메뉴 건너뛰기




Volumn 13, Issue 2-3, 2016, Pages 129-275

Multiterminal secrecy by public discussion

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION THEORY; RANDOM PROCESSES; TREES (MATHEMATICS);

EID: 84989922308     PISSN: 15672190     EISSN: 15672328     Source Type: Journal    
DOI: 10.1561/0100000072     Document Type: Article
Times cited : (35)

References (104)
  • 1
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography-part i: Secret sharing
    • July
    • R. Ahlswede and I. Csiszár. Common randomness in information theory and cryptography-Part I: Secret sharing. IEEE Trans. Inf. Theory, 39(4):1121-1132, July 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 2
    • 0031701886 scopus 로고    scopus 로고
    • Common randomness in information theory and cryptography-part II: Cr capacity
    • January
    • R. Ahlswede and I. Csiszár. Common randomness in information theory and cryptography-Part II: CR capacity. IEEE Trans. Inf. Theory, 44(1):225-240, January 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.1 , pp. 225-240
    • Ahlswede, R.1    Csiszár, I.2
  • 4
    • 34547436257 scopus 로고    scopus 로고
    • A sharp fannes-Type inequality for the von neumann entropy
    • arXiv:quant-ph/0610146
    • K. Audenaert. A sharp Fannes-Type inequality for the von Neumann entropy. Physical Review A, 40:8127-8136, 2007. arXiv:quant-ph/0610146.
    • (2007) Physical Review A , vol.40 , pp. 8127-8136
    • Audenaert, K.1
  • 7
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • C. H. Bennett, G. Brassard, and J.-M. Robert. Privacy amplification by public discussion. SIAM J. Comput., 17(2):210-229, 1988.
    • (1988) SIAM J. Comput , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 9
    • 0036818574 scopus 로고    scopus 로고
    • Multipartite classical and quantum secrecy monotones
    • October
    • N.J. Cerf, S. Massar, and S. Schneider. Multipartite classical and quantum secrecy monotones. Physical Review A, 66(4):042309, October 2002.
    • (2002) Physical Review A , vol.66 , Issue.4 , pp. 042309
    • Cerf, N.J.1    Massar, S.2    Schneider, S.3
  • 11
    • 83655191085 scopus 로고    scopus 로고
    • Linear perfect secret key agreement
    • October
    • C. Chan. Linear perfect secret key agreement. In Proc. Information Theory Workshop (ITW), pages 723-726, October 2011.
    • (2011) Proc. Information Theory Workshop (ITW) , pp. 723-726
    • Chan, C.1
  • 14
    • 84976384048 scopus 로고    scopus 로고
    • Coded cooperative data exchange for a secret key
    • July
    • T.A. Courtade and T.R. Halford. Coded cooperative data exchange for a secret key. IEEE Trans. Inf. Theory, 62(7):3785-3795, July 2016.
    • (2016) IEEE Trans. Inf. Theory , vol.62 , Issue.7 , pp. 3785-3795
    • Courtade, T.A.1    Halford, T.R.2
  • 16
    • 0029706655 scopus 로고    scopus 로고
    • Almost independence and secrecy capacity
    • I. Csiszár. Almost independence and secrecy capacity. Prob. Pered. Inform., 32(1):48-57, 1996.
    • (1996) Prob. Pered. Inform , vol.32 , Issue.1 , pp. 48-57
    • Csiszár, I.1
  • 17
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I Csiszár and J. Körner. Broadcast channels with confidential messages. IEEE Trans. Inf. Theory, 24(3):339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 18
    • 0018996344 scopus 로고
    • Towards a general theory of source networks
    • March
    • I. Csiszár and J. Körner. Towards a general theory of source networks. IEEE Trans. Inf. Theory, 26(2):155-165, March 1980.
    • (1980) IEEE Trans. Inf. Theory , vol.26 , Issue.2 , pp. 155-165
    • Csiszár, I.1    Körner, J.2
  • 19
    • 84924446122 scopus 로고    scopus 로고
    • Information theory: Coding theorems for discrete memoryless channels
    • University Press
    • I. Csiszár and J. Körner. Information theory: Coding theorems for discrete memoryless channels. 2nd edition. Cambridge University Press, 2011.
