Secret Key Generation over Noisy Channels with Correlated Sources
暂无分享,去创建一个
[1] Haim H. Permuter,et al. Key and Message Semantic-Security Over State-Dependent Channels , 2020, IEEE Transactions on Information Forensics and Security.
[2] Himanshu Tyagi,et al. Multiterminal Secrecy by Public Discussion , 2016, Found. Trends Commun. Inf. Theory.
[3] Wei Liu,et al. Wiretap Channel With Two-Sided Channel State Information , 2007, 2007 Conference Record of the Forty-First Asilomar Conference on Signals, Systems and Computers.
[4] Pablo Piantanida,et al. Secure Multiterminal Source Coding With Side Information at the Eavesdropper , 2011, IEEE Transactions on Information Theory.
[5] Mikael Skoglund,et al. Key Agreement over a Generalized Multiple Access Channel Using Noiseless and Noisy Feedback , 2013, IEEE Journal on Selected Areas in Communications.
[6] Shlomo Shamai,et al. Secure Transmission of Sources Over Noisy Channels With Side Information at the Receivers , 2012, IEEE Transactions on Information Theory.
[7] Abbas El Gamal,et al. Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).
[8] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[9] Imre Csiszár,et al. Secrecy Generation for Multiaccess Channel Models , 2013, IEEE Transactions on Information Theory.
[10] Himanshu Tyagi,et al. Common Information and Secret Key Capacity , 2013, IEEE Transactions on Information Theory.
[11] Sennur Ulukus,et al. Secure lossy source coding with side information , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[12] Venkat Anantharam,et al. Information-Theoretic Key Agreement of Multiple Terminals—Part II: Channel Model , 2010, IEEE Transactions on Information Theory.
[13] Jun Muramatsu. General formula for secrecy capacity of wiretap channel with noncausal state , 2014, 2014 IEEE International Symposium on Information Theory.
[14] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[15] Shlomo Shamai,et al. The wiretap channel with generalized feedback: Secure communication and key generation , 2015, 2015 IEEE Information Theory Workshop - Fall (ITW).
[16] Thomas A. Courtade,et al. Coded Cooperative Data Exchange for a Secret Key , 2014, IEEE Transactions on Information Theory.
[17] Chandra Nair. Capacity regions of two new classes of 2-receiver broadcast channels , 2009, ISIT.
[18] A. J. Han Vinck,et al. Wiretap Channel With Side Information , 2006, IEEE Transactions on Information Theory.
[19] Pablo Piantanida,et al. The Gaussian wiretap channel with correlated sources at the terminals: Secret communication and key generation , 2016, 2016 IEEE International Conference on the Science of Electrical Engineering (ICSEE).
[20] Himanshu Tyagi,et al. Secret Key Agreement: General Capacity and Second-Order Asymptotics , 2016, IEEE Trans. Inf. Theory.
[21] Ueli Maurer,et al. Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.
[22] Ali Zibaeenejad. Key Generation Over Wiretap Models With Non-Causal Side Information , 2015, IEEE Transactions on Information Forensics and Security.
[23] Moritz Wiese,et al. A Channel Under Simultaneous Jamming and Eavesdropping Attack—Correlated Random Coding Capacities Under Strong Secrecy Criteria , 2014, IEEE Transactions on Information Theory.
[24] I. Csiszár,et al. Common randomness and secret key generation with a helper , 1997, Proceedings of the 1999 IEEE Information Theory and Communications Workshop (Cat. No. 99EX253).
[25] Vinod M. Prabhakaran,et al. Secrecy via Sources and Channels , 2008, IEEE Transactions on Information Theory.
[26] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[27] Wei Kang,et al. Secret key generation from correlated sources and secure link , 2017, 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP).
[28] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[29] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[30] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[31] Wiretap Channels With Random States Non-Causally Available at the Encoder , 2020, IEEE Transactions on Information Theory.
[32] Shlomo Shamai,et al. Secret key generation over noisy channels with common randomness , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[33] Imre Csiszár,et al. Secrecy capacities for multiterminal channel models , 2005, ISIT.
[34] Suhas N. Diggavi,et al. Secret-Key Generation Using Correlated Sources and Channels , 2009, IEEE Transactions on Information Theory.
[35] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[36] Camilla Hollanti,et al. Physical Layer Security: A Paradigm Shift in Data Confidentiality , 2016 .