-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348,May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
4
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Information theoretic security," Found. Trends Commun. Inf. Theory, vol. 5, no. 4/5, pp. 355-580, 2009.
-
(2009)
Found. Trends Commun. Inf. Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai Shitz, S.3
-
6
-
-
84861309485
-
Secrecy on the physical layer in wireless networks
-
Mar.
-
E. A. Jorswieck, A. Wolf, and S. Gerbracht, "Secrecy on the physical layer in wireless networks," Trends Telecommun. Tech., pp. 413-435, Mar. 2010.
-
(2010)
Trends Telecommun. Tech.
, pp. 413-435
-
-
Jorswieck, E.A.1
Wolf, A.2
Gerbracht, S.3
-
8
-
-
84904788826
-
-
Boca Raton, FL, USA: CRC Press
-
X. Zhou, L. Song, and Y. Zhang, Eds., Physical Layer Security in Wireless Communications. Boca Raton, FL, USA: CRC Press, 2013.
-
(2013)
Physical Layer Security in Wireless Communications
-
-
Zhou, X.1
Song, L.2
Zhang, Y.3
-
9
-
-
85032752264
-
Physical layer service integration in wireless networksVSignal processing challenges
-
May
-
R. F. Schaefer and H. Boche, "Physical layer service integration in wireless networksVSignal processing challenges," IEEE Signal Process. Mag., vol. 31, no. 3, pp. 147-156, May 2014.
-
(2014)
IEEE Signal Process. Mag.
, vol.31
, Issue.3
, pp. 147-156
-
-
Schaefer, R.F.1
Boche, H.2
-
11
-
-
84905270741
-
New challenges for IT-security research in ICT
-
Erice, Italy, Aug.
-
U. Helmbrecht and R. Plaga, "New challenges for IT-security research in ICT," in World Federation of Scientists International Seminars on Planetary Emergencies, Erice, Italy, Aug. 2008, pp. 1-6.
-
(2008)
World Federation of Scientists International Seminars on Planetary Emergencies
, pp. 1-6
-
-
Helmbrecht, U.1
Plaga, R.2
-
12
-
-
84947747388
-
-
ITU-T Tech. Watch Rep., Tech. Rep., Aug.. [Online]
-
G. Fettweis et al., "The Tactile Internet," ITU-T Tech. Watch Rep., Tech. Rep., Aug. 2014. [Online]. Available: http://www. itu.int/oth/T2301000023/en.
-
(2014)
The Tactile Internet
-
-
Fettweis, G.1
-
13
-
-
0029706655
-
Almost independence and secrecy capacity
-
I. Csiszár, "Almost independence and secrecy capacity," Probl. Pered. Inform., vol. 32, no. 1, pp. 48-57, 1996.
-
(1996)
Probl. Pered. Inform.
, vol.32
, Issue.1
, pp. 48-57
-
-
Csiszár, I.1
-
14
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
New York, NY, USA: Springer-Verlag, May
-
U. M. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in EUROCRYPT 2000, Lecture Notes in Computer Science, vol. 1807. New York, NY, USA: Springer-Verlag, May 2000, pp. 351-368.
-
(2000)
EUROCRYPT 2000, Lecture Notes in Computer Science
, vol.1807
, pp. 351-368
-
-
Maurer, U.M.1
Wolf, S.2
-
15
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Aug.
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
16
-
-
77953802876
-
Secure transmission with multiple antennas I: The MISOME wiretap channel
-
Jul.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
17
-
-
77958560746
-
Secure transmission with multiple antennasVPart II: The MIMOME wiretap channel
-
Nov.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennasVPart II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
18
-
-
66949180834
-
A note on the secrecy capacity of the multiple-antenna wiretap channel
-
Jun.
-
T. Liu and S. Shamai (Shitz), "A note on the secrecy capacity of the multiple-antenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai Shitz, S.2
-
19
-
-
0037670845
-
The capacity of a class of channels
-
Dec.
-
D. Blackwell, L. Breiman, and A. J. Thomasian, "The capacity of a class of channels," Ann. Math. Stat., vol. 30, no. 4, pp. 1229-1241, Dec. 1959.
-
(1959)
Ann. Math. Stat.
