Stealthy keyless secret key generation from degraded sources
暂无分享,去创建一个
[1] Boulat A. Bash,et al. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.
[2] Igal Sason,et al. On Reverse Pinsker Inequalities , 2015, ArXiv.
[3] Stefan M. Moser,et al. Advanced Topics in Information Theory: Lecture Notes , 2018 .
[4] Matthieu R. Bloch,et al. Covert secret key generation , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).
[5] Matthieu R. Bloch,et al. Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.
[6] Abbas El Gamal,et al. Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).
[7] Eduard A. Jorswieck,et al. Stealthy Secret Key Generation , 2017, 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[8] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[9] Mayank Bakshi,et al. Reliable deniable communication: Hiding messages in noise , 2013, 2013 IEEE International Symposium on Information Theory.
[10] Lizhong Zheng,et al. Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.
[11] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[12] Michelle Effros,et al. A strong converse for a collection of network source coding problems , 2009, 2009 IEEE International Symposium on Information Theory.
[13] Gerhard Kramer,et al. Effective secrecy: Reliability, confusion and stealth , 2013, 2014 IEEE International Symposium on Information Theory.