Key Generation Algorithms for Pairwise Independent Networks Based on Graphical Models
暂无分享,去创建一个
Lifeng Lai | Siu-Wai Ho | Siu-Wai Ho | L. Lai
[1] Baochun Li,et al. Network Coding : The Case of Multiple Unicast Sessions , 2004 .
[2] Ravindra K. Ahuja,et al. Network Flows , 2011 .
[3] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[4] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[5] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[6] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[7] Alexander Barg,et al. Secret Key Generation for a Pairwise Independent Network Model , 2008, IEEE Transactions on Information Theory.
[8] Imre Csiszár,et al. Secrecy capacities for multiple terminals , 2004, IEEE Transactions on Information Theory.
[9] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.
[10] Oktay Günlük,et al. The multicast packing problem , 2000, TNET.
[11] H. Vincent Poor,et al. A Unified Framework for Key Agreement Over Wireless Fading Channels , 2009, IEEE Transactions on Information Forensics and Security.
[12] Zixiang Xiong,et al. On code design for the Slepian-Wolf problem and lossless multiterminal networks , 2006, IEEE Transactions on Information Theory.
[13] Lifeng Lai,et al. Simultaneously generating multiple keys and multi-commodity flow in networks , 2012, 2012 IEEE Information Theory Workshop.
[14] Stark C. Draper,et al. Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness , 2010, 2010 IEEE International Symposium on Information Theory.
[15] Christina Fragouli,et al. Group secret key generation over broadcast erasure channels , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.
[16] Chung Chan,et al. Mutual dependence for secret key agreement , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).
[17] Shyamkishor Kumar. NETWORK CODING THE CASE OF MULTIPLE UNICAST SESSIONS , 2015 .
[18] T. C. Hu. Multi-Commodity Network Flows , 1963 .
[19] Mihalis Yannakakis,et al. Approximate Max-Flow Min-(Multi)Cut Theorems and Their Applications , 1996, SIAM J. Comput..
[20] Ashish Khisti. Interactive secret key generation over reciprocal fading channels , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[21] Zongpeng Li,et al. A Constant Bound on Throughput Improvement of Multicast Network Coding in Undirected Networks , 2009, IEEE Transactions on Information Theory.
[22] David Tse,et al. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.
[23] Alex Reznik,et al. Group Secret Key Generation Algorithms , 2007, 2007 IEEE International Symposium on Information Theory.
[24] Prakash Narayan,et al. Secret Key and Private Key Constructions for Simple Multiterminal Source Models , 2005, IEEE Transactions on Information Theory.
[25] Zongpeng Li,et al. On achieving maximum multicast throughput in undirected networks , 2006, IEEE Transactions on Information Theory.