-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28: 656-715.
-
(1949)
Bell Syst Tech J
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
Wyner AD (1975) The wire-tap channel. Bell Syst Tech J 54:1355-1387.
-
(1975)
Bell Syst Tech J
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
6
-
-
0000478763
-
Cipher printing telegraph systems for secret wire and radio telegraphic communications
-
Vernam GS (1926) Cipher printing telegraph systems for secret wire and radio telegraphic communications. Trans Am Inst Electr Eng XLV:295-301.
-
(1926)
Trans Am Inst Electr Eng
, vol.45
, pp. 295-301
-
-
Vernam, G.S.1
-
7
-
-
5144231861
-
On the role of MMSE estimation in approaching the informationtheoretic limits of linear Gaussian channels: Shannon meets Wiener
-
IEEE, Piscataway, NJ
-
Forney GD, Jr (2003) On the role of MMSE estimation in approaching the informationtheoretic limits of linear Gaussian channels: Shannon meets Wiener. Proceedings of the 41st Allerton Conference on Communication, Control, and Computing (IEEE, Piscataway, NJ), pp 430-439.
-
(2003)
Proceedings of the 41st Allerton Conference on Communication, Control, and Computing
, pp. 430-439
-
-
Forney, G.D.1
-
8
-
-
0005059185
-
The strong secret key rate of discrete random triples
-
eds Blahut RE, Costello DJ, Maurer U, Mittelholzer T (Springer, Boston)
-
Maurer UM (1994) The strong secret key rate of discrete random triples. Communication and Cryptography - Two Sides of One Tapestry, eds Blahut RE, Costello DJ, Maurer U, Mittelholzer T (Springer, Boston), pp 271-285.
-
(1994)
Communication and Cryptography - Two Sides of One Tapestry
, pp. 271-285
-
-
Maurer, U.M.1
-
9
-
-
0029706655
-
Almost independence and secrecy capacity
-
Csiszá r I (1996) Almost independence and secrecy capacity. Probl Peredachi Inf 32: 48-57.
-
(1996)
Probl Peredachi Inf
, vol.32
, pp. 48-57
-
-
Csiszá R, I.1
-
10
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Lecture Notes in Computer Science, ed Preneel B (Springer, Berlin)
-
Maurer U, Wolf S (2000) Information-theoretic key agreement: From weak to strong secrecy for free. Proceedings of EUROCRYPT 2000 on Advances in Cryptography, Lecture Notes in Computer Science, ed Preneel B (Springer, Berlin), Vol 1807, pp 351-368.
-
(2000)
Proceedings of EUROCRYPT 2000 on Advances in Cryptography
, vol.1807
, pp. 351-368
-
-
Maurer, U.1
Wolf, S.2
-
11
-
-
84889587094
-
Strong secrecy from channel resolvability
-
Bloch MR, Laneman JN (2013) Strong secrecy from channel resolvability. IEEE Trans Inf Theory 59:8077-8098.
-
(2013)
IEEE Trans Inf Theory
, vol.59
, pp. 8077-8098
-
-
Bloch, M.R.1
Laneman, J.N.2
-
12
-
-
12444299059
-
The private classical capacity and quantum capacity of a quantum channel
-
Devetak I (2005) The private classical capacity and quantum capacity of a quantum channel. IEEE Trans Inf Theory 51:44-55.
-
(2005)
IEEE Trans Inf Theory
, vol.51
, pp. 44-55
-
-
Devetak, I.1
-
13
-
-
84908252542
-
Reliability and secrecy functions of the wiretap channel under cost constraint
-
Han TS, Endo H, Sasaki M (2014) Reliability and secrecy functions of the wiretap channel under cost constraint. IEEE Trans Inf Theory 60:6819-6843.
-
(2014)
IEEE Trans Inf Theory
, vol.60
, pp. 6819-6843
-
-
Han, T.S.1
Endo, H.2
Sasaki, M.3
-
14
-
-
33645727315
-
General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel
-
Hayashi M (2006) General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel. IEEE Trans Inf Theory 52:1562-1575.
