-
1
-
-
0027629488
-
Common randomness in information theory and cryptography-part i: Secret sharing
-
July
-
R. Ahlswede and I. Csiszár. Common randomness in information theory and cryptography-Part I: Secret sharing. IEEE Trans. Inf. Theory, 39(4):1121-1132, July 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
2
-
-
0031701886
-
Common randomness in information theory and cryptography-part II: Cr capacity
-
January
-
R. Ahlswede and I. Csiszár. Common randomness in information theory and cryptography-Part II: CR capacity. IEEE Trans. Inf. Theory, 44(1):225-240, January 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.1
, pp. 225-240
-
-
Ahlswede, R.1
Csiszár, I.2
-
4
-
-
34547436257
-
A sharp fannes-Type inequality for the von neumann entropy
-
arXiv:quant-ph/0610146
-
K. Audenaert. A sharp Fannes-Type inequality for the von Neumann entropy. Physical Review A, 40:8127-8136, 2007. arXiv:quant-ph/0610146.
-
(2007)
Physical Review A
, vol.40
, pp. 8127-8136
-
-
Audenaert, K.1
-
5
-
-
84865478919
-
-
Springer Berlin Heidelberg, Berlin, Heidelberg
-
M. Bellare, S. Tessaro, and A. Vardy. Semantic Security for the Wiretap Channel, pages 294-311. Springer Berlin Heidelberg, Berlin, Heidelberg, 2012.
-
(2012)
Semantic Security for the Wiretap Channel
, pp. 294-311
-
-
Bellare, M.1
Tessaro, S.2
Vardy, A.3
-
6
-
-
0029405656
-
Generalized privacy amplification
-
November
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer. Generalized privacy amplification. IEEE Trans. Inf. Theory, 41(6):1915-1923, November 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
7
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. Bennett, G. Brassard, and J.-M. Robert. Privacy amplification by public discussion. SIAM J. Comput., 17(2):210-229, 1988.
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
9
-
-
0036818574
-
Multipartite classical and quantum secrecy monotones
-
October
-
N.J. Cerf, S. Massar, and S. Schneider. Multipartite classical and quantum secrecy monotones. Physical Review A, 66(4):042309, October 2002.
-
(2002)
Physical Review A
, vol.66
, Issue.4
, pp. 042309
-
-
Cerf, N.J.1
Massar, S.2
Schneider, S.3
-
11
-
-
83655191085
-
Linear perfect secret key agreement
-
October
-
C. Chan. Linear perfect secret key agreement. In Proc. Information Theory Workshop (ITW), pages 723-726, October 2011.
-
(2011)
Proc. Information Theory Workshop (ITW)
, pp. 723-726
-
-
Chan, C.1
-
14
-
-
84976384048
-
Coded cooperative data exchange for a secret key
-
July
-
T.A. Courtade and T.R. Halford. Coded cooperative data exchange for a secret key. IEEE Trans. Inf. Theory, 62(7):3785-3795, July 2016.
-
(2016)
IEEE Trans. Inf. Theory
, vol.62
, Issue.7
, pp. 3785-3795
-
-
Courtade, T.A.1
Halford, T.R.2
-
16
-
-
0029706655
-
Almost independence and secrecy capacity
-
I. Csiszár. Almost independence and secrecy capacity. Prob. Pered. Inform., 32(1):48-57, 1996.
-
(1996)
Prob. Pered. Inform
, vol.32
, Issue.1
, pp. 48-57
-
-
Csiszár, I.1
-
17
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I Csiszár and J. Körner. Broadcast channels with confidential messages. IEEE Trans. Inf. Theory, 24(3):339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
18
-
-
0018996344
-
Towards a general theory of source networks
-
March
-
I. Csiszár and J. Körner. Towards a general theory of source networks. IEEE Trans. Inf. Theory, 26(2):155-165, March 1980.
