Code Constructions and Bounds for Identification via Channels
暂无分享,去创建一个
Jörg Kliewer | Onur Günlü | Rafael F. Schaefer | Vladimir Sidorenko | J. Kliewer | V. Sidorenko | O. Günlü
[1] Onur Günlü,et al. Zero secrecy leakage for multiple enrollments of physical unclonable functions , 2018 .
[2] Onur Günlü. Key Agreement with Physical Unclonable Functions and Biometric Identifiers , 2019 .
[3] Thomas M. Cover,et al. Elements of information theory (2. ed.) , 2006 .
[4] Sergio Verdú,et al. Explicit construction of optimal constant-weight codes for identification via channels , 1993, IEEE Trans. Inf. Theory.
[5] Neri Merhav,et al. Identification in the presence of side information with application to watermarking , 2001, IEEE Trans. Inf. Theory.
[6] Edward L. Titlebaum,et al. A new family of optical code sequences for use in spread-spectrum fiber-optic local area networks , 1993, IEEE Trans. Commun..
[7] Holger Boche,et al. Identification Capacity of Channels With Feedback: Discontinuity Behavior, Super-Activation, and Turing Computability , 2020, IEEE Transactions on Information Theory.
[8] Hirosuke Yamamoto,et al. On optimal error exponents in noiseless channel identification , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[9] A. A. Shaar,et al. Prime sequences: quasi-optimal sequences for OR channel code division multiplexing , 1983 .
[10] Oliver Kosut,et al. Authentication and Partial Message Correction over Adversarial Multiple-Access Channels , 2020, 2020 IEEE Conference on Communications and Network Security (CNS).
[11] Erdal Arikan,et al. Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.
[12] Shun Watanabe,et al. Minimax Converse for Identification via Channels , 2020, IEEE Transactions on Information Theory.
[13] Richard M. Wilson,et al. Cyclotomy and difference families in elementary abelian groups , 1972 .
[14] P. Vijay Kumar,et al. Optical orthogonal codes-New bounds and an optimal construction , 1990, IEEE Trans. Inf. Theory.
[15] Rudolf Ahlswede,et al. Identification via channels , 1989, IEEE Trans. Inf. Theory.
[16] Holger Boche,et al. Secure Identification for Wiretap Channels; Robustness, Super-Additivity and Continuity , 2018, IEEE Transactions on Information Forensics and Security.
[17] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[18] Selmer M. Johnson,et al. Upper bounds for constant weight error correcting codes , 1972, Discret. Math..
[19] W. Cary Huffman,et al. Fundamentals of Error-Correcting Codes , 1975 .
[20] Pierre Moulin,et al. A framework for the design of good watermark identification codes , 2006, Electronic Imaging.
[21] Onur Günlü,et al. An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions , 2020, Entropy.
[22] Andreas J. Winter. Identification via Quantum Channels in the Presence of Prior Correlation and Feedback , 2005, Electron. Notes Discret. Math..
[23] H. Vincent Poor,et al. An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications , 2021, IEEE Journal on Selected Areas in Information Theory.
[24] Onur Gunlu,et al. Multi-Entity and Multi-Enrollment Key Agreement With Correlated Noise , 2020, IEEE Transactions on Information Forensics and Security.
[25] S. V. Maric,et al. New family of algebraically designed optical orthogonal codes for use in CDMA fibre-optic networks , 1993 .
[26] Rudolf Ahlswede,et al. Identification in the presence of feedback-A discovery of new capacity formulas , 1989, IEEE Trans. Inf. Theory.
[27] Vinod M. Prabhakaran,et al. Multiple Access Channels with Byzantine Users , 2019, 2019 IEEE Information Theory Workshop (ITW).
[28] Guu-chang Yang,et al. Optical orthogonal codes with unequal auto- and cross-correlation constraints , 1995, IEEE Trans. Inf. Theory.
[29] Rudolf Ahlswede,et al. New directions in the theory of identification via channels , 1995, IEEE Trans. Inf. Theory.
[30] Onur Günlü,et al. Secure and Reliable Key Agreement with Physical Unclonable Functions † , 2018, IACR Cryptol. ePrint Arch..
[31] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[32] Yossef Steinberg. New Converses in the Theory of Identification via Channels , 1998, IEEE Trans. Inf. Theory.
[33] Kaoru Kurosawa,et al. Strongly universal hashing and identification codes via channels , 1999, IEEE Trans. Inf. Theory.
[34] Paul R. Prucnal,et al. Spread spectrum fiber-optic local area network using optical processing , 1986 .
[35] Krishnan Eswaran. Identification via Channels and Constant-Weight Codes , 2005 .
[36] Christian Deppe,et al. Performance Analysis of Identification Codes , 2020, Entropy.
[37] Onur Günlü,et al. Doubly-Exponential Identification via Channels: Code Constructions and Bounds , 2021, 2021 IEEE International Symposium on Information Theory (ISIT).
[38] Fan Chung Graham,et al. Optical orthogonal codes: Design, analysis, and applications , 1989, IEEE Trans. Inf. Theory.