, vol.30
, Issue.4
, pp. 1229-1241
-
-
Blackwell, D.1
Breiman, L.2
Thomasian, A.J.3
-
20
-
-
29144441674
-
Simultaneous channels
-
J. Wolfowitz, "Simultaneous channels," Arch. Rational Mech. Analysis, vol. 4, no. 4, pp. 371-386, 1960.
-
(1960)
Arch. Rational Mech. Analysis
, vol.4
, Issue.4
, pp. 371-386
-
-
Wolfowitz, J.1
-
21
-
-
73449104694
-
Compound wiretap channels
-
Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), "Compound wiretap channels," EURASIP J. Wireless Commun. Netw., 2009, Article ID. 142374.
-
(2009)
EURASIP J. Wireless Commun. Netw.
-
-
Liang, Y.1
Kramer, G.2
Poor, H.V.3
Shamai Shitz, S.4
-
22
-
-
84876274641
-
Secrecy results for compound wiretap channels
-
Mar.
-
I. Bjelaković, H. Boche, and J. Sommerfeld, "Secrecy results for compound wiretap channels," Probl. Inf. Transmission, vol. 49, no. 1, pp. 73-98, Mar. 2013.
-
(2013)
Probl. Inf. Transmission
, vol.49
, Issue.1
, pp. 73-98
-
-
Bjelaković, I.1
Boche, H.2
Sommerfeld, J.3
-
23
-
-
77953692409
-
On GaussianMIMO compound wiretap channels
-
Baltimore, MD, USA, Mar.
-
E. Ekrem and S. Ulukus, "On GaussianMIMO compound wiretap channels," in Proc. Conf. Inf. Sciences and Systems, Baltimore, MD, USA, Mar. 2010, pp. 1-6.
-
(2010)
Proc. Conf. Inf. Sciences and Systems
, pp. 1-6
-
-
Ekrem, E.1
Ulukus, S.2
-
24
-
-
79955497445
-
Interference alignment for the multiantenna compound wiretap channel
-
May
-
A. Khisti, "Interference alignment for the multiantenna compound wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 2976-2993, May 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.5
, pp. 2976-2993
-
-
Khisti, A.1
-
25
-
-
84893328786
-
The secrecy capacity of a compound MIMO Gaussian channel
-
Seville, Spain, Sep.
-
R. F. Schaefer and S. Loyka, "The secrecy capacity of a compound MIMO Gaussian channel," in Proc. IEEE Inf. Theory Workshop, Seville, Spain, Sep. 2013, pp. 104-108.
-
(2013)
Proc. IEEE Inf. Theory Workshop
, pp. 104-108
-
-
Schaefer, R.F.1
Loyka, S.2
-
26
-
-
84988220669
-
The compound secrecy capacity of a class of non-degraded MIMO Gaussian channels
-
Control, Computing, Monticello, IL, USA, Oct.
-
R. F. Schaefer and S. Loyka, "The compound secrecy capacity of a class of non-degraded MIMO Gaussian channels," in Proc. 52th Annual Allerton Conf. Commun., Control, Computing, Monticello, IL, USA, Oct. 2014, pp. 1004-1010.
-
(2014)
Proc. 52th Annual Allerton Conf. Commun.
, pp. 1004-1010
-
-
Schaefer, R.F.1
Loyka, S.2
-
27
-
-
84971325347
-
On the secrecy capacity of rank-deficient compound wiretap channels
-
San Diego, CA, USA, Dec.
-
R. F. Schaefer and S. Loyka, "On the secrecy capacity of rank-deficient compound wiretap channels," in Proc. IEEE Global Commun. Conf.VWorkshop Trusted Commun. Physical Layer Security, San Diego, CA, USA, Dec. 2015.
-
(2015)
Proc. IEEE Global Commun. Conf.VWorkshop Trusted Commun. Physical Layer Security
-
-
Schaefer, R.F.1
Loyka, S.2
-
28
-
-
84893328786
-
The secrecy capacity of compound MIMO Gaussian channels
-
to be published
-
R. F. Schaefer and S. Loyka, "The secrecy capacity of compound MIMO Gaussian channels," IEEE Trans. Inf. Theory, to be published, DOI: 10.1109/TIT.2015.2458856.
