-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. E. Shannon, "Communication Theory of Secrecy Systems, " Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The Wire-Tap Channel, " Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Information Theoretic Security, " Foundations and Trends in Communications and Information Theory, vol. 5, no. 4-5, pp. 355-580, 2009.
-
(2009)
Foundations and Trends in Communications and Information Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
5
-
-
0031143282
-
Rate-distortion theory for the shannon cipher system
-
May
-
H. Yamamoto, "Rate-Distortion Theory for the Shannon Cipher System, " IEEE Trans. Inf. Theory, vol. 43, no. 3, pp. 827-835, May 1997.
-
(1997)
IEEE Trans. Inf. Theory
, vol.43
, Issue.3
, pp. 827-835
-
-
Yamamoto, H.1
-
6
-
-
45249086542
-
Shannon's secrecy system with informed receivers and its application to systematic coding for wiretapped channels
-
Jun.
-
N. Merhav, "Shannon's Secrecy System with Informed Receivers and Its Application to Systematic Coding for Wiretapped Channels, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2723-2734, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2723-2734
-
-
Merhav, N.1
-
7
-
-
80051921757
-
Wiretap channel with shared key
-
Dublin, Ireland, Aug.
-
W. Kang and N. Liu, "Wiretap Channel with Shared Key, " in Proc. IEEE Inf. Theory Workshop, Dublin, Ireland, Aug. 2010, pp. 1-5.
-
(2010)
Proc. IEEE Inf. Theory Workshop
, pp. 1-5
-
-
Kang, W.1
Liu, N.2
-
8
-
-
84940473770
-
Robust transmission over wiretap channels with secret keys
-
Pacific Grove, CA, USA, Nov.
-
R. F. Schaefer and H. V. Poor, "Robust Transmission over Wiretap Channels with Secret Keys, " in Proc. Asilomar Conf. Signals, Systems, Computers, Pacific Grove, CA, USA, Nov. 2014, pp. 60-64.
-
(2014)
Proc. Asilomar Conf. Signals, Systems, Computers
, pp. 60-64
-
-
Schaefer, R.F.1
Poor, H.V.2
-
9
-
-
84901438691
-
Secure broadcasting of a common message with independent secret keys
-
Princeton, NJ, USA, Mar.
-
R. F. Schaefer and A. Khisti, "Secure Broadcasting of a Common Message with Independent Secret Keys, " in Proc. Conf. Inf. Sciences and Systems, Princeton, NJ, USA, Mar. 2014, pp. 1-6.
-
(2014)
Proc. Conf. Inf. Sciences and Systems
, pp. 1-6
-
-
Schaefer, R.F.1
Khisti, A.2
-
11
-
-
33846037665
-
An outer bound to the capacity region of the broadcast channel
-
Jan.
-
C. Nair and A. El Gamal, "An Outer Bound to the Capacity Region of the Broadcast Channel, " IEEE Trans. Inf. Theory, vol. 53, no. 1, pp. 350-355, Jan. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.1
, pp. 350-355
-
-
Nair, C.1
El Gamal, A.2
-
12
-
-
0018467629
-
A coding theorem for the discrete memoryless broadcast channel
-
May
-
K. Marton, "A Coding Theorem for the Discrete Memoryless Broadcast Channel, " IEEE Trans. Inf. Theory, vol. 25, no. 3, pp. 306-311, May 1979.
-
(1979)
IEEE Trans. Inf. Theory
, vol.25
, Issue.3
, pp. 306-311
-
-
Marton, K.1
-
13
-
-
84876274641
-
Secrecy results for compound wiretap channels
-
Mar.
-
I. Bjelakovíc, H. Boche, and J. Sommerfeld, "Secrecy Results for Compound Wiretap Channels, " Probl. Inf. Transmission, vol. 49, no. 1, pp. 73-98, Mar. 2013.
-
(2013)
Probl. Inf. Transmission
, vol.49
, Issue.1
, pp. 73-98
-
-
Bjelakovíc, I.1
Boche, H.2
Sommerfeld, J.3
-
14
-
-
84889587094
-
Strong secrecy from channel resolvability
-
Dec.
-
M. R. Bloch and J. N. Laneman, "Strong Secrecy from Channel Resolvability, " IEEE Trans. Inf. Theory, vol. 59, no. 12, pp. 8077-8098, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.12
, pp. 8077-8098
-
-
Bloch, M.R.1
Laneman, J.N.2
-
15
-
-
84906555227
-
Effective secrecy: Reliability, confusion, and stealth
-
Honolulu, HI, USA, Jun.
-
J. Hou and G. Kramer, "Effective Secrecy: Reliability, Confusion, and Stealth, " in Proc. IEEE Int. Symp. Inf. Theory, Honolulu, HI, USA, Jun. 2014, pp. 601-605.
-
(2014)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 601-605
-
-
Hou, J.1
Kramer, G.2
|