-
1
-
-
84969822817
-
A channel resolvability perspective on stealth communications
-
Jun.
-
M. Bloch, "A channel resolvability perspective on stealth communications," in Proc. IEEE Int. Symp. Inf. Theory, Hong Kong, Jun. 2015, pp. 2535-2539.
-
(2015)
Proc IEEE Int. Symp. Inf. Theory, Hong Kong
, pp. 2535-2539
-
-
Bloch, M.1
-
2
-
-
84883395039
-
Limits of reliable communication with low probability of detection on AWGN channels
-
Sep.
-
B. A. Bash, D. Goeckel, D. Towsley, "Limits of reliable communication with low probability of detection on AWGN channels," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1921-1930, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1921-1930
-
-
Bash, B.A.1
Goeckel, D.2
Towsley, D.3
-
3
-
-
84945231932
-
Quantum-secure covert communication on bosonic channels
-
Oct.
-
B. A. Bash et al., "Quantum-secure covert communication on bosonic channels," Nature Commun., vol. 6, p. 8626, Oct. 2015.
-
(2015)
Nature Commun.
, vol.6
, pp. 8626
-
-
Bash, B.A.1
-
4
-
-
84969750122
-
Limits of low-probabilityof-detection communication over a discrete memoryless channel
-
Jun.
-
L. Wang, G. W. Wornell, L. Zheng, "Limits of low-probabilityof-detection communication over a discrete memoryless channel," in Proc. IEEE Int. Symp. Inf. Theory, Hong Kong, Jun. 2015, pp. 2525-2529.
-
(2015)
Proc IEEE Int. Symp. Inf. Theory, Hong Kong
, pp. 2525-2529
-
-
Wang, L.1
Wornell, G.W.2
Zheng, L.3
-
6
-
-
34547881527
-
A capacity result for batch steganography
-
Aug.
-
A. D. Ker, "A capacity result for batch steganography," IEEE Signal Process. Lett., vol. 14, no. 8, pp. 525-528, Aug. 2007.
-
(2007)
IEEE Signal Process. Lett.
, vol.14
, Issue.8
, pp. 525-528
-
-
Ker, A.D.1
-
7
-
-
84890389514
-
Reliable deniable communication: Hiding messages in noise
-
Jul.
-
P. H. Che, M. Bakshi, S. Jaggi, "Reliable deniable communication: Hiding messages in noise," in Proc. IEEE Int. Symp. Inf. Theory, Istanbul, Turkey, Jul. 2013, pp. 2945-2949.
-
(2013)
Proc IEEE Int. Symp. Inf. Theory, Istanbul, Turkey
, pp. 2945-2949
-
-
Che, P.H.1
Bakshi, M.2
Jaggi, S.3
-
8
-
-
84901217809
-
Reliable, deniable and hidable communication
-
Feb.
-
P. H. Che, M. Bakshi, C. Chan, S. Jaggi, "Reliable, deniable and hidable communication," in Proc. Inf. Theory Appl. Workshop, San Diego, CA, USA, Feb. 2014, pp. 1-10.
-
(2014)
Proc. Inf. Theory Appl. Workshop, San Diego, CA, USA
, pp. 1-10
-
-
Che, P.H.1
Bakshi, M.2
Chan, C.3
Jaggi, S.4
-
9
-
-
84929346933
-
Reliable deniable communication with channel uncertainty
-
Nov.
-
P. H. Che, M. Bakshi, C. Chan, S. Jaggi, "Reliable deniable communication with channel uncertainty," in Proc. IEEE Inf. Theory Workshop, Hobart, TAS, Australia, Nov. 2014, pp. 30-34.
-
(2014)
Proc IEEE Inf. Theory Workshop, Hobart, TAS, Australia
, pp. 30-34
-
-
Che, P.H.1
Bakshi, M.2
Chan, C.3
Jaggi, S.4
-
10
-
-
84907388955
-
Achieving positive rate with undetectable communication over MIMO Rayleigh channels
-
Jun.
-
S. Lee, R. J. Baxley, J. B. McMahon, R. S. Frazier, "Achieving positive rate with undetectable communication Over MIMO Rayleigh channels," in Proc. IEEE 8th Sensor Array Multichannel Signal Process. Workshop, A Corunã, Spain, Jun. 2014, pp. 257-260.