-
(2006)
IEEE Trans Inf Theory
, vol.52
, pp. 1562-1575
-
-
Hayashi, M.1
-
15
-
-
84906555227
-
Effective secrecy: Reliability, confusion, and stealth
-
IEEE (IEEE, New York)
-
Hou J, Kramer G (2014) Effective secrecy: Reliability, confusion, and stealth. Proceedings of the IEEE International Symposium on Information Theory (IEEE, New York), pp 601-605.
-
(2014)
Proceedings of the International Symposium on Information Theory
, pp. 601-605
-
-
Hou, J.1
Kramer, G.2
-
17
-
-
84865447746
-
A cryptographic treatment of the wiretap channel
-
eds Safavi-Naini R, Canetti R (Springer, Berlin)
-
Bellaire M, Tessaro S, Vardy A (2012) A cryptographic treatment of the wiretap channel. Proceedings of Advances in Cryptology (CRYPTO), eds Safavi-Naini R, Canetti R (Springer, Berlin), pp 1-31.
-
(2012)
Proceedings of Advances in Cryptology (CRYPTO)
, pp. 1-31
-
-
Bellaire, M.1
Tessaro, S.2
Vardy, A.3
-
18
-
-
0017973511
-
Broadcast channels with confidential messages
-
Csiszá r I, Kö rner J (1978) Broadcast channels with confidential messages. IEEE Trans Inf Theory 24:339-348.
-
(1978)
IEEE Trans Inf Theory
, vol.24
, pp. 339-348
-
-
Csiszá R, I.1
Kö Rner, J.2
-
21
-
-
77958560746
-
Secure transmission with multiple antennas I: The MISOME wiretap channel/Part II: The MIMOME wiretap channel
-
Khisti A, Wornell GW (2010) Secure transmission with multiple antennas I: The MISOME wiretap channel/Part II: The MIMOME wiretap channel. IEEE Trans Inf Theory 56:5515-5532.
-
(2010)
IEEE Trans Inf Theory
, vol.56
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
22
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Oggier F, Hassibi B (2011) The secrecy capacity of the MIMO wiretap channel. IEEE Trans Inf Theory 57:4961-4972.
-
(2011)
IEEE Trans Inf Theory
, vol.57
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
23
-
-
69249208566
-
An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel
-
Bustin R, Liu R, Poor HV, Shamai(Shitz) S (2009) An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel. EURASIP J Wirel Commun Netw 2009:370970.
-
(2009)
EURASIP J Wirel Commun Netw
, vol.2009
, pp. 370970
-
-
Bustin, R.1
Liu, R.2
Poor, H.V.3
Shamai, S.4
-
25
-
-
84959570869
-
Secure communication under channel uncertainty and adversarial attacks
-
IEEE
-
Schaefer RF, Boche H, Poor HV (2015) Secure communication under channel uncertainty and adversarial attacks. Proc IEEE 103:1796-1813.
-
(2015)
Proc
, vol.103
, pp. 1796-1813
-
-
Schaefer, R.F.1
Boche, H.2
Poor, H.V.3
-
27
-
-
84959419251
-
The secrecy capacity of compound MIMO Gaussian channels
-
Schaefer RF, Loyka S (2015) The secrecy capacity of compound MIMO Gaussian channels. IEEE Trans Inf Theory 61:5535-5552.
-
(2015)
IEEE Trans Inf Theory
, vol.61
, pp. 5535-5552
-
-
Schaefer, R.F.1
Loyka, S.2
-
31
-
-
84960154644
-
Broadcast networks with layered decoding and layered secrecy: Theory and applications
-
Zou S, Liang Y, Lai L, Poor HV, Shamai (Shitz) S (2015) Broadcast networks with layered decoding and layered secrecy: Theory and applications. Proc IEEE 10:1841-1856.
-
(2015)
Proc IEEE
, vol.10
, pp. 1841-1856
-
-
Zou, S.1
Liang, Y.2
Lai, L.3
Poor, H.V.4
Shamai, S.5
-
32
-
-
77958520866
-
Multiple-input multiple-output Gaussian broadcast channels with common and confidential messages
-
Ly HD, Liu T, Liang Y (2010) Multiple-input multiple-output Gaussian broadcast channels with common and confidential messages. IEEE Trans Inf Theory 56:5477-5487.
