On the role of feedback in two-way secure communication
暂无分享,去创建一个
[1] Michael Gastpar,et al. The case for structured random codes in network capacity theorems , 2008, Eur. Trans. Telecommun..
[2] Matthieu R. Bloch,et al. Channel scrambling for secrecy , 2009, 2009 IEEE International Symposium on Information Theory.
[3] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[4] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[5] Venkat Anantharam,et al. Information-theoretic key agreement of multiple terminal: part II: channel model , 2010, IEEE Trans. Inf. Theory.
[6] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[7] Muriel Médard,et al. Random Linear Network Coding: A free cipher? , 2007, 2007 IEEE International Symposium on Information Theory.
[8] Imre Csiszár,et al. Secrecy generation for multiple input multiple output channel models , 2009, 2009 IEEE International Symposium on Information Theory.
[9] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[10] Te Sun Han,et al. A general coding scheme for the two-way channel , 1984, IEEE Trans. Inf. Theory.
[11] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[12] Claude E. Shannon,et al. Two-way Communication Channels , 1961 .
[13] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[14] Ender Tekin,et al. Achievable Rates for Two-Way Wire-Tap Channels , 2007, 2007 IEEE International Symposium on Information Theory.
[15] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[16] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[17] George T. Amariucai,et al. Secrecy rates of binary wiretapper channels using feedback schemes , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.
[18] Vinod M. Prabhakaran,et al. Secrecy via sources and channels — A secret key - Secret message rate tradeoff region , 2008, 2008 IEEE International Symposium on Information Theory.
[19] Gunter Dueck. The Capacity Region of the Two-Way Channel Can Exceed the Inner Bound , 1979, Inf. Control..
[20] Massimo Franceschetti,et al. Wiretap channel with rate-limited feedback , 2008, 2008 IEEE International Symposium on Information Theory.