on Information Theory, Seoul, South Korea, July 2009, pp. 2447-2451.
-
(2009)
Proc. IEEE International Symosium on Information Theory
, pp. 2447-2451
-
-
Csiszar, I.1
Narayan, P.2
-
179
-
-
70449513070
-
Perfect secrecy, perfect omniscience and steiner tree packing
-
Seoul, South Korea, July
-
S. Nitinawarat, A. Barg, P Narayan, C. Ye, and A. Reznik, “Perfect secrecy, perfect omniscience and Steiner tree packing,” in Proc. IEEE International Symposium on Information Theory, Seoul, South Korea, July 2009, pp. 1288-1292.
-
(2009)
Proc. IEEE International Symposium on Information Theory
, pp. 1288-1292
-
-
Nitinawarat, S.1
Barg, A.2
Narayan, P.3
Ye, C.4
Reznik, A.5
-
180
-
-
77955669493
-
Perfect secrecy and combinatorial tree packing
-
Austin, TX, USA, June
-
S. Nitinawarat and P Narayan, “Perfect secrecy and combinatorial tree packing,” in Proc. IEEE International Symposium on Information Theory, Austin, TX, USA, June 2010, pp. 2622-2626.
-
(2010)
Proc. IEEE International Symposium on Information Theory
, pp. 2622-2626
-
-
Nitinawarat, S.1
Narayan, P.2
-
181
-
-
52349086199
-
The secrecy graph and some of its properties
-
Toronto, Canada, July
-
M. Haenggi, “The secrecy graph and some of its properties,” in Proc. IEEE International Symposium on Information Theory, Toronto, Canada, July 2008, pp. 539-543.
-
(2008)
Proc. IEEE International Symposium on Information Theory
, pp. 539-543
-
-
Haenggi, M.1
-
182
-
-
62949215603
-
Physical-layer security in stochastic wireless networks
-
Guangzhou, Singapore, November
-
P C. Pinto, J. Barros, and M. Z. Win, “Physical-layer security in stochastic wireless networks,” in Proc. 11th IEEE Singapore International Conference on Communication Systems, Guangzhou, Singapore, November 2008, pp. 974-979.
-
(2008)
Proc. 11Th IEEE Singapore International Conference on Communication Systems
, pp. 974-979
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
183
-
-
70349282001
-
On noise insertion strategies for wireless network secrecy
-
San Diego, CA, USA, February
-
E. Perron, S. Diggavi, and E. Telatar, “On noise insertion strategies for wireless network secrecy,” in Proc. Information Theory and Applications Workshop, San Diego, CA, USA, February 2009, pp. 77-84.
-
(2009)
Proc. Information Theory and Applications Workshop
, pp. 77-84
-
-
Perron, E.1
Diggavi, S.2
Telatar, E.3
-
184
-
-
0034229404
-
Network information flow
-
July
-
R. Ahlswede, N. Cai, S. Li, and R. Yeung, “Network information flow,” IEEE Transactions on Information Theory, vol. 46, no. 4, pp. 1204-1216, July 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.3
Yeung, R.4
-
185
-
-
0037323073
-
Linear network coding
-
February
-
S. Li, R. Yeung, and N. Cai, “Linear network coding,” IEEE Transactions on Information Theory, vol. 49, no. 2, pp. 371-381, February 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.1
Yeung, R.2
Cai, N.3
-
186
-
-
0242334165
-
An algebraic approach to network coding
-
October
-
R. Koetter and M. Medard, “An algebraic approach to network coding,” IEEE/ACM Transactions on Networking, vol. 11, no. 5, pp. 782-795, October 2003.
-
(2003)
IEEE/ACM Transactions on Networking
, vol.11
, Issue.5
, pp. 782-795
-
-
Koetter, R.1
Medard, M.2
-
187
-
-
33947399169
-
A random linear network coding approach to multicast
-
October
-
T. Ho, M. Medard, R. Koetter, D. Karger, M. Effros, J. Shi, and B. Leong, “A random linear network coding approach to multicast,” IEEE Transactions on Information Theory, vol. 52, no. 10, pp. 4413-4430, October 2006.