    • (2011) 2nd Edition. Cambridge
    • Csiszár, I.1    Körner, J.2
  • 20
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • March
    • I. Csiszár and P. Narayan. Common randomness and secret key generation with a helper. IEEE Trans. Inf. Theory, 46(2):344-366, March 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.2 , pp. 344-366
    • Csiszár, I.1    Narayan, P.2
  • 21
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • December
    • I. Csiszár and P. Narayan. Secrecy capacities for multiple terminals. IEEE Trans. Inf. Theory, 50(12):3047-3061, December 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 22
    • 45249104852 scopus 로고    scopus 로고
    • Secrecy capacities for multiterminal channel models
    • June
    • I. Csiszár and P. Narayan. Secrecy capacities for multiterminal channel models. IEEE Trans. Inf. Theory, 54(6):2437-2452, June 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2437-2452
    • Csiszár, I.1    Narayan, P.2
  • 23
    • 84871761173 scopus 로고    scopus 로고
    • Secrecy generation for multiaccess channel models
    • January
    • I. Csiszár and P. Narayan. Secrecy generation for multiaccess channel models. IEEE Trans. Inf. Theory, 59(1):17-31, January 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.1 , pp. 17-31
    • Csiszár, I.1    Narayan, P.2
  • 24
    • 84908224692 scopus 로고    scopus 로고
    • On the conditional Rényi entropy
    • November
    • S. Fehr and S. Berens. On the conditional Rényi entropy. IEEE Trans. Inf. Theory, 60(11):6801-6810, November 2014.
    • (2014) IEEE Trans. Inf. Theory , vol.60 , Issue.11 , pp. 6801-6810
    • Fehr, S.1    Berens, S.2
  • 25
    • 35048830930 scopus 로고    scopus 로고
    • Pseudo-signatures broadcast, and multi-party computation from correlated randomness
    • Berlin, Heidelberg
    • M. Fitzi, S. Wolf, and J. Wullschleger. Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness, pages 562-578. Springer Berlin Heidelberg, Berlin, Heidelberg, 2004.
    • (2004) Springer Berlin Heidelberg , pp. 562-578
    • Fitzi, M.1    Wolf, S.2    Wullschleger, J.3
  • 28
    • 77954600460 scopus 로고    scopus 로고
    • Information-Theoretic key agreement of multiple terminals-Part i
    • August
    • A. A. Gohari and V. Anantharam. Information-Theoretic key agreement of multiple terminals-Part I. IEEE Trans. Inf. Theory, 56(8):3973-3996, August 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3973-3996
    • Gohari, A.A.1    Anantharam, V.2
  • 29
    • 77954570193 scopus 로고    scopus 로고
    • Information-Theoretic key agreement of multiple terminals-Part II: Channel model
    • August
    • A. A. Gohari and V. Anantharam. Information-Theoretic key agreement of multiple terminals-Part II: Channel model. IEEE Trans. Inf. Theory, 56(8):3997-4010, August 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3997-4010
    • Gohari, A.A.1    Anantharam, V.2
  • 32
    • 84906543932 scopus 로고    scopus 로고
    • The capacity region of the source-Type model for secret key and private key generation
    • October
    • Y. Liang H. Zhang, L. lai and H. Wang. The capacity region of the source-Type model for secret key and private key generation. IEEE Trans. Inf. Theory, 60(10):6389-6398, October 2014.
    • (2014) IEEE Trans. Inf. Theory , vol.60 , Issue.10 , pp. 6389-6398
    • Liang, Y.1    Zhang, H.2    Lai, L.3    Wang, H.4
  • 34
    • 0019013156 scopus 로고
    • A unified achievable rate region for a general class of multiterminal source coding systems
    • May
    • T. S. Han and K. Kobayashi. A unified achievable rate region for a general class of multiterminal source coding systems. IEEE Trans. Inf. Theory, 26(3):277-288, May 1980.
    • (1980) IEEE Trans. Inf. Theory , vol.26 , Issue.3 , pp. 277-288
    • Han, T.S.1    Kobayashi, K.2
  • 35
    • 0027602480 scopus 로고
    • Approximation theory of output statistics
    • May
    • T. S. Han and S. Verdú. Approximation theory of output statistics. IEEE Trans. Inf. Theory, 39(3):752-772, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 752-772
    • Han, T.S.1    Verdú, S.2
  • 37
    • 79957636296 scopus 로고    scopus 로고
    • Exponential decreasing rate of leaked information in universal random privacy amplification
    • June
    • M. Hayashi. Exponential decreasing rate of leaked information in universal random privacy amplification. IEEE Trans. Inf. Theory, 57(6):3989-4001, June 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.6 , pp. 3989-4001
    • Hayashi, M.1
  • 39
    • 84976504932 scopus 로고    scopus 로고
    • Secret key agreement: General capacity and second-order asymptotics
    • May
    • M. Hayashi, H. Tyagi, and S. Watanabe. Secret key agreement: General capacity and second-order asymptotics. IEEE Trans. Inf. Theory, 62(7), May 2016.
