The Wiretap Channel With Generalized Feedback: Secure Communication and Key Generation
暂无分享,去创建一个
[1] H. Vincent Poor,et al. Secure Communications With Insecure Feedback: Breaking the High-SNR Ceiling , 2010, IEEE Transactions on Information Theory.
[2] Imre Csiszár,et al. Secrecy capacities for multiterminal channel models , 2005, ISIT.
[3] I. Csiszár,et al. Common randomness and secret key generation with a helper , 1997, Proceedings of the 1999 IEEE Information Theory and Communications Workshop (Cat. No. 99EX253).
[4] Ueli Maurer,et al. Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.
[5] Venkat Anantharam,et al. Information-Theoretic Key Agreement of Multiple Terminals—Part I , 2010, IEEE Transactions on Information Theory.
[6] A. J. Han Vinck,et al. Wiretap Channel With Side Information , 2006, IEEE Transactions on Information Theory.
[7] Haim H. Permuter,et al. Wiretap channels with random states non-causally available at the encoder , 2016, 2016 IEEE International Conference on the Science of Electrical Engineering (ICSEE).
[8] Mikael Skoglund,et al. Key Agreement over a Generalized Multiple Access Channel Using Noiseless and Noisy Feedback , 2013, IEEE Journal on Selected Areas in Communications.
[9] Gunter Dueck,et al. Partial Feedback for Two-Way and Broadcast Channels , 1980, Inf. Control..
[10] Shlomo Shamai,et al. On the capacity of the wiretap channel with generalized feedback , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[11] H. Vincent Poor,et al. Multiple Access Channels with Generalized Feedback and Confidential Messages , 2007, 2007 IEEE Information Theory Workshop.
[12] Yuan Luo,et al. Capacity region of non-degraded wiretap channel with noiseless feedback , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[13] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[14] Massimo Franceschetti,et al. Wiretap Channel With Secure Rate-Limited Feedback , 2009, IEEE Transactions on Information Theory.
[15] Mahtab Mirmohseni,et al. On the achievable rate region of a new Gaussian wiretap channel with side information , 2012, 2012 IEEE Information Theory Workshop.
[16] Shlomo Shamai,et al. The wiretap channel with generalized feedback: Secure communication and key generation , 2015, 2015 IEEE Information Theory Workshop - Fall (ITW).
[17] H. Vincent Poor,et al. Secret communication with feedback , 2008, 2008 International Symposium on Information Theory and Its Applications.
[18] Venkat Anantharam,et al. Information-Theoretic Key Agreement of Multiple Terminals—Part II: Channel Model , 2010, IEEE Transactions on Information Theory.
[19] Raef Bassily,et al. Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.
[20] V. Prabhakaran. A Separation Result for Secure Communication , 2007 .
[21] Sennur Ulukus,et al. Effects of cooperation on the secrecy of multiple access channels with generalized feedback , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.
[22] Rudolf Ahlswede,et al. Transmission, Identification and Common