Hamming Distortion Based Secrecy Systems: To Foil the Eavesdropper With Finite Shared Key
暂无分享,去创建一个
[1] H. Vincent Poor,et al. A bit of secrecy for Gaussian source compression , 2013, 2013 IEEE International Symposium on Information Theory.
[2] Paul W. Cuff,et al. Rate-distortion theory for secrecy systems , 2013, 2013 IEEE International Symposium on Information Theory.
[3] Paul W. Cuff. A Framework for Partial Secrecy , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[4] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[5] Hirosuke Yamamoto,et al. Rate-distortion theory for the Shannon cipher system , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[6] H. Vincent Poor,et al. On Energy-Secrecy Trade-Offs for Gaussian Wiretap Channels , 2013, IEEE Transactions on Information Forensics and Security.
[7] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[8] Paul W. Cuff,et al. Secrecy is cheap if the adversary must reconstruct , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.