-
IEEE Trans. Inf. Theory
-
-
Schaefer, R.F.1
Loyka, S.2
-
29
-
-
84940473770
-
Robust transmission over wiretap channels with secret keys
-
Systems, Computers, Pacific Grove, CA, USA, Nov.
-
R. F. Schaefer and H. V. Poor, "Robust transmission over wiretap channels with secret keys," in Proc. Asilomar Conf. Signals, Systems, Computers, Pacific Grove, CA, USA, Nov. 2014, pp. 60-64.
-
(2014)
Proc. Asilomar Conf. Signals
, pp. 60-64
-
-
Schaefer, R.F.1
Poor, H.V.2
-
30
-
-
0344438837
-
The capacities of certain channel classes under random coding
-
D. Blackwell, L. Breiman, and A. J. Thomasian, "The capacities of certain channel classes under random coding," Ann. Math. Stat., vol. 31, no. 3, pp. 558-567, 1960.
-
(1960)
Ann. Math. Stat.
, vol.31
, Issue.3
, pp. 558-567
-
-
Blackwell, D.1
Breiman, L.2
Thomasian, A.J.3
-
31
-
-
0000095922
-
Elimination of correlation in random codes for arbitrarily varying channels
-
R. Ahlswede, "Elimination of correlation in random codes for arbitrarily varying channels," Z. Wahrscheinlichkeitstheorie verw. Gebiete, vol. 44, pp. 159-175, 1978.
-
(1978)
Z. Wahrscheinlichkeitstheorie Verw. Gebiete
, vol.44
, pp. 159-175
-
-
Ahlswede, R.1
-
32
-
-
0023984409
-
The capacity of the arbitrarily varying channel revisited: Positivity, constraints
-
Mar.
-
I. Csiszár and P. Narayan, "The capacity of the arbitrarily varying channel revisited: Positivity, constraints," IEEE Trans. Inf. Theory, vol. 34, no. 2, pp. 181-193, Mar. 1988.
-
(1988)
IEEE Trans. Inf. Theory
, vol.34
, Issue.2
, pp. 181-193
-
-
Csiszár, I.1
Narayan, P.2
-
33
-
-
77949624888
-
Arbitrary jamming can preclude secure communication
-
Control, Computing, Monticello, IL, USA, Sep.
-
E.MolavianJazi, M. Bloch, and J. N. Laneman, "Arbitrary jamming can preclude secure communication," in Proc. 47th Annual Allerton Conf. Commun., Control, Computing, Monticello, IL, USA, Sep. 2009, pp. 1069-1075.
-
(2009)
Proc. 47th Annual Allerton Conf. Commun.
, pp. 1069-1075
-
-
MolavianJazi, E.1
Bloch, M.2
Laneman, J.N.3
-
34
-
-
84875981940
-
Capacity results for arbitrarily varying wiretap channels
-
Combinatorics, and Search Theory. New York, NY, USA: Springer-Verlag
-
I. Bjelaković, H. Boche, and J. Sommerfeld, "Capacity Results for Arbitrarily Varying Wiretap Channels," in Information Theory, Combinatorics, and Search Theory. New York, NY, USA: Springer-Verlag, 2013, pp. 123-144.
-
(2013)
Information Theory
, pp. 123-144
-
-
Bjelaković, I.1
Boche, H.2
Sommerfeld, J.3
-
35
-
-
84882940387
-
Capacity results and super-activation for wiretap channels with active wiretappers
-
Sep.
-
H. Boche and R. F. Schaefer, "Capacity results and super-activation for wiretap channels with active wiretappers," IEEE Trans. Inf. Forensics Security, vol. 8, no. 9, pp. 1482-1496, Sep. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.9
, pp. 1482-1496
-
-
Boche, H.1
Schaefer, R.F.2
-
36
-
-
84906544519
-
On arbitrarily varying wiretap channels for different classes of secrecy measures
-
Honolulu, HI, USA, Jun.
-
H. Boche, R. F. Schaefer, and H. V. Poor, "On arbitrarily varying wiretap channels for different classes of secrecy measures," in Proc. IEEE Int. Symp. Inf. Theory, Honolulu, HI, USA, Jun. 2014, pp. 2376-2380.