-
(1980)
IEEE Trans. Inf. Theory
, vol.26
, Issue.2
, pp. 155-165
-
-
Csiszár, I.1
Körner, J.2
-
19
-
-
84924446122
-
Information theory: Coding theorems for discrete memoryless channels
-
University Press
-
I. Csiszár and J. Körner. Information theory: Coding theorems for discrete memoryless channels. 2nd edition. Cambridge University Press, 2011.
-
(2011)
2nd Edition. Cambridge
-
-
Csiszár, I.1
Körner, J.2
-
20
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
March
-
I. Csiszár and P. Narayan. Common randomness and secret key generation with a helper. IEEE Trans. Inf. Theory, 46(2):344-366, March 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.2
, pp. 344-366
-
-
Csiszár, I.1
Narayan, P.2
-
21
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
December
-
I. Csiszár and P. Narayan. Secrecy capacities for multiple terminals. IEEE Trans. Inf. Theory, 50(12):3047-3061, December 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
22
-
-
45249104852
-
Secrecy capacities for multiterminal channel models
-
June
-
I. Csiszár and P. Narayan. Secrecy capacities for multiterminal channel models. IEEE Trans. Inf. Theory, 54(6):2437-2452, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2437-2452
-
-
Csiszár, I.1
Narayan, P.2
-
23
-
-
84871761173
-
Secrecy generation for multiaccess channel models
-
January
-
I. Csiszár and P. Narayan. Secrecy generation for multiaccess channel models. IEEE Trans. Inf. Theory, 59(1):17-31, January 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.1
, pp. 17-31
-
-
Csiszár, I.1
Narayan, P.2
-
24
-
-
84908224692
-
On the conditional Rényi entropy
-
November
-
S. Fehr and S. Berens. On the conditional Rényi entropy. IEEE Trans. Inf. Theory, 60(11):6801-6810, November 2014.
-
(2014)
IEEE Trans. Inf. Theory
, vol.60
, Issue.11
, pp. 6801-6810
-
-
Fehr, S.1
Berens, S.2
-
25
-
-
35048830930
-
Pseudo-signatures broadcast, and multi-party computation from correlated randomness
-
Berlin, Heidelberg
-
M. Fitzi, S. Wolf, and J. Wullschleger. Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness, pages 562-578. Springer Berlin Heidelberg, Berlin, Heidelberg, 2004.
-
(2004)
Springer Berlin Heidelberg
, pp. 562-578
-
-
Fitzi, M.1
Wolf, S.2
Wullschleger, J.3
-
28
-
-
77954600460
-
Information-Theoretic key agreement of multiple terminals-Part i
-
August
-
A. A. Gohari and V. Anantharam. Information-Theoretic key agreement of multiple terminals-Part I. IEEE Trans. Inf. Theory, 56(8):3973-3996, August 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3973-3996
-
-
Gohari, A.A.1
Anantharam, V.2
-
29
-
-
77954570193
-
Information-Theoretic key agreement of multiple terminals-Part II: Channel model
-
August
-
A. A. Gohari and V. Anantharam. Information-Theoretic key agreement of multiple terminals-Part II: Channel model. IEEE Trans. Inf. Theory, 56(8):3997-4010, August 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3997-4010
-
-
Gohari, A.A.1
Anantharam, V.2
-
32
-
-
84906543932
-
The capacity region of the source-Type model for secret key and private key generation
-
October
-
Y. Liang H. Zhang, L. lai and H. Wang. The capacity region of the source-Type model for secret key and private key generation. IEEE Trans. Inf. Theory, 60(10):6389-6398, October 2014.
-
(2014)
IEEE Trans. Inf. Theory
, vol.60
, Issue.10
, pp. 6389-6398
-
-
Liang, Y.1
Zhang, H.2
Lai, L.3
Wang, H.4
-
34
-
-
0019013156
-
A unified achievable rate region for a general class of multiterminal source coding systems
-
May
-
T. S. Han and K. Kobayashi. A unified achievable rate region for a general class of multiterminal source coding systems. IEEE Trans. Inf. Theory, 26(3):277-288, May 1980.