-
(2010)
IEEE Trans Inf Theory
, vol.56
, pp. 5477-5487
-
-
Ly, H.D.1
Liu, T.2
Liang, Y.3
-
33
-
-
84907459082
-
Robust broadcasting of common and confidential messages over compound channels: Strong secrecy and decoding performance
-
Schaefer RF, Boche H (2014) Robust broadcasting of common and confidential messages over compound channels: Strong secrecy and decoding performance. IEEE Trans Inf Forensics Secur 9:1720-1732.
-
(2014)
IEEE Trans Inf Forensics Secur
, vol.9
, pp. 1720-1732
-
-
Schaefer, R.F.1
Boche, H.2
-
34
-
-
40949147785
-
Multiple-access channels with confidential messages
-
Liang Y, Poor HV (2008) Multiple-access channels with confidential messages. IEEE Trans Inf Theory 54:972-1002.
-
(2008)
IEEE Trans Inf Theory
, vol.54
, pp. 972-1002
-
-
Liang, Y.1
Poor, H.V.2
-
35
-
-
46749102916
-
Multiple access channels with generalized feedback and confidential messages
-
IEEE, Piscataway, NJ
-
Tang X, Liu R, Spasojevic P, Poor HV (2007) Multiple access channels with generalized feedback and confidential messages. Proceedings of the IEEE Information Theory Workshop (IEEE, Piscataway, NJ), pp 608-613.
-
(2007)
Proceedings of the IEEE Information Theory Workshop
, pp. 608-613
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.V.4
-
36
-
-
57349093480
-
The Gaussian multiple access wire-tap channel
-
Tekin E, Yener A (2008) The Gaussian multiple access wire-tap channel. IEEE Trans Inf Theory 54:5747-5755.
-
(2008)
IEEE Trans Inf Theory
, vol.54
, pp. 5747-5755
-
-
Tekin, E.1
Yener, A.2
-
38
-
-
45249090083
-
Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
-
Liu R, Maric I, Spasojevic P, Yates R (2008) Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions. IEEE Trans Inf Theory 54:2493-2507.
-
(2008)
IEEE Trans Inf Theory
, vol.54
, pp. 2493-2507
-
-
Liu, R.1
Maric, I.2
Spasojevic, P.3
Yates, R.4
-
39
-
-
61349186445
-
Capacity of cognitive interference channels with and with out secrecy
-
Liang Y, Somekh-Baruch A, Poor HV, Shamai (Shitz) S, Verdú S (2009) Capacity of cognitive interference channels with and with out secrecy. IEEE Trans Inf Theory 55: 604-619.
-
(2009)
IEEE Trans Inf Theory
, vol.55
, pp. 604-619
-
-
Liang, Y.1
Somekh-Baruch, A.2
Poor, H.V.3
Shamai, S.4
Verdú, S.5
-
40
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
He X, Yener A (2010) Cooperation with an untrusted relay: A secrecy perspective. IEEE Trans Inf Theory 56:3801-3827.
-
(2010)
IEEE Trans Inf Theory
, vol.56
, pp. 3801-3827
-
-
He, X.1
Yener, A.2
-
42
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Lai L, El Gamal H (2008) The relay-eavesdropper channel: Cooperation for secrecy. IEEE Trans Inf Theory 54:4005-4019.
-
(2008)
IEEE Trans Inf Theory
, vol.54
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
43
-
-
84905246708
-
Key generation from wireless channels
-
eds Zhou X, Song L, Zhang Y (CRC, Boca Raton, FL)
-
Lai L, Liang Y, Poor HV, Du W (2014) Key generation from wireless channels. Physical Layer Security in Wireless Communications, eds Zhou X, Song L, Zhang Y (CRC, Boca Raton, FL).
