The Gaussian wiretap channel with correlated sources at the terminals: Secret communication and key generation
暂无分享,去创建一个
[1] A. J. Han Vinck,et al. An achievable region for the Gaussian wiretap channel with side information , 2006, IEEE Transactions on Information Theory.
[2] Wei Liu,et al. Wiretap Channel With Two-Sided Channel State Information , 2007, 2007 Conference Record of the Forty-First Asilomar Conference on Signals, Systems and Computers.
[3] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[4] Suhas N. Diggavi,et al. Secret-Key Agreement With Channel State Information at the Transmitter , 2010, IEEE Transactions on Information Forensics and Security.
[5] Ashish Khisti. Secret key agreement on wiretap channel with transmitter side information , 2010, 2010 European Wireless Conference (EW).
[6] Yuan Luo,et al. Some New Results on the Wiretap Channel with Side Information , 2012, Entropy.
[7] Suhas N. Diggavi,et al. Secret-key generation with correlated sources and noisy channels , 2008, 2008 IEEE International Symposium on Information Theory.
[8] Shun Watanabe,et al. Secret Key Agreement From Vector Gaussian Sources by Rate Limited Public Communication , 2010, IEEE Transactions on Information Forensics and Security.
[9] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[10] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[11] Vinod M. Prabhakaran,et al. Secrecy via Sources and Channels , 2008, IEEE Transactions on Information Theory.
[12] I. Csiszár,et al. Common randomness and secret key generation with a helper , 1997, Proceedings of the 1999 IEEE Information Theory and Communications Workshop (Cat. No. 99EX253).
[13] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[14] Suhas N. Diggavi,et al. Secret-Key Generation Using Correlated Sources and Channels , 2009, IEEE Transactions on Information Theory.
[15] Aydin Sezgin,et al. Wiretap Channel with Correlated Sources , 2014, 2014 IEEE International Conference on Cloud Engineering.
[16] Aydin Sezgin,et al. Gaussian wiretap channels with correlated sources: Approaching capacity region within a constant gap , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).
[17] K. Ramchandran,et al. Secret communication using sources and channels , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.
[18] V. Prabhakaran. A Separation Result for Secure Communication , 2007 .
[19] A. J. Han Vinck,et al. Wiretap Channel With Side Information , 2006, IEEE Transactions on Information Theory.
[20] Ali Zibaeenejad. Key Generation Over Wiretap Models With Non-Causal Side Information , 2015, IEEE Transactions on Information Forensics and Security.
[21] Vinod M. Prabhakaran,et al. Secrecy via sources and channels — A secret key - Secret message rate tradeoff region , 2008, 2008 IEEE International Symposium on Information Theory.
[22] Jun Muramatsu. General formula for secrecy capacity of wiretap channel with noncausal state , 2014, 2014 IEEE International Symposium on Information Theory.
[23] Shun Watanabe,et al. Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication , 2010, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..