-
(1980)
IEEE Trans. Inf. Theory
, vol.26
, Issue.3
, pp. 277-288
-
-
Han, T.S.1
Kobayashi, K.2
-
35
-
-
0027602480
-
Approximation theory of output statistics
-
May
-
T. S. Han and S. Verdú. Approximation theory of output statistics. IEEE Trans. Inf. Theory, 39(3):752-772, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 752-772
-
-
Han, T.S.1
Verdú, S.2
-
36
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
J. Hastad, R. Impagliazzo, L. A. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM Journal on Computing, 28:12-24, 1999.
-
(1999)
SIAM Journal on Computing
, vol.28
, pp. 12-24
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
37
-
-
79957636296
-
Exponential decreasing rate of leaked information in universal random privacy amplification
-
June
-
M. Hayashi. Exponential decreasing rate of leaked information in universal random privacy amplification. IEEE Trans. Inf. Theory, 57(6):3989-4001, June 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.6
, pp. 3989-4001
-
-
Hayashi, M.1
-
39
-
-
84976504932
-
Secret key agreement: General capacity and second-order asymptotics
-
May
-
M. Hayashi, H. Tyagi, and S. Watanabe. Secret key agreement: General capacity and second-order asymptotics. IEEE Trans. Inf. Theory, 62(7), May 2016.
-
(2016)
IEEE Trans. Inf. Theory
, vol.62
, pp. 7
-
-
Hayashi, M.1
Tyagi, H.2
Watanabe, S.3
-
40
-
-
39049122173
-
-
H. Imai, K. Morozov, A. C. Nascimento, and A. Winter. Efficient protocols achieving the commitment capacity of noisy correlations. Proc. IEEE International Symposium on Information Theory, pages 1432-1436, 2006.
-
(2006)
Proc IEEE International Symposium on Information Theory
, pp. 1432-1436
-
-
Imai, H.1
Morozov, K.2
Nascimento, A.C.3
Winter, A.4
-
44
-
-
0022149454
-
Two-way source coding with a fidelity criterion
-
November
-
A. H. Kaspi. Two-way source coding with a fidelity criterion. IEEE Trans. Inf. Theory, 31(6):735-740, November 1985.
-
(1985)
IEEE Trans. Inf. Theory
, vol.31
, Issue.6
, pp. 735-740
-
-
Kaspi, A.H.1
-
47
-
-
69449101829
-
The operational meaning of min-And max-entropy
-
September
-
R. Konig, R. Renner, and C. Schaffner. The operational meaning of min-And max-entropy. IEEE Trans. Inf. Theory, 55(9):4337-4347, September 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.9
, pp. 4337-4347
-
-
Konig, R.1
Renner, R.2
Schaffner, C.3
-
49
-
-
68349116049
-
Information theoretic security
-
April
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz). Information theoretic security. Found. Trends Commun. Inf. Theory, 5(4-5):355-580, April 2009.
-
(2009)
Found. Trends Commun. Inf. Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.S.3
-
50
-
-
85052441302
-
Common randomness and key generation with limited interaction
-
J. Liu, P. Cuff, and S. Verdú. Common randomness and key generation with limited interaction. CoRR, abs/1601.00899v2, 2016.
-
(2016)
CoRR, abs/1601.00899v2
-
-
Liu, J.1
Cuff, P.2
Verdú, S.3
-
51
-
-
77957602848
-
Information inequalities for joint distributions, with interpretations and applications
-
June
-
M. Madiman and P. Tetali. Information inequalities for joint distributions, with interpretations and applications. IEEE Trans. Inf. Theory, 56(6):2699-2713, June 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.6
, pp. 2699-2713
-
-
Madiman, M.1
Tetali, P.2
-
52
-
-
0024012644
-
An introduction to contemporary cryptology
-
J. L. Massey. An introduction to contemporary cryptology. Proc.The IEEE, 76(5):533-549, 1988.
-
(1988)
Proc.The IEEE
, vol.76
, Issue.5
, pp. 533-549
-
-
Massey, J.L.1
-
53
-
-
68349100488
-
Provably secure key distribution based on independent channels
-
June
-
U. M. Maurer. Provably secure key distribution based on independent channels. IEEE Information Theory Workshop (ITW), pages 49-71, June 1990.