-
(2014)
Proc IEEE 8th Sensor Array Multichannel Signal Process. Workshop, A Corunã, Spain
, pp. 257-260
-
-
Lee, S.1
Baxley, R.J.2
McMahon, J.B.3
Frazier, R.S.4
-
11
-
-
84906993920
-
Achieving positive rate with undetectable communication over AWGN and Rayleigh channels
-
Jun.
-
S. Lee and R. J. Baxley, "Achieving positive rate with undetectable communication over AWGN and Rayleigh channels," in Proc. IEEE Int. Conf. Commun., Sydney, NSW, Australia, Jun. 2014, pp. 780-785.
-
(2014)
Proc IEEE Int. Conf. Commun., Sydney, NSW, Australia
, pp. 780-785
-
-
Lee, S.1
Baxley, R.J.2
-
12
-
-
84942313011
-
Achieving undetectable communication
-
Oct.
-
S. Lee, R. J. Baxley, M. A. Weitnauer, B. Walkenhorst, "Achieving undetectable communication," IEEE J. Sel. Topics Signal Process., vol. 9, no. 7, pp. 1195-1205, Oct. 2015.
-
(2015)
IEEE J. Sel. Topics Signal Process.
, vol.9
, Issue.7
, pp. 1195-1205
-
-
Lee, S.1
Baxley, R.J.2
Weitnauer, M.A.3
Walkenhorst, B.4
-
13
-
-
84906542935
-
LPD communication when the warden does not know when
-
Jun./Jul.
-
B. A. Bash, D. Goeckel, D. Towsley, "LPD communication when the warden does not know when," in Proc. IEEE Int. Symp. Inf. Theory, Honolulu, HI, USA, Jun./Jul. 2014, pp. 606-610.
-
(2014)
Proc IEEE Int. Symp. Inf. Theory, Honolulu, HI, USA
, pp. 606-610
-
-
Bash, B.A.1
Goeckel, D.2
Towsley, D.3
-
14
-
-
84959322658
-
Covert communications when the warden does not know the background noise power
-
Feb.
-
D. Goeckel, B. Bash, S. Guha, D. Towsley, "Covert communications when the warden does not know the background noise power," IEEE Commun. Lett., vol. 20, no. 2, pp. 236-239, Feb. 2016.
-
(2016)
IEEE Commun. Lett.
, vol.20
, Issue.2
, pp. 236-239
-
-
Goeckel, D.1
Bash, B.2
Guha, S.3
Towsley, D.4
-
15
-
-
84906555227
-
Effective secrecy: Reliability, confusion and stealth
-
Jul.
-
J. Hou and G. Kramer, "Effective secrecy: Reliability, confusion and stealth," in Proc. IEEE Int. Symp. Inf. Theory, Honolulu, HI, USA, Jul. 2014, pp. 601-605.
-
(2014)
Proc IEEE Int. Symp. Inf. Theory, Honolulu, HI, USA
, pp. 601-605
-
-
Hou, J.1
Kramer, G.2
-
16
-
-
84889587094
-
Strong secrecy from channel resolvability
-
Dec.
-
M. R. Bloch and J. N. Laneman, "Strong secrecy from channel resolvability," IEEE Trans. Inf. Theory, vol. 59, no. 12, pp. 8077-8098, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.12
, pp. 8077-8098
-
-
Bloch, M.R.1
Laneman, J.N.2
-
17
-
-
84929359259
-
Reliable, deniable and hidable communication: A quick survey
-
Nov.
-
P. H. Che, S. Kadhe, M. Bakshi, C. Chan, S. Jaggi, A. Sprintson, "Reliable, deniable and hidable communication: A quick survey," in Proc. IEEE Inf. Theory Workshop, Hobart, TAS, Australia, Nov. 2014, pp. 227-231.
-
(2014)
Proc IEEE Inf. Theory Workshop, Hobart, TAS, Australia
, pp. 227-231
-
-
Che, P.H.1
Kadhe, S.2
Bakshi, M.3
Chan, C.4
Jaggi, S.5
Sprintson, A.6
-
18
-
-
84961773142
-
Hiding information in noise: Fundamental limits of covert wireless communication
-
Dec.
-
B. A. Bash, D. Goeckel, D. Towsley, S. Guha, "Hiding information in noise: Fundamental limits of covert wireless communication," IEEE Commun. Mag., vol. 53, no. 12, pp. 26-31, Dec. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.12
, pp. 26-31
-
-
Bash, B.A.1
Goeckel, D.2
Towsley, D.3
Guha, S.4
-
19
-
-
0347337828
-
Secure space-time communication
-
Dec.
