-
2
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec.
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
3
-
-
77954832847
-
On coding for cooperative data exchange
-
Jan.
-
S. El Rouayheb, A. Sprintson, P. Sadeghi, "On coding for cooperative data exchange," in Proc. IEEE Inf. Theory Workshop (ITW), Jan. 2010, pp. 1-5.
-
(2010)
Proc IEEE Inf. Theory Workshop (ITW)
, pp. 1-5
-
-
El Rouayheb, S.1
Sprintson, A.2
Sadeghi, P.3
-
4
-
-
84893441364
-
Coded cooperative data exchange in multihop networks
-
Feb.
-
T. A. Courtade and R. D. Wesel, "Coded cooperative data exchange in multihop networks," IEEE Trans. Inf. Theory, vol. 60, no. 2, pp. 1136-1158, Feb. 2014.
-
(2014)
IEEE Trans. Inf. Theory
, vol.60
, Issue.2
, pp. 1136-1158
-
-
Courtade, T.A.1
Wesel, R.D.2
-
5
-
-
77955680715
-
A randomized algorithm and performance bounds for coded cooperative data exchange
-
Jun.
-
A. Sprintson, P. Sadeghi, G. Booker, S. El Rouayheb, "A randomized algorithm and performance bounds for coded cooperative data exchange," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2010, pp. 1888-1892.
-
(2010)
Proc IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 1888-1892
-
-
Sprintson, A.1
Sadeghi, P.2
Booker, G.3
El Rouayheb, S.4
-
6
-
-
84885002139
-
Deterministic algorithm for coded cooperative data exchange
-
Nov.
-
A. Sprintson, P. Sadeghi, G. Booker, S. El Rouayheb, "Deterministic algorithm for coded cooperative data exchange," in Proc. ICST QShine, Nov. 2010, pp. 282-289.
-
(2010)
Proc. ICST QShine
, pp. 282-289
-
-
Sprintson, A.1
Sadeghi, P.2
Booker, G.3
El Rouayheb, S.4
-
7
-
-
79952393724
-
Efficient universal recovery in broadcast networks
-
Oct.
-
T. A. Courtade and R. D. Wesel, "Efficient universal recovery in broadcast networks," in Proc. 48th Annu. Allerton Conf. Commun., Control, Comput. (Allerton), Oct. 2010, pp. 1542-1549.
-
(2010)
Proc. 48th Annu. Allerton Conf. Commun., Control, Comput. (Allerton)
, pp. 1542-1549
-
-
Courtade, T.A.1
Wesel, R.D.2
-
8
-
-
84856078259
-
Weighted universal recovery, practical secrecy, an efficient algorithm for solving both
-
Sep.
-
T. A. Courtade and R. D. Wesel, "Weighted universal recovery, practical secrecy, an efficient algorithm for solving both," in Proc. 49th Annu. Allerton Conf. Commun., Control, Comput. (Allerton), Sep. 2011, pp. 1349-1357.
-
(2011)
Proc. 49th Annu. Allerton Conf. Commun., Control, Comput. (Allerton)
, pp. 1349-1357
-
-
Courtade, T.A.1
Wesel, R.D.2
-
9
-
-
84867506651
-
Coded cooperative data exchange problem for general topologies
-
Jul.
-
M. Gonen and M. Langberg, "Coded cooperative data exchange problem for general topologies," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2012, pp. 2606-2610.
-
(2012)
Proc IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 2606-2610
-
-
Gonen, M.1
Langberg, M.2
-
12
-
-
80053030424
-
A generalized model for cost and fairness analysis in coded cooperative data exchange
-
Beijing, China, Jul.
-
S. E. Tajbakhsh, P. Sadeghi, R. Shams, "A generalized model for cost and fairness analysis in coded cooperative data exchange," in Proc. Int. Symp. Netw. Coding (NetCod), Beijing, China, Jul. 2011, pp. 1-6.
-
(2011)
Proc. Int. Symp. Netw. Coding (NetCod)
, pp. 1-6
-
-
Tajbakhsh, S.E.1
Sadeghi, P.2
Shams, R.3
-
13
-
-
79955779122
-
An algorithm for cooperative data exchange with cost criterion
-
Feb.
-
D. Ozgul and A. Sprintson, "An algorithm for cooperative data exchange with cost criterion," in Proc. Inf. Theory Appl. Workshop (ITA), Feb. 2011, pp. 1-4.
-
(2011)
Proc. Inf. Theory Appl. Workshop (ITA)
, pp. 1-4
-
-
Ozgul, D.1
Sprintson, A.2
-
14
-
-
84897716972
-
Truthful and non-monetary mechanism for direct data exchange
-
Monticello, IL, USA, Oct.
-
I.-H. Hou, Y.-P. Hsu, A. Sprintson, "Truthful and non-monetary mechanism for direct data exchange," in Proc. 51st Annu. Allerton Conf. Commun., Control, Comput. (Allerton), Monticello, IL, USA, Oct. 2013, pp. 406-412.
-
(2013)
Proc. 51st Annu. Allerton Conf. Commun., Control, Comput. (Allerton)
, pp. 406-412
-
-
Hou, I.-H.1
Hsu, Y.-P.2
Sprintson, A.3
-
16
-
-
80054797796
-
-
Ph.D. dissertation Dept. Elect. Eng. Comput. Sci., Massachusetts Inst. Technol., Cambridge, MA, USA
-
C. Chan, "Generating secret in a network," Ph.D. dissertation, Dept. Elect. Eng. Comput. Sci., Massachusetts Inst. Technol., Cambridge, MA, USA, 2010.