-
(1990)
IEEE Information Theory Workshop (ITW)
, pp. 49-71
-
-
Maurer, U.M.1
-
54
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer. Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory, 39(3):733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
55
-
-
84989917733
-
Bounds on the communication rate needed to achieve SK capacity in the hypergraphical source model
-
M. Mukherjee, C. Chan, N. Kashyap, and Q. Zhou. Bounds on the communication rate needed to achieve SK capacity in the hypergraphical source model. CoRR, arXiv:1601.05377v2, 2016.
-
(2016)
CoRR arXiv:1601.05377v2
-
-
Mukherjee, M.1
Chan, C.2
Kashyap, N.3
Zhou, Q.4
-
56
-
-
84906536499
-
On the communication complexity of secret key generation in the multiterminal source model
-
June
-
M. Mukherjee and N. Kashyap. On the communication complexity of secret key generation in the multiterminal source model. Proc. IEEE Symposium on Information Theory, June 2014.
-
(2014)
Proc IEEE Symposium on Information Theory
-
-
Mukherjee, M.1
Kashyap, N.2
-
57
-
-
84989901967
-
On the public communication needed to achieve SK capacity in the multiterminal source model
-
M. Mukherjee, N. Kashyap, and Y. Sankarasubramaniam. On the public communication needed to achieve SK capacity in the multiterminal source model. CoRR, abs/1507.02874, 2015.
-
(2015)
CoRR, abs/1507.02874
-
-
Mukherjee, M.1
Kashyap, N.2
Sankarasubramaniam, Y.3
-
59
-
-
78649383176
-
Perfect omniscience, perfect secrecy, and steiner tree packing
-
December
-
S. Nitinawarat and P. Narayan. Perfect omniscience, perfect secrecy, and Steiner tree packing. IEEE Trans. Inform. Theory, 56(12):6490-6500, December 2010.
-
(2010)
IEEE Trans. Inform. Theory
, vol.56
, Issue.12
, pp. 6490-6500
-
-
Nitinawarat, S.1
Narayan, P.2
-
60
-
-
84861398796
-
Secret key generation for correlated Gaussian sources
-
June
-
S. Nitinawarat and P. Narayan. Secret key generation for correlated Gaussian sources. IEEE Trans. Inf. Theory, 58(6):3373-3391, June 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.6
, pp. 3373-3391
-
-
Nitinawarat, S.1
Narayan, P.2
-
61
-
-
78649346776
-
Secret key generation for a pairwise independent network model
-
December
-
S. Nitinawarat, C. Ye, A. Barg, P. Narayan, and A. Reznik. Secret key generation for a pairwise independent network model. IEEE Trans. Inform. Theory, 56(12):6482-6489, December 2010.
-
(2010)
IEEE Trans. Inform. Theory
, vol.56
, Issue.12
, pp. 6482-6489
-
-
Nitinawarat, S.1
Ye, C.2
Barg, A.3
Narayan, P.4
Reznik, A.5
-
62
-
-
0025486359
-
Worst-case interactive communication I: Two messages are almost optimal
-
September
-
A. Orlitsky. Worst-case interactive communication I: Two messages are almost optimal. IEEE Trans. Inf. Theory, 36(5):1111-1126, September 1990.
-
(1990)
IEEE Trans. Inf. Theory
, vol.36
, Issue.5
, pp. 1111-1126
-
-
Orlitsky, A.1
-
65
-
-
84959483105
-
Secure communications via physical-layer and information-Theoretic techniques
-
October
-
P. A. Regalia, A. Khisti, Y. Liang, and S. Tomasin (editors). Secure communications via physical-layer and information-Theoretic techniques. Proc.The IEEE, 103(10), October 2015.