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.10
, pp. 4413-4430
-
-
Ho, T.1
Medard, M.2
Koetter, R.3
Karger, D.4
Effros, M.5
Shi, J.6
Leong, B.7
-
188
-
-
84874947294
-
Practical network coding
-
Monticello, IL, USA, October
-
P Chou, Y. Wu, and K. Jain, “Practical network coding,” in Proc. 41st Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, October 2003.
-
Proc. 41St Allerton Conference on Communication, Control, and Computing
, pp. 2003
-
-
P Chou, Y.W.1
Jain, K.2
-
189
-
-
25644448947
-
Network coding for large scale content distribution
-
Miami, FL, USA, March
-
C. Gkantsidis and P. Rodriguez, “Network coding for large scale content distribution,” in Proc. 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), Miami, FL, USA, March 2005, pp. 2235-2245.
-
(2005)
Proc. 24Th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM)
, pp. 2235-2245
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
190
-
-
33750317296
-
Xors in the air: Practical wireless network coding
-
Pisa, Italy, August
-
S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, and J. Crowcroft, “XORs in the air: practical wireless network coding,” in Proc. Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pisa, Italy, August 2006, pp. 243-254.
-
(2006)
Proc. Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 243-254
-
-
Katti, S.1
Rahul, H.2
Hu, W.3
Katabi, D.4
Medard, M.5
Crowcroft, J.6
-
191
-
-
0036353798
-
Secure network coding
-
Lausanne, Switzerland, July
-
N. Cai and R. Yeung, “Secure network coding,” in Proc. IEEE International Symposium on Information Theory, Lausanne, Switzerland, July 2002, p. 323.
-
(2002)
Proc. IEEE International Symposium on Information Theory
, pp. 323
-
-
Cai, N.1
Yeung, R.2
-
192
-
-
0021595510
-
Wire-tap channel ii
-
December
-
L. Ozarowand A. Wyner“Wire-tap channel II,” AT&T Bell Labs Technical Journal, vol. 63, no. 10, pp. 2135-2157, December 1984.
-
(1984)
At&T Bell Labs Technical Journal
, vol.63
, Issue.10
, pp. 2135-2157
-
-
Ozarowand, L.1
Wyner, A.2
-
193
-
-
51649109673
-
On wiretap networks ii
-
Nice, France, June
-
S. Rouayheb and E. Soljanin, “On wiretap networks II,” in Proc. IEEE International Symposium on Information Theory, Nice, France, June 2007, pp. 551-555.
-
(2007)
Proc. IEEE International Symposium on Information Theory
, pp. 551-555
-
-
Rouayheb, S.1
Soljanin, E.2
-
194
-
-
69849097856
-
Weakly secure network coding
-
Riva del Garda, Italy, February
-
K. Bhattad and K. Narayanan, “Weakly secure network coding,” in Proc. First Workshop on Network Coding, Theory, and Applications (NetCod), Riva del Garda, Italy, February 2005.
-
Proc. First Workshop on Network Coding, Theory, and Applications (Netcod)
, pp. 2005
-
-
Bhattad, K.1
Narayanan, K.2
-
195
-
-
51649118865
-
Random linear network coding: A free cipher?
-
Nice, France, June
-
L. Lima, M. Medard, and J. Barros, “Random linear network coding: A free cipher?” in Proc. IEEE International Symposium on Information Theory, Nice, France, June 2007, pp. 546-550.
-
(2007)
Proc. IEEE International Symposium on Information Theory
, pp. 546-550
-
-
Lima, L.1
Medard, M.2
Barros, J.3
-
196
-
-
51249125036
-
Lightweight security for network coding
-
Beijing, China, May
-
J. Vilela, L. Lima, and J. Barros, “Lightweight security for network coding,” in Proc. IEEE International Conference on Communications, Beijing, China, May 2008, pp. 1750-1754.
-
(2008)
Proc. IEEE International Conference on Communications
, pp. 1750-1754
-
-
Vilela, J.1
Lima, L.2
Barros, J.3
-
197
-
-
84055213041
-
Secure network coding for multi-resolution wireless video streaming
-
April
-
L. Lima, S. Gheorghiu, J. Barros, M. Medard, and A. Toledo, “Secure network coding for multi-resolution wireless video streaming,” IEEE Journal on Selected Areas in Communications, vol. 28, no. 3, pp. 377-388, April 2010.