-
(2010)
Generating Secret in A Network
-
-
Chan, C.1
-
18
-
-
84882989241
-
Common information and secret key capacity
-
Sep.
-
H. Tyagi, "Common information and secret key capacity," IEEE Trans. Inf. Theory, vol. 59, no. 9, pp. 5627-5640, Sep. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.9
, pp. 5627-5640
-
-
Tyagi, H.1
-
22
-
-
84959262661
-
Energy-efficient group key agreement for wireless networks
-
Oct.
-
T. R. Halford, T. A. Courtade, K. M. Chugg, X. Li, G. Thatte, "Energy-efficient group key agreement for wireless networks," IEEE Trans. Wireless Comms., vol. 14, no. 10, pp. 5552-5564, Oct. 2015.
-
(2015)
IEEE Trans. Wireless Comms.
, vol.14
, Issue.10
, pp. 5552-5564
-
-
Halford, T.R.1
Courtade, T.A.2
Chugg, K.M.3
Li, X.4
Thatte, G.5
-
23
-
-
20544473127
-
Polynomial time algorithms for multicast network code construction
-
Jun.
-
S. Jaggi et al., "Polynomial time algorithms for multicast network code construction," IEEE Trans. Inf. Theory, vol. 51, no. 6, pp. 1973-1982, Jun. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.6
, pp. 1973-1982
-
-
Jaggi, S.1
-
24
-
-
84928599979
-
An equivalence between network coding and index coding
-
M. Effros, S. El Rouayheb, M. Langberg. "An equivalence between network coding and index coding," IEEE Trans. Inf. Theory, vol. 61, no. 5, pp. 2478-2487, 2015.
-
(2015)
IEEE Trans. Inf. Theory
, vol.61
, Issue.5
, pp. 2478-2487
-
-
Effros, M.1
El Rouayheb, S.2
Langberg, M.3
-
25
-
-
57949107168
-
Broadcasting with side information
-
Oct.
-
N. Alon, E. Lubetzky, U. Stav, A. Weinstein, A. Hassidim, "Broadcasting with side information," in Proc. IEEE 49th Annu. IEEE Symp. Found. Comput. Sci. (FOCS), Oct. 2008, pp. 823-832.
-
(2008)
Proc IEEE 49th Annu. IEEE Symp. Found. Comput. Sci. (FOCS)
, pp. 823-832
-
-
Alon, N.1
Lubetzky, E.2
Stav, U.3
Weinstein, A.4
Hassidim, A.5
-
26
-
-
68249135283
-
Nonlinear index coding outperforming the linear optimum
-
Aug.
-
E. Lubetzky and U. Stav, "Nonlinear index coding outperforming the linear optimum," IEEE Trans. Inf. Theory, vol. 55, no. 8, pp. 3544-3551, Aug. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.8
, pp. 3544-3551
-
-
Lubetzky, E.1
Stav, U.2
-
27
-
-
84863334401
-
Lexicographic products and the power of non-linear network coding
-
Oct.
-
A. Blasiak, R. Kleinberg, E. Lubetzky, "Lexicographic products and the power of non-linear network coding," in Proc. IEEE 52nd Annu. Symp. Found. Comput. Sci. (FOCS), Oct. 2011, pp. 609-618.
-
(2011)
Proc IEEE 52nd Annu. Symp. Found. Comput. Sci. (FOCS)
, pp. 609-618
-
-
Blasiak, A.1
Kleinberg, R.2
Lubetzky, E.3
-
28
-
-
78649383176
-
Perfect omniscience, perfect secrecy, Steiner tree packing
-
Dec.
-
S. Nitinawarat and P. Narayan, "Perfect omniscience, perfect secrecy, Steiner tree packing," IEEE Trans. Inf. Theory, vol. 56, no. 12, pp. 6490-6500, Dec. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.12
, pp. 6490-6500
-
-
Nitinawarat, S.1
Narayan, P.2
-
29
-
-
84881100274
-
Edge-disjoint spanning trees of finite graphs
-
C. S. J. A. Nash-Williams, "Edge-disjoint spanning trees of finite graphs," J. London Math. Soc., vol. 1, no. 1, pp. 445-450, 1961.
-
(1961)
J. London Math. Soc.
, vol.1
, Issue.1
, pp. 445-450
-
-
Nash-Williams, C.S.J.A.1
-
30
-
-
84963041976
-
On the problem of decomposing a graph into n connected factors
-
W. T. Tutte, "On the problem of decomposing a graph into n connected factors," J. London Math. Soc., vol. 1, no. 1, pp. 221-230, 1961.
-
(1961)
J. London Math. Soc.
, vol.1
, Issue.1
, pp. 221-230
-
-
Tutte, W.T.1
-
32
-
-
84867537040
-
Fault-tolerant secret key generation
-
Jul.
-
H. Tyagi, N. Kashyap, Y. Sankarasubramaniam, K. Viswanathan, "Fault-tolerant secret key generation," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2012, pp. 1787-1791.
-
(2012)
Proc IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 1787-1791
-
-
Tyagi, H.1
Kashyap, N.2
Sankarasubramaniam, Y.3
Viswanathan, K.4
|