-
(2015)
Proc.The IEEE
, vol.103
, pp. 10
-
-
Regalia, P.A.1
Khisti, A.2
Liang, Y.3
Tomasin, S.4
-
71
-
-
0021469810
-
Generating quasi-random sequences from semi-random sources
-
M. Santha and U. V. Vazirani. Generating quasi-random sequences from semi-random sources. Journal of Computer and System Sciences, 33(1):75-87, 1986.
-
(1986)
Journal of Computer and System Sciences
, vol.33
, Issue.1
, pp. 75-87
-
-
Santha, M.1
Vazirani, U.V.2
-
72
-
-
84890522850
-
Communication theory of secrecy systems
-
October
-
C. E. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28:656-715, October 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
73
-
-
77949627434
-
Secure source coding with a helper
-
Control, and Computing (Allerton) October
-
R. Tandon, S. Ulukus, and K. Ramchandran. Secure source coding with a helper. Proc. Conference on Communication, Control, and Computing (Allerton), pages 1061-1068, October 2009.
-
(2009)
Proc. Conference on Communication
, pp. 1061-1068
-
-
Tandon, R.1
Ulukus, S.2
Ramchandran, K.3
-
75
-
-
84882989241
-
Common information and secret key capacity
-
September
-
H. Tyagi. Common information and secret key capacity. IEEE Trans. Inf. Theory, 59(9):5627-5640, September 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.9
, pp. 5627-5640
-
-
Tyagi, H.1
-
77
-
-
84875585656
-
Distributed function computation with confidentiality
-
April
-
H. Tyagi. Distributed function computation with confidentiality. IEEE Journal on Selected Areas in Communications, 31(4):691-701, April 2013.
-
(2013)
IEEE Journal on Selected Areas in Communications
, vol.31
, Issue.4
, pp. 691-701
-
-
Tyagi, H.1
-
78
-
-
84867537040
-
Fault-Tolerant secret key generation
-
July
-
H. Tyagi, N. Kashyap, Y. Sankarasubramaniam, and K. Viswanathan. Fault-Tolerant secret key generation. Proc. IEEE International Symposium on Information Theory, pages 1787-1791, July 2012.
-
(2012)
Proc IEEE International Symposium on Information Theory
, pp. 1787-1791
-
-
Tyagi, H.1
Kashyap, N.2
Sankarasubramaniam, Y.3
Viswanathan, K.4
-
79
-
-
84882971734
-
How many queries will resolve common randomness?
-
September
-
H. Tyagi and P. Narayan. How many queries will resolve common randomness? IEEE Trans. Inf. Theory, 59(9):5363-5378, September 2013
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.9
, pp. 5363-5378
-
-
Tyagi, H.1
Narayan, P.2
-
83
-
-
80053961199
-
When is a function securely computable?
-
October
-
H. Tyagi, P. Narayan, and P. Gupta. When is a function securely computable? IEEE Trans. Inf. Theory, 57(10):6337-6350, October 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.10
, pp. 6337-6350
-
-
Tyagi, H.1
Narayan, P.2
Gupta, P.3
-
87
-
-
84939864518
-
Converses for secret key agreement and secure computing
-
September
-
H. Tyagi and S. Watanabe. Converses for secret key agreement and secure computing. IEEE Trans. Inf. Theory, 61:4809-4827, September 2015.
-
(2015)
IEEE Trans. Inf. Theory
, vol.61
, pp. 4809-4827
-
-
Tyagi, H.1
Watanabe, S.2
-
89
-
-
0029375649
-
Generating random bits from an arbitrary source: Fundamental limits
-
Sep
-
S. Vembu and S. Verdú. Generating random bits from an arbitrary source: Fundamental limits. IEEE Trans. Inf. Theory, 41(5):1322-1332, Sep. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.5
, pp. 1322-1332
-
-
Vembu, S.1
Verdú, S.2
-
92
-
-
80051770683
-
Secret key agreement from vector Gaussian sources by rate limited public communication
-
IEEE Transactions on September
-
S. Watanabe and Y. Oohama. Secret key agreement from vector Gaussian sources by rate limited public communication. Information Forensics and Security, IEEE Transactions on, 6(3):541-550, September 2011.
