Authentication with Mildly Myopic Adversaries
暂无分享,去创建一个
Oliver Kosut | Paul L. Yu | Allison Beemer | Eric Graves | Joerg Kliewer | Paul Yu | O. Kosut | J. Kliewer | Allison Beemer | Eric Graves
[1] Imre Csiszár,et al. The capacity of the arbitrarily varying channel revisited: Positivity, constraints , 1988, IEEE Trans. Inf. Theory.
[2] Oliver Kosut,et al. Authentication Against a Myopic Adversary , 2019, 2019 IEEE Conference on Communications and Network Security (CNS).
[3] Anand D. Sarwate,et al. Coding against myopic adversaries , 2010, 2010 IEEE Information Theory Workshop.
[4] Rick S. Blum,et al. Inner Bound for the Capacity Region of Noisy Channels with an Authentication Requirement , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).
[5] Ueli Maurer,et al. Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion , 1997, EUROCRYPT.
[6] H. Vincent Poor,et al. Authentication Over Noisy Channels , 2008, IEEE Transactions on Information Theory.
[7] Alex J. Grant,et al. The arbitrarily varying channel when the jammer knows the channel input , 2010, 2010 IEEE International Symposium on Information Theory.
[8] Eric Graves,et al. Keyless authentication in the presence of a simultaneously transmitting adversary , 2016, 2016 IEEE Information Theory Workshop (ITW).
[9] D. Blackwell,et al. The Capacities of Certain Channel Classes Under Random Coding , 1960 .
[10] Thomas M. Cover,et al. Network Information Theory , 2001 .
[11] Gustavus J. Simmons,et al. Authentication Theory/Coding Theory , 1985, CRYPTO.
[12] Jörg Kliewer,et al. Authentication Capacity of Adversarial Channels , 2018, 2018 IEEE Information Theory Workshop (ITW).
[13] Anand D. Sarwate,et al. Quadratically Constrained Myopic Adversarial Channels , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).
[14] Michael Langberg,et al. Sufficiently myopic adversaries are blind , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[15] Can Emre Koksal,et al. On the Basic Limits of RF-Fingerprint-Based Authentication , 2016, IEEE Transactions on Information Theory.