-
(2010)
IEEE Journal on Selected Areas in Communications
, vol.28
, Issue.3
, pp. 377-388
-
-
Lima, L.1
Gheorghiu, S.2
Barros, J.3
Medard, M.4
Toledo, A.5
-
198
-
-
34548349361
-
Resilient network coding in the presence of byzantine adversaries
-
May
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, and M. Medard, “Resilient network coding in the presence of Byzantine adversaries,” in IEEE INFOCOM, May 2007.
-
(2007)
IEEE INFOCOM
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Medard, M.6
-
199
-
-
39049090594
-
Cooperative security for network coding file distribution
-
Barcelona, Spain, April
-
C. Gkantsidis and P. Rodriguez, “Cooperative security for network coding file distribution,” in IEEE INFOCOM, Barcelona, Spain, April 2006.
-
(2006)
IEEE INFOCOM
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
200
-
-
0142008445
-
Network error correction
-
Kanagawa, Japan, July
-
N. Cai and R. Yeung, “Network error correction,” in Proc. IEEE International Symposium on Information Theory, Kanagawa, Japan, July 2003, p. 101.
-
(2003)
Proc. IEEE International Symposium on Information Theory
, pp. 101
-
-
Cai, N.1
Yeung, R.2
-
201
-
-
48849089497
-
Coding for errors and erasures in random network coding
-
August
-
R. Koetter and F. Kschischang, “Coding for errors and erasures in random network coding,” IEEE Transactions on Information Theory, vol. 54, no. 8, pp. 3579-3591, August 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.8
, pp. 3579-3591
-
-
Koetter, R.1
Kschischang, F.2
-
202
-
-
82055199252
-
On counteracting byzantine attacks in network coded peer-to-peer networks
-
June
-
M. Kim, L. Lima, F. Zhao, J. Barros, M. Medard, R. Koetter, T. Kalker, and K. Han, “On counteracting Byzantine attacks in network coded peer-to-peer networks,” IEEE Journal on Selected Areas in Communications, vol. 28, no. 5, pp. 692-702, June 2010.
-
(2010)
IEEE Journal on Selected Areas in Communications
, vol.28
, Issue.5
, pp. 692-702
-
-
Kim, M.1
Lima, L.2
Zhao, F.3
Barros, J.4
Medard, M.5
Koetter, R.6
Kalker, T.7
Han, K.8
-
203
-
-
67649783701
-
Mobile secret key distribution with network coding
-
Barcelona, Spain, July
-
P. F. Oliveira, R. A. Costa, and J. Barros, “Mobile secret key distribution with network coding,” in Proc. International Conference on Security and Cryptography, Barcelona, Spain, July 2007, pp. 1-4.
-
(2007)
Proc. International Conference on Security and Cryptography
, pp. 1-4
-
-
Oliveira, P.F.1
Costa, R.A.2
Barros, J.3
-
204
-
-
70449514921
-
An algebraic watchdog for wireless network coding
-
Seoul, South Korea, July
-
M. J. Kim, J. Barros, M. Medard, and R. Koetter, “An algebraic watchdog for wireless network coding,” in Proc. IEEE International Symposium on Information Theory, Seoul, South Korea, July 2009, pp. 1159-1163.
-
(2009)
Proc. IEEE International Symposium on Information Theory
, pp. 1159-1163
-
-
Kim, M.J.1
Barros, J.2
Medard, M.3
Koetter, R.4
-
206
-
-
34347246347
-
Network coding fundamentals
-
C. Fragouli and E. Soljanin, “Network coding fundamentals,” Foundations and Trends in Networking, vol. 2, no. 1, pp. 1-133, 2007.
-
(2007)
Foundations and Trends in Networking
, vol.2
, Issue.1
, pp. 1-133
-
-
Fragouli, C.1
Soljanin, E.2
-
207
-
-
39349092611
-
Network coding applications
-
C. Fragouli and E. Soljanin“Network coding applications,” Foundations and Trends in Networking, vol. 2, no. 2, pp. 135-269, 2007.
-
(2007)
Foundations and Trends in Networking
, vol.2
, Issue.2
, pp. 135-269
-
-
Fragouli, C.1
Soljanin, E.2
|