Secure Identification for Gaussian Channels
暂无分享,去创建一个
[1] Holger Boche,et al. Secrecy results for compound wiretap channels , 2011, Probl. Inf. Transm..
[2] H. S. Varsha,et al. The tactile Internet , 2017, 2017 International Conference on Innovative Mechanisms for Industry Applications (ICIMIA).
[3] Holger Boche,et al. Secure Storage for Identification; Random Resources and Privacy Leakage , 2019, IEEE Transactions on Information Forensics and Security.
[4] Himanshu Tyagi,et al. Universal Hashing for Information-Theoretic Security , 2014, Proceedings of the IEEE.
[5] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[6] Holger Boche,et al. Secure Identification for Wiretap Channels; Robustness, Super-Additivity and Continuity , 2018, IEEE Transactions on Information Forensics and Security.
[7] Rudolf Ahlswede,et al. New directions in the theory of identification via channels , 1995, IEEE Trans. Inf. Theory.
[8] Rudolf Ahlswede,et al. Identification via channels , 1989, IEEE Trans. Inf. Theory.
[9] M. V. Burnashev. On method of "types", approximation of output measures and ID-capacity for channels with continuous alphabets , 1999, Proceedings of the 1999 IEEE Information Theory and Communications Workshop (Cat. No. 99EX253).
[10] Moritz Wiese,et al. Semantic Security and the Second-Largest Eigenvalue of Biregular Graphs , 2018, ArXiv.
[11] Hiroki Koga,et al. Information-Spectrum Methods in Information Theory , 2002 .
[12] Holger Boche,et al. Secure Identification Under Passive Eavesdroppers and Active Jamming Attacks , 2019, IEEE Transactions on Information Forensics and Security.