-
A. O. Hero, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero, A.O.1
-
20
-
-
0027602480
-
Approximation theory of output statistics
-
May
-
T. S. Han and S. Verdú, "Approximation theory of output statistics," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 752-772, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 752-772
-
-
Han, T.S.1
Verdú, S.2
-
25
-
-
0028461972
-
A general formula for channel capacity
-
Jul.
-
S. Verdú and T. S. Han, "A general formula for channel capacity," IEEE Trans. Inf. Theory, vol. 40, no. 4, pp. 1147-1157, Jul. 1994.
-
(1994)
IEEE Trans. Inf. Theory
, vol.40
, Issue.4
, pp. 1147-1157
-
-
Verdú, S.1
Han, T.S.2
-
26
-
-
84886646972
-
Distributed channel synthesis
-
Nov.
-
P. Cuff, "Distributed channel synthesis," IEEE Trans. Inf. Theory, vol. 59, no. 11, pp. 7071-7096, Nov. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.11
, pp. 7071-7096
-
-
Cuff, P.1
-
27
-
-
84968931973
-
-
Ph.D. dissertation Faculty Electrotech. Informationstech., Technische Univ. München, Munich, Germany
-
J. Hou, "Coding for relay networks and effective secrecy for wiretap channels," Ph.D. dissertation, Faculty Electrotech. Informationstech., Technische Univ. München, Munich, Germany, 2014.
-
(2014)
Coding for Relay Networks and Effective Secrecy for Wiretap Channels
-
-
Hou, J.1
-
28
-
-
84865478919
-
Semantic security for the wiretap channel
-
R. Safavi-Naini and R. Canetti, Eds. Berlin, Germany: Springer
-
M. Bellare, S. Tessaro, A. Vardy, "Semantic security for the wiretap channel," in Advances in Cryptology (Lecture Notes in Computer Science), R. Safavi-Naini and R. Canetti, Eds., vol. 7417. Berlin, Germany: Springer, 2012, pp. 294-311.
-
(2012)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.7417
, pp. 294-311
-
-
Bellare, M.1
Tessaro, S.2
Vardy, A.3
-
29
-
-
84908252542
-
Reliability and secrecy functions of the wiretap channel under cost constraint
-
Nov.
-
T. S. Han, H. Endo, M. Sasaki, "Reliability and secrecy functions of the wiretap channel under cost constraint," IEEE Trans. Inf. Theory, vol. 60, no. 11, pp. 6819-6843, Nov. 2014.
-
(2014)
IEEE Trans. Inf. Theory
, vol.60
, Issue.11
, pp. 6819-6843
-
-
Han, T.S.1
Endo, H.2
Sasaki, M.3
-
30
-
-
81255188964
-
Noisy channel coding via privacy amplification and information reconciliation
-
Nov.
-
J. M. Renes and R. Renner, "Noisy channel coding via privacy amplification and information reconciliation," IEEE Trans. Inf. Theory, vol. 57, no. 11, pp. 7377-7385, Nov. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.11
, pp. 7377-7385
-
-
Renes, J.M.1
Renner, R.2
-
31
-
-
3042519430
-
An information-theoretic model for steganography
-
Jul.
-
C. Cachin, "An information-theoretic model for steganography," Inf. Comput., vol. 192, no. 1, pp. 41-56, Jul. 2004.
-
(2004)
Inf. Comput.
, vol.192
, Issue.1
, pp. 41-56
-
-
Cachin, C.1
-
32
-
-
0025952277
-
Divergence measures based on the Shannon entropy
-
Jan.
-
J. Lin, "Divergence measures based on the Shannon entropy," IEEE Trans. Inf. Theory, vol. 37, no. 1, pp. 145-151, Jan. 1991.
-
(1991)
IEEE Trans. Inf. Theory
, vol.37
, Issue.1
, pp. 145-151
-
-
Lin, J.1
-
33
-
-
77951624674
-
Channel coding rate in the finite blocklength regime
-
May
-
Y. Polyanskiy, H. V. Poor, S. Verdú, "Channel coding rate in the finite blocklength regime," IEEE Trans. Inf. Theory, vol. 56, no. 5, pp. 2307-2359, May 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.5
, pp. 2307-2359
-
-
Polyanskiy, Y.1
Poor, H.V.2
Verdú, S.3
|