-
(2014)
Physical Layer Security in Wireless Communications
-
-
Lai, L.1
Liang, Y.2
Poor, H.V.3
Du, W.4
-
45
-
-
0027629488
-
Common randomness in information theory and cryptography-Part I: Secret sharing
-
Ahlswede R, Csiszar I (1993) Common randomness in information theory and cryptography-Part I: Secret sharing. IEEE Trans Inf Theory 39:1121-1132.
-
(1993)
IEEE Trans Inf Theory
, vol.39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csisz Ar, I.2
-
46
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
Maurer UM (1993) Secret key agreement by public discussion from common information. IEEE Trans Inf Theory 39:733-742.
-
(1993)
IEEE Trans Inf Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.M.1
-
47
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
Csiszar I, Narayan P (2000) Common randomness and secret key generation with a helper. IEEE Trans Inf Theory 46:344-366.
-
(2000)
IEEE Trans Inf Theory
, vol.46
, pp. 344-366
-
-
Csiszar, I.1
Narayan, P.2
-
48
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
Wilson R, Tse D, Scholtz RA (2007) Channel identification: Secret sharing using reciprocity in ultrawideband channels. IEEE Trans Inf Forensics Secur 2:364-375.
-
(2007)
IEEE Trans Inf Forensics Secur
, vol.2
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.A.3
-
49
-
-
77952604175
-
Informationtheoretic key generation from wireless channels
-
Ye C, Mathur S, Reznik A, Trappe W, Mandayam N (2010) Informationtheoretic key generation from wireless channels. IEEE Trans Inf Forensics Secur 5:240-254.
-
(2010)
IEEE Trans Inf Forensics Secur
, vol.5
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Trappe, W.4
Mandayam, N.5
-
50
-
-
84960154985
-
Error-control coding for physical-layer secrecy
-
IEEE
-
Bloch M,Hayashi M, Thangaraj A (2015) Error-control coding for physical-layer secrecy. Proc IEEE 103:1725-1746.
-
(2015)
Proc
, vol.103
, pp. 1725-1746
-
-
Bloch, M.1
Hayashi, M.2
Thangaraj, A.3
-
52
-
-
80051779980
-
Secure communications over wireless broadcast networks: Stability and utility maximization
-
Liang Y, Poor HV, Ying L (2011) Secure communications over wireless broadcast networks: Stability and utility maximization. IEEE Trans Inf Forensics Secur 6:682-692.
-
(2011)
IEEE Trans Inf Forensics Secur
, vol.6
, pp. 682-692
-
-
Liang, Y.1
Poor, H.V.2
Ying, L.3
-
53
-
-
84882581142
-
Information-theoretic security in space-division multiplexed fiber optic networks
-
Optical Society of America, Washington, DC
-
Guan K, Winzer PJ, Soljanin E (2012) Information-theoretic security in space-division multiplexed fiber optic networks. Proceedings of the European Conference and Exhibition on Optical Communication (Optical Society of America, Washington, DC), p Tu.3.C.4.
-
(2012)
Proceedings of the European Conference and Exhibition on Optical Communication
, pp. Tu3C4
-
-
Guan, K.1
Winzer, P.J.2
Soljanin, E.3
-
54
-
-
84897525383
-
Rate-distortion-based physical layer secrecy in multimode fiber
-
Song EC, Soljanin E, Cuff P, Poor HV, Guan K (2014) Rate-distortion-based physical layer secrecy in multimode fiber. IEEE Trans Commun 62:1080-1090.
-
(2014)
IEEE Trans Commun
, vol.62
, pp. 1080-1090
-
-
Song, E.C.1
Soljanin, E.2
Cuff, P.3
Poor, H.V.4
Guan, K.5
-
56
-
-
79951830125
-
Privacy-security tradeoff in biometric security systems part I: Single uses case/part II: Multiple uses case
-
Lai L, Ho S-W, Poor HV (2011) Privacy-security tradeoff in biometric security systems part I: Single uses case/part II: Multiple uses case. IEEE Trans Inf Forensics Secur 1:122-151.
-
(2011)
IEEE Trans Inf Forensics Secur
, vol.1
, pp. 122-151
-
-
Lai, L.1
Ho, S.-W.2
Poor, H.V.3
|