Covert Communication With Polynomial Computational Complexity
暂无分享,去创建一个
[1] Mayank Bakshi,et al. Reliable, deniable and hidable communication: A quick survey , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).
[2] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[3] Robert J. Baxley,et al. Achieving positive rate with undetectable communication over AWGN and Rayleigh channels , 2014, 2014 IEEE International Conference on Communications (ICC).
[4] Saikat Guha,et al. Quantum-secure covert communication on bosonic channels , 2015, Nature Communications.
[5] H. Chernoff. A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations , 1952 .
[6] F. Preparata,et al. Computational Complexity of Fourier Transforms over Finite Fields , 1977 .
[7] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[8] Xin-She Yang,et al. Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.
[9] U. Maurer. A Uniied and Generalized Treatment of Authentication Theory , 1996 .
[10] Robert J. Baxley,et al. Achieving positive rate with undetectable communication Over MIMO rayleigh channels , 2014, 2014 IEEE 8th Sensor Array and Multichannel Signal Processing Workshop (SAM).
[11] Matthieu R. Bloch,et al. Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.
[12] Matthieu R. Bloch,et al. Polar codes for covert communications over asynchronous Discrete Memoryless Channels , 2017, 2017 51st Annual Conference on Information Sciences and Systems (CISS).
[13] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[14] Mayank Bakshi,et al. Computationally efficient deniable communication , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[15] Matthieu R. Bloch,et al. First- and Second-Order Asymptotics in Covert Communication , 2017, IEEE Transactions on Information Theory.
[16] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[17] Donald F. Towsley,et al. Quantum noise limited optical communication with low probability of detection , 2013, 2013 IEEE International Symposium on Information Theory.
[18] Donald F. Towsley,et al. LPD communication when the warden does not know when , 2014, 2014 IEEE International Symposium on Information Theory.
[19] Matthieu R. Bloch,et al. Multilevel-Coded Pulse-Position Modulation for Covert Communications Over Binary-Input Discrete Memoryless Channels , 2018, IEEE Transactions on Information Theory.
[20] Daniel Berend,et al. A Reverse Pinsker Inequality , 2012, ArXiv.
[21] Luke Deshotels,et al. Inaudible Sound as a Covert Channel in Mobile Devices , 2014, WOOT.
[22] Boulat A. Bash,et al. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.
[23] G. David Forney,et al. Concatenated codes , 2009, Scholarpedia.
[24] E. Lehmann,et al. Testing Statistical Hypothesis. , 1960 .
[25] Ying Wang,et al. Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions , 2007, IEEE Transactions on Information Theory.
[26] Lizhong Zheng,et al. Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.
[27] Ueli Maurer. A Unified and Generalized Treatment of Authentification Theory , 1996, STACS.
[28] Mayank Bakshi,et al. Reliable deniable communication with channel uncertainty , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).
[29] Mayank Bakshi,et al. Reliable, deniable and hidable communication , 2014, 2014 Information Theory and Applications Workshop (ITA).
[30] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[31] Feller William,et al. An Introduction To Probability Theory And Its Applications , 1950 .
[32] Carlisle M. Adams,et al. On Characterizing and Measuring Out-of-Band Covert Channels , 2015, IH&MMSec.
[33] Thorsten Dickhaus,et al. Testing a Statistical Hypothesis , 2015 .
[34] Gerhard Kramer,et al. Effective secrecy: Reliability, confusion and stealth , 2013, 2014 IEEE International Symposium on Information Theory.
[35] S. Wicker. Error Control Systems for Digital Communication and Storage , 1994 .
[36] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[37] Matthias Hollick,et al. Practical covert channels for WiFi systems , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[38] Donald F. Towsley,et al. Square root law for communication with low probability of detection on AWGN channels , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[39] Mayank Bakshi,et al. Reliable deniable communication: Hiding messages in noise , 2013, 2013 IEEE International Symposium on Information Theory.