-
(2014)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2376-2380
-
-
Boche, H.1
Schaefer, R.F.2
Poor, H.V.3
-
37
-
-
84959489306
-
The arbitrarily varying wiretap channelVDeterministic and correlated random coding capacities under the strong secrecy criterion
-
Hong Kong, Jun.. [Online]
-
M. Wiese, J. Nötzel, and H. Boche, "The arbitrarily varying wiretap channelVDeterministic and correlated random coding capacities under the strong secrecy criterion," in Proc. IEEE Int. Symp. Inf. Theory, Hong Kong, Jun. 2015. [Online]. Available: http://arxiv.org/abs/1410.8078.
-
(2015)
Proc. IEEE Int. Symp. Inf. Theory
-
-
Wiese, M.1
Nötzel, J.2
Boche, H.3
-
38
-
-
84969749555
-
The arbitrarily varying wiretap channelVSecret randomness, stability and super-activation
-
Hong Kong, Jun.. [Online]
-
J. Nötzel, M. Wiese, and H. Boche, "The arbitrarily varying wiretap channelVSecret randomness, stability and super-activation," in Proc. IEEE Int. Symp. Inf. Theory, Hong Kong, Jun. 2015. [Online]. Available: http://arxiv.org/abs/1501.07439.
-
(2015)
Proc. IEEE Int. Symp. Inf. Theory
-
-
Nötzel, J.1
Wiese, M.2
Boche, H.3
-
39
-
-
84960339869
-
On the continuity of the secrecy capacity of compound and arbitrarily varying wiretap channels
-
to be published
-
H. Boche, R. F. Schaefer, and H. V. Poor, "On the continuity of the secrecy capacity of compound and arbitrarily varying wiretap channels," IEEE Trans. Inf. Forensics Security, to be published, DOI: 10.1109/TIFS.2015. 2465937.
-
IEEE Trans. Inf. Forensics Security
-
-
Boche, H.1
Schaefer, R.F.2
Poor, H.V.3
-
41
-
-
80053546706
-
Quantum communication with Gaussian channels of zero quantum capacity
-
Oct.
-
G. Smith, J. A. Smolin, and J. Yard, "Quantum communication with Gaussian channels of zero quantum capacity," Nature Photonics, vol. 5, no. 10, pp. 624-627, Oct. 2011.
-
(2011)
Nature Photonics
, vol.5
, Issue.10
, pp. 624-627
-
-
Smith, G.1
Smolin, J.A.2
Yard, J.3
-
42
-
-
80053529602
-
Quantum communication: Super-activated channels
-
Oct.
-
G. Giedke and M. M. Wolf, "Quantum communication: Super-activated channels," Nature Photonics, vol. 5, no. 10, pp. 578-580, Oct. 2011.
-
(2011)
Nature Photonics
, vol.5
, Issue.10
, pp. 578-580
-
-
Giedke, G.1
Wolf, M.M.2
-
43
-
-
84883395039
-
Limits of reliable communication with low probability of detection on AWGN channels
-
Sep.
-
B. A. Bash, D. Goeckel, and D. Towsley, "Limits of reliable communication with low probability of detection on AWGN channels," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1921-1930, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1921-1930
-
-
Bash, B.A.1
Goeckel, D.2
Towsley, D.3
-
44
-
-
84929359259
-
Reliable, deniable and hidable communication: A quick survey
-
Hobart, Australia, Nov.
-
P. H. Che et al., "Reliable, deniable and hidable communication: A quick survey," in Proc. IEEE Inf. Theory Workshop, Hobart, Australia, Nov. 2014, pp. 227-231.
-
(2014)
Proc. IEEE Inf. Theory Workshop
, pp. 227-231
-
-
Che, P.H.1
-
45
-
-
84959542511
-
Covert communication over noisy channels: A resolvability perspective
-
[Online]
-
M. R. Bloch, "Covert communication over noisy channels: A resolvability perspective," IEEE Trans. Inf. Theory, 2015. [Online]. Available: http://arxiv.org/abs/1503.08778.
-
(2015)
IEEE Trans. Inf. Theory
-
-
Bloch, M.R.1
-
46
-
-
84959539247
-
-
H. Boche, R. F. Schaefer, A. Grigorescu, and H. V. Poor, Robust code design for wiretap and broadcast channels under channel uncertainty, in preparation.
