Cooperative Resolvability and Secrecy in the Cribbing Multiple-Access Channel
暂无分享,去创建一个
[1] Shraga I. Bross. The Discrete Memoryless Interference Channel With One-Sided Generalized Feedback and Secrecy , 2010, IEEE Transactions on Information Theory.
[2] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[3] Sergio Verdú,et al. Resolvability in Eγ with applications to lossy compression and wiretap channels , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[4] Sergio Verdú,et al. Simulation of random processes and rate-distortion theory , 1996, IEEE Trans. Inf. Theory.
[5] Matthieu R. Bloch,et al. Strong Secrecy From Channel Resolvability , 2011, IEEE Transactions on Information Theory.
[6] Remi A. Chou,et al. Polar coding for the multiple access wiretap channel via rate-splitting and cooperative jamming , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[7] Frans M. J. Willems,et al. The discrete memoryless multiple-access channel with cribbing encoders , 1985, IEEE Trans. Inf. Theory.
[8] Luc Vandendorpe,et al. Multiaccess Channel With Partially Cooperating Encoders and Security Constraints , 2012, IEEE Transactions on Information Forensics and Security.
[9] Ueli Maurer,et al. Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.
[10] Elza Erkip,et al. The Relay Channel with a Wire-tapper , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[11] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[12] Slawomir Stanczak,et al. The MAC Resolvability Region, Semantic Security and Its Operational Implications , 2017, ArXiv.
[13] Abbas El Gamal,et al. Capacity theorems for the relay channel , 1979, IEEE Trans. Inf. Theory.
[14] Jörg Kliewer,et al. Strong coordination over a line network , 2013, 2013 IEEE International Symposium on Information Theory.
[15] Aaron D. Wyner,et al. The common information of two dependent random variables , 1975, IEEE Trans. Inf. Theory.
[16] Mohammad Reza Aref,et al. Multiple Access Wiretap channels with strong secrecy , 2010, 2010 IEEE Information Theory Workshop.
[17] Gerhard Kramer,et al. Informational divergence approximations to product distributions , 2013, 2013 13th Canadian Workshop on Information Theory.
[18] Zhiguo Ding,et al. Rate Regions for Multiple Access Channel With Conference and Secrecy Constraints , 2013, IEEE Transactions on Information Forensics and Security.
[19] Haim H. Permuter,et al. Strong Secrecy for Cooperative Broadcast Channels , 2016, IEEE Transactions on Information Theory.
[20] Sergio Verdú,et al. Approximation theory of output statistics , 1993, IEEE Trans. Inf. Theory.
[21] Reza Khosravi-Farsani,et al. Capacity theorems for the Cognitive Radio Channel with confidential messages , 2014, 2014 IEEE International Symposium on Information Theory.
[22] Haim Permuter,et al. Multiple-Access Channel With Partial and Controlled Cribbing Encoders , 2013, IEEE Transactions on Information Theory.
[23] Sergio Verdú,et al. $f$ -Divergence Inequalities , 2015, IEEE Transactions on Information Theory.
[24] Osvaldo Simeone,et al. The Cognitive Multiple Access Wire-Tap Channel , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.
[25] Paul W. Cuff,et al. Distributed Channel Synthesis , 2012, IEEE Transactions on Information Theory.
[26] Alexandre J. Pierrot,et al. Strongly Secure Communications Over the Two-Way Wiretap Channel , 2010, IEEE Transactions on Information Forensics and Security.
[27] Yossef Steinberg. Resolvability Theory for the Multiple-Access Channel , 1998, IEEE Trans. Inf. Theory.
[28] Ming Xiao,et al. Strong Secrecy for Interference Channels Based on Channel Resolvability , 2018, IEEE Transactions on Information Theory.
[29] H. Vincent Poor,et al. Multiple Access Channels with Generalized Feedback and Confidential Messages , 2007, 2007 IEEE Information Theory Workshop.
[30] Shlomo Shamai,et al. Capacity of Cognitive Interference Channels With and Without Secrecy , 2009, IEEE Transactions on Information Theory.
[31] Shun Watanabe,et al. Cognitive Interference Channels With Confidential Messages Under Randomness Constraint , 2014, IEEE Transactions on Information Theory.
[32] Sennur Ulukus,et al. Secrecy in Cooperative Relay Broadcast Channels , 2008, IEEE Transactions on Information Theory.
[33] Masahito Hayashi,et al. General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel , 2006, IEEE Transactions on Information Theory.
[34] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[35] Sergio Verdú,et al. Channel simulation and coding with side information , 1994, IEEE Trans. Inf. Theory.