    • (2016) IEEE Trans. Inf. Theory , vol.62 , pp. 7
    • Hayashi, M.1    Tyagi, H.2    Watanabe, S.3
  • 44
    • 0022149454 scopus 로고
    • Two-way source coding with a fidelity criterion
    • November
    • A. H. Kaspi. Two-way source coding with a fidelity criterion. IEEE Trans. Inf. Theory, 31(6):735-740, November 1985.
    • (1985) IEEE Trans. Inf. Theory , vol.31 , Issue.6 , pp. 735-740
    • Kaspi, A.H.1
  • 47
    • 69449101829 scopus 로고    scopus 로고
    • The operational meaning of min-And max-entropy
    • September
    • R. Konig, R. Renner, and C. Schaffner. The operational meaning of min-And max-entropy. IEEE Trans. Inf. Theory, 55(9):4337-4347, September 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.9 , pp. 4337-4347
    • Konig, R.1    Renner, R.2    Schaffner, C.3
  • 50
    • 85052441302 scopus 로고    scopus 로고
    • Common randomness and key generation with limited interaction
    • J. Liu, P. Cuff, and S. Verdú. Common randomness and key generation with limited interaction. CoRR, abs/1601.00899v2, 2016.
    • (2016) CoRR, abs/1601.00899v2
    • Liu, J.1    Cuff, P.2    Verdú, S.3
  • 51
    • 77957602848 scopus 로고    scopus 로고
    • Information inequalities for joint distributions, with interpretations and applications
    • June
    • M. Madiman and P. Tetali. Information inequalities for joint distributions, with interpretations and applications. IEEE Trans. Inf. Theory, 56(6):2699-2713, June 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.6 , pp. 2699-2713
    • Madiman, M.1    Tetali, P.2
  • 52
    • 0024012644 scopus 로고
    • An introduction to contemporary cryptology
    • J. L. Massey. An introduction to contemporary cryptology. Proc.The IEEE, 76(5):533-549, 1988.
    • (1988) Proc.The IEEE , vol.76 , Issue.5 , pp. 533-549
    • Massey, J.L.1
  • 53
    • 68349100488 scopus 로고
    • Provably secure key distribution based on independent channels
    • June
    • U. M. Maurer. Provably secure key distribution based on independent channels. IEEE Information Theory Workshop (ITW), pages 49-71, June 1990.
    • (1990) IEEE Information Theory Workshop (ITW) , pp. 49-71
    • Maurer, U.M.1
  • 54
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer. Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory, 39(3):733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 55
    • 84989917733 scopus 로고    scopus 로고
    • Bounds on the communication rate needed to achieve SK capacity in the hypergraphical source model
    • M. Mukherjee, C. Chan, N. Kashyap, and Q. Zhou. Bounds on the communication rate needed to achieve SK capacity in the hypergraphical source model. CoRR, arXiv:1601.05377v2, 2016.
    • (2016) CoRR arXiv:1601.05377v2
    • Mukherjee, M.1    Chan, C.2    Kashyap, N.3    Zhou, Q.4
  • 56
    • 84906536499 scopus 로고    scopus 로고
    • On the communication complexity of secret key generation in the multiterminal source model
    • June
    • M. Mukherjee and N. Kashyap. On the communication complexity of secret key generation in the multiterminal source model. Proc. IEEE Symposium on Information Theory, June 2014.
    • (2014) Proc IEEE Symposium on Information Theory
    • Mukherjee, M.1    Kashyap, N.2
  • 57
    • 84989901967 scopus 로고    scopus 로고
    • On the public communication needed to achieve SK capacity in the multiterminal source model
    • M. Mukherjee, N. Kashyap, and Y. Sankarasubramaniam. On the public communication needed to achieve SK capacity in the multiterminal source model. CoRR, abs/1507.02874, 2015.
    • (2015) CoRR, abs/1507.02874
    • Mukherjee, M.1    Kashyap, N.2    Sankarasubramaniam, Y.3
  • 59
    • 78649383176 scopus 로고    scopus 로고
    • Perfect omniscience, perfect secrecy, and steiner tree packing
    • December
    • S. Nitinawarat and P. Narayan. Perfect omniscience, perfect secrecy, and Steiner tree packing. IEEE Trans. Inform. Theory, 56(12):6490-6500, December 2010.