-
Robust Code Design for Wiretap and Broadcast Channels under Channel Uncertainty, in Preparation
-
-
Boche, H.1
Schaefer, R.F.2
Grigorescu, A.3
Poor, H.V.4
-
47
-
-
70449513409
-
On the compound MIMO broadcast channels with confidential messages
-
Seoul, Korea, Jun.
-
M. Kobayashi, Y. Liang, S. Shamai (Shitz), and M. Debbah, "On the compound MIMO broadcast channels with confidential messages," in Proc. IEEE Int. Symp. Inf. Theory, Seoul, Korea, Jun. 2009, pp. 1283-1287.
-
(2009)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1283-1287
-
-
Kobayashi, M.1
Liang, Y.2
Shamai Shitz, S.3
Debbah, M.4
-
48
-
-
84907459082
-
Robust broadcasting of common and confidential messages over compound channels: Strong secrecy and decoding performance
-
Oct.
-
R. F. Schaefer and H. Boche, "Robust broadcasting of common and confidential messages over compound channels: Strong secrecy and decoding performance," IEEE Trans. Inf. Forensics Security, vol. 9, no. 10, pp. 1720-1732, Oct. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.10
, pp. 1720-1732
-
-
Schaefer, R.F.1
Boche, H.2
-
49
-
-
84938934426
-
Capacity region continuity of the compound broadcast channel with confidential messages
-
Jerusalem, Israel, Apr.
-
A. Grigorescu, H. Boche, R. F. Schaefer, and H. V. Poor, "Capacity region continuity of the compound broadcast channel with confidential messages," in Proc. IEEE Inf. Theory Workshop, Jerusalem, Israel, Apr. 2015, pp. 1-5.
-
(2015)
Proc. IEEE Inf. Theory Workshop
, pp. 1-5
-
-
Grigorescu, A.1
Boche, H.2
Schaefer, R.F.3
Poor, H.V.4
-
50
-
-
84921471912
-
On secure communication over multiple access wiretap channels under channel uncertainty
-
San Francisco, CA, USA, Oct.
-
R. F. Schaefer and H. V. Poor, "On secure communication over multiple access wiretap channels under channel uncertainty," in Proc. IEEE Conf. Commun. Netw. Security Workshops, San Francisco, CA, USA, Oct. 2014, pp. 109-114.
-
(2014)
Proc. IEEE Conf. Commun. Netw. Security Workshops
, pp. 109-114
-
-
Schaefer, R.F.1
Poor, H.V.2
-
51
-
-
84906996654
-
Compound multiple access channel with confidential messages
-
Sydney, Australia, Jun.
-
H. Zivari-Fard, B. Akhbari, M. Ahmadian-Attari, and M. R. Aref, "Compound multiple access channel with confidential messages," in Proc. IEEE Int. Conf. Commun., Sydney, Australia, Jun. 2014, pp. 1922-1927.
-
(2014)
Proc. IEEE Int. Conf. Commun.
, pp. 1922-1927
-
-
Zivari-Fard, H.1
Akhbari, B.2
Ahmadian-Attari, M.3
Aref, M.R.4
-
52
-
-
12444299059
-
The private classical capacity and quantum capacity of a quantum channel
-
Jan.
-
I. Devetak, "The private classical capacity and quantum capacity of a quantum channel," IEEE Trans. Inf. Theory, vol. 51, no. 1, pp. 44-55, Jan. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.1
, pp. 44-55
-
-
Devetak, I.1
-
53
-
-
84889587094
-
Strong secrecy from channel resolvability
-
Dec.
-
M. R. Bloch and J. N. Laneman, "Strong secrecy from channel resolvability," IEEE Trans. Inf. Theory, vol. 59, no. 12, pp. 8077-8098, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.12
, pp. 8077-8098
-
-
Bloch, M.R.1
Laneman, J.N.2
-
54
-
-
84906555227
-
Effective secrecy: Reliability, confusion, and stealth
-
Honolulu, HI, USA, Jun.
-
J. Hou and G. Kramer, "Effective secrecy: Reliability, confusion, and stealth," in Proc. IEEE Int. Symp. Inf. Theory, Honolulu, HI, USA, Jun. 2014, pp. 601-605.
-
(2014)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 601-605
-
-
Hou, J.1
Kramer, G.2
-
55
-
-
0020993571
-
A simplified treatment of Wyners wire-tap channel
-
Control and Computing, Monticello, IL, USA, Oct.