-
(2011)
Information Forensics and Security
, vol.6
, Issue.3
, pp. 541-550
-
-
Watanabe, S.1
Oohama, Y.2
-
94
-
-
84901321090
-
On the efficiency of classical and quantum secure function evaluation
-
June
-
S. Winkler and J. Wullschleger. On the efficiency of classical and quantum secure function evaluation. IEEE Trans. Inf. Theory, 60(6):3123-3143, June 2014.
-
(2014)
IEEE Trans. Inf. Theory
, vol.60
, Issue.6
, pp. 3123-3143
-
-
Winkler, S.1
Wullschleger, J.2
-
95
-
-
23944463739
-
-
Springer Berlin Heidelberg, Berlin, Heidelberg
-
A. Winter, A.C.A. Nascimento, and H. Imai. Commitment Capacity of Discrete Memoryless Channels, pages 35-51. Springer Berlin Heidelberg, Berlin, Heidelberg, 2003.
-
(2003)
Commitment Capacity of Discrete Memoryless Channels
, pp. 35-51
-
-
Winter, A.1
Nascimento, A.C.A.2
Imai, H.3
-
96
-
-
45249110618
-
New monotones and lower bounds in unconditional two-party computation
-
June
-
S. Wolf and J. Wullschleger. New monotones and lower bounds in unconditional two-party computation. IEEE Trans. Inf. Theory, 54(6):2792-2797, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2792-2797
-
-
Wolf, S.1
Wullschleger, J.2
-
97
-
-
0015992185
-
Recent results in the shannon theory
-
January
-
A. D. Wyner. Recent results in the Shannon theory. IEEE Trans. Inf. Theory, 20(1):2-10, January 1974.
-
(1974)
IEEE Trans. Inf. Theory
, vol.20
, Issue.1
, pp. 2-10
-
-
Wyner, A.D.1
-
98
-
-
0016562514
-
The wiretap channel
-
October
-
A. D. Wyner. The wiretap channel. Bell System Technical Journal, 54(8):1355-1367, October 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1367
-
-
Wyner, A.D.1
-
99
-
-
0036611983
-
Communicating via a processing broadcast satellite
-
June
-
A. D. Wyner, J. K. Wolf, and F. M. J. Willems. Communicating via a processing broadcast satellite. IEEE Trans. Inf. Theory, 48(6):1243-1249, June 2002.
-
(2002)
IEEE Trans. Inf. Theory
, vol.48
, Issue.6
, pp. 1243-1249
-
-
Wyner, A.D.1
Wolf, J.K.2
Willems, F.M.J.3
-
100
-
-
85039623622
-
Some complexity questions related to distributive computing
-
A. C. Yao. Some complexity questions related to distributive computing. Proc. Annual Symposium on Theory of Computing, pages 209-213, 1979.
-
(1979)
Proc. Annual Symposium on Theory of Computing
, pp. 209-213
-
-
Yao, A.C.1
-
102
-
-
84856830966
-
Secret key and private key constructions for simple multiterminal source models
-
February
-
C. Ye and P. Narayan. Secret key and private key constructions for simple multiterminal source models. IEEE Trans. Inf. Theory, 58(2):639-651, February 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.2
, pp. 639-651
-
-
Ye, C.1
Narayan, P.2
-
104
-
-
54349100649
-
Estimating mutual information via Kolmogorov distance
-
September
-
Z. Zhang. Estimating mutual information via Kolmogorov distance. IEEE Trans. Inf. Theory, 53(9):3280-3282, September 2007
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.9
, pp. 3280-3282
-
-
Zhang, Z.1
|