    • (2010) IEEE Trans. Inform. Theory , vol.56 , Issue.12 , pp. 6490-6500
    • Nitinawarat, S.1    Narayan, P.2
  • 60
    • 84861398796 scopus 로고    scopus 로고
    • Secret key generation for correlated Gaussian sources
    • June
    • S. Nitinawarat and P. Narayan. Secret key generation for correlated Gaussian sources. IEEE Trans. Inf. Theory, 58(6):3373-3391, June 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.6 , pp. 3373-3391
    • Nitinawarat, S.1    Narayan, P.2
  • 61
    • 78649346776 scopus 로고    scopus 로고
    • Secret key generation for a pairwise independent network model
    • December
    • S. Nitinawarat, C. Ye, A. Barg, P. Narayan, and A. Reznik. Secret key generation for a pairwise independent network model. IEEE Trans. Inform. Theory, 56(12):6482-6489, December 2010.
    • (2010) IEEE Trans. Inform. Theory , vol.56 , Issue.12 , pp. 6482-6489
    • Nitinawarat, S.1    Ye, C.2    Barg, A.3    Narayan, P.4    Reznik, A.5
  • 62
    • 0025486359 scopus 로고
    • Worst-case interactive communication I: Two messages are almost optimal
    • September
    • A. Orlitsky. Worst-case interactive communication I: Two messages are almost optimal. IEEE Trans. Inf. Theory, 36(5):1111-1126, September 1990.
    • (1990) IEEE Trans. Inf. Theory , vol.36 , Issue.5 , pp. 1111-1126
    • Orlitsky, A.1
  • 65
    • 84959483105 scopus 로고    scopus 로고
    • Secure communications via physical-layer and information-Theoretic techniques
    • October
    • P. A. Regalia, A. Khisti, Y. Liang, and S. Tomasin (editors). Secure communications via physical-layer and information-Theoretic techniques. Proc.The IEEE, 103(10), October 2015.
    • (2015) Proc.The IEEE , vol.103 , pp. 10
    • Regalia, P.A.1    Khisti, A.2    Liang, Y.3    Tomasin, S.4
  • 71
    • 0021469810 scopus 로고
    • Generating quasi-random sequences from semi-random sources
    • M. Santha and U. V. Vazirani. Generating quasi-random sequences from semi-random sources. Journal of Computer and System Sciences, 33(1):75-87, 1986.
    • (1986) Journal of Computer and System Sciences , vol.33 , Issue.1 , pp. 75-87
    • Santha, M.1    Vazirani, U.V.2
  • 72
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • October
    • C. E. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28:656-715, October 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 73
    • 77949627434 scopus 로고    scopus 로고
    • Secure source coding with a helper
    • Control, and Computing (Allerton) October
    • R. Tandon, S. Ulukus, and K. Ramchandran. Secure source coding with a helper. Proc. Conference on Communication, Control, and Computing (Allerton), pages 1061-1068, October 2009.
    • (2009) Proc. Conference on Communication , pp. 1061-1068
    • Tandon, R.1    Ulukus, S.2    Ramchandran, K.3
  • 75
    • 84882989241 scopus 로고    scopus 로고
    • Common information and secret key capacity
    • September
    • H. Tyagi. Common information and secret key capacity. IEEE Trans. Inf. Theory, 59(9):5627-5640, September 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.9 , pp. 5627-5640
    • Tyagi, H.1
  • 77
    • 84875585656 scopus 로고    scopus 로고
    • Distributed function computation with confidentiality
    • April
    • H. Tyagi. Distributed function computation with confidentiality. IEEE Journal on Selected Areas in Communications, 31(4):691-701, April 2013.
    • (2013) IEEE Journal on Selected Areas in Communications , vol.31 , Issue.4 , pp. 691-701
    • Tyagi, H.1
  • 79
    • 84882971734 scopus 로고    scopus 로고
    • How many queries will resolve common randomness?
    • September
    • H. Tyagi and P. Narayan. How many queries will resolve common randomness? IEEE Trans. Inf. Theory, 59(9):5363-5378, September 2013
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.9 , pp. 5363-5378
    • Tyagi, H.1    Narayan, P.2
  • 83
    • 80053961199 scopus 로고    scopus 로고
    • When is a function securely computable?
    • October
    • H. Tyagi, P. Narayan, and P. Gupta. When is a function securely computable? IEEE Trans. Inf. Theory, 57(10):6337-6350, October 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.10 , pp. 6337-6350
    • Tyagi, H.1    Narayan, P.2    Gupta, P.3
  • 87
    • 84939864518 scopus 로고    scopus 로고
    • Converses for secret key agreement and secure computing
    • September
    • H. Tyagi and S. Watanabe. Converses for secret key agreement and secure computing. IEEE Trans. Inf. Theory, 61:4809-4827, September 2015.