-
J. L.Massey, "A simplified treatment of Wyners wire-tap channel," in Proc. 21st Allerton Conf. on Comm., Control and Computing, Monticello, IL, USA, Oct. 1983, pp. 268-276.
-
(1983)
Proc. 21st Allerton Conf. on Comm.
, pp. 268-276
-
-
Massey, J.L.1
-
58
-
-
0003868104
-
-
3rd ed., New York, NY, USA: Springer-Verlag
-
J. Wolfowitz, Coding Theorems of Information Theory 3rd ed.,, New York, NY, USA: Springer-Verlag, 1978.
-
(1978)
Coding Theorems of Information Theory
-
-
Wolfowitz, J.1
-
59
-
-
33747452907
-
A note on the existence of the weak capacity for channels with arbitrarily varying channel probability functions and its relation to Shannon's zero error capacity
-
R. Ahlswede, "A note on the existence of the weak capacity for channels with arbitrarily varying channel probability functions and its relation to Shannon's zero error capacity," Ann. Math. Stat., vol. 41, no. 3, pp. 1027-1033, 1970.
-
(1970)
Ann. Math. Stat.
, vol.41
, Issue.3
, pp. 1027-1033
-
-
Ahlswede, R.1
-
60
-
-
0031143282
-
Rate-distortion theory for the Shannon cipher system
-
May
-
H. Yamamoto, "Rate-distortion theory for the Shannon cipher system," IEEE Trans. Inf. Theory, vol. 43, no. 3, pp. 827-835,May 1997.
-
(1997)
IEEE Trans. Inf. Theory
, vol.43
, Issue.3
, pp. 827-835
-
-
Yamamoto, H.1
-
61
-
-
45249086542
-
Shannon's secrecy system with informed receivers and its application to systematic coding for wiretapped channels
-
Jun.
-
N. Merhav, "Shannon's secrecy system with informed receivers and its application to systematic coding for wiretapped channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2723-2734, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2723-2734
-
-
Merhav, N.1
-
62
-
-
80051921757
-
Wiretap channel with shared key
-
Dublin, Ireland, Aug.
-
W. Kang and N. Liu, "Wiretap channel with shared key," in Proc. IEEE Inf. Theory Workshop, Dublin, Ireland, Aug. 2010, pp. 1-5.
-
(2010)
Proc. IEEE Inf. Theory Workshop
, pp. 1-5
-
-
Kang, W.1
Liu, N.2
-
63
-
-
84901438691
-
Secure broadcasting of a common message with independent secret keys
-
Princeton, NJ, USA, Mar.
-
R. F. Schaefer and A. Khisti, "Secure broadcasting of a common message with independent secret keys," in Proc. Conf. Inf. Sciences and Systems, Princeton, NJ, USA, Mar. 2014, pp. 1-6.
-
(2014)
Proc. Conf. Inf. Sciences and Systems
, pp. 1-6
-
-
Schaefer, R.F.1
Khisti, A.2
-
64
-
-
84969795533
-
How to use independent secret keys for secure broadcasting of common messages
-
Hong Kong, China, Jun.
-
R. F. Schaefer, A. Khisti, and H. V. Poor, "How to use independent secret keys for secure broadcasting of common messages," in Proc. IEEE Int. Symp. Inf. Theory, Hong Kong, China, Jun. 2015, pp. 1971-1975.
-
(2015)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1971-1975
-
-
Schaefer, R.F.1
Khisti, A.2
Poor, H.V.3
-
65
-
-
84938009281
-
The zero error capacity of a noisy channel
-
Sep.
-
C. E. Shannon, "The zero error capacity of a noisy channel," IRE Trans. Inf. Theory, vol. 2, no. 3, pp. 8-19, Sep. 1956.
-
(1956)
IRE Trans. Inf. Theory
, vol.2
, Issue.3
, pp. 8-19
-
-
Shannon, C.E.1
-
66
-
-
0032411859
-
The Shannon capacity of a union
-
Mar.
-
N. Alon, "The Shannon capacity of a union," Combinatorica, vol. 18, no. 3, pp. 301-310, Mar. 1998.
-
(1998)
Combinatorica
, vol.18
, Issue.3
, pp. 301-310
-
-
Alon, N.1
|