Optimal equivocation in secrecy systems a special case of distortion-based characterization
暂无分享,去创建一个
[2] Richard D. Wesel,et al. Multiterminal source coding with an entropy-based distortion measure , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[3] Paul W. Cuff. Using a secret key to foil an eavesdropper , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[4] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[5] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[6] Paul W. Cuff,et al. Secrecy is cheap if the adversary must reconstruct , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[7] H. Vincent Poor,et al. Secure lossless compression with side information , 2008, 2008 IEEE Information Theory Workshop.
[8] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[9] Pablo Piantanida,et al. Secure lossy source coding with side information at the decoders , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[10] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[11] Kannan Ramchandran,et al. Secure source coding with a helper , 2009 .
[12] Paul W. Cuff. A Framework for Partial Secrecy , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[13] Michel Barlaud,et al. Entropy-Based Distortion Measure for Image Coding , 2006, 2006 International Conference on Image Processing.