    • (2015) IEEE Trans. Inf. Theory , vol.61 , pp. 4809-4827
    • Tyagi, H.1    Watanabe, S.2
  • 89
    • 0029375649 scopus 로고
    • Generating random bits from an arbitrary source: Fundamental limits
    • Sep
    • S. Vembu and S. Verdú. Generating random bits from an arbitrary source: Fundamental limits. IEEE Trans. Inf. Theory, 41(5):1322-1332, Sep. 1995.
    • (1995) IEEE Trans. Inf. Theory , vol.41 , Issue.5 , pp. 1322-1332
    • Vembu, S.1    Verdú, S.2
  • 92
    • 80051770683 scopus 로고    scopus 로고
    • Secret key agreement from vector Gaussian sources by rate limited public communication
    • IEEE Transactions on September
    • S. Watanabe and Y. Oohama. Secret key agreement from vector Gaussian sources by rate limited public communication. Information Forensics and Security, IEEE Transactions on, 6(3):541-550, September 2011.
    • (2011) Information Forensics and Security , vol.6 , Issue.3 , pp. 541-550
    • Watanabe, S.1    Oohama, Y.2
  • 94
    • 84901321090 scopus 로고    scopus 로고
    • On the efficiency of classical and quantum secure function evaluation
    • June
    • S. Winkler and J. Wullschleger. On the efficiency of classical and quantum secure function evaluation. IEEE Trans. Inf. Theory, 60(6):3123-3143, June 2014.
    • (2014) IEEE Trans. Inf. Theory , vol.60 , Issue.6 , pp. 3123-3143
    • Winkler, S.1    Wullschleger, J.2
  • 96
    • 45249110618 scopus 로고    scopus 로고
    • New monotones and lower bounds in unconditional two-party computation
    • June
    • S. Wolf and J. Wullschleger. New monotones and lower bounds in unconditional two-party computation. IEEE Trans. Inf. Theory, 54(6):2792-2797, June 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2792-2797
    • Wolf, S.1    Wullschleger, J.2
  • 97
    • 0015992185 scopus 로고
    • Recent results in the shannon theory
    • January
    • A. D. Wyner. Recent results in the Shannon theory. IEEE Trans. Inf. Theory, 20(1):2-10, January 1974.
    • (1974) IEEE Trans. Inf. Theory , vol.20 , Issue.1 , pp. 2-10
    • Wyner, A.D.1
  • 98
    • 0016562514 scopus 로고
    • The wiretap channel
    • October
    • A. D. Wyner. The wiretap channel. Bell System Technical Journal, 54(8):1355-1367, October 1975.
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1367
    • Wyner, A.D.1
  • 99
    • 0036611983 scopus 로고    scopus 로고
    • Communicating via a processing broadcast satellite
    • June
    • A. D. Wyner, J. K. Wolf, and F. M. J. Willems. Communicating via a processing broadcast satellite. IEEE Trans. Inf. Theory, 48(6):1243-1249, June 2002.
    • (2002) IEEE Trans. Inf. Theory , vol.48 , Issue.6 , pp. 1243-1249
    • Wyner, A.D.1    Wolf, J.K.2    Willems, F.M.J.3
  • 100
    • 85039623622 scopus 로고
    • Some complexity questions related to distributive computing
    • A. C. Yao. Some complexity questions related to distributive computing. Proc. Annual Symposium on Theory of Computing, pages 209-213, 1979.
    • (1979) Proc. Annual Symposium on Theory of Computing , pp. 209-213
    • Yao, A.C.1
  • 102
    • 84856830966 scopus 로고    scopus 로고
    • Secret key and private key constructions for simple multiterminal source models
    • February
    • C. Ye and P. Narayan. Secret key and private key constructions for simple multiterminal source models. IEEE Trans. Inf. Theory, 58(2):639-651, February 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.2 , pp. 639-651
    • Ye, C.1    Narayan, P.2
  • 104
    • 54349100649 scopus 로고    scopus 로고
    • Estimating mutual information via Kolmogorov distance
    • September
    • Z. Zhang. Estimating mutual information via Kolmogorov distance. IEEE Trans. Inf. Theory, 53(9):3280-3282, September 2007
    • (2007) IEEE Trans. Inf. Theory , vol.53 , Issue.9 , pp. 3280-3282
    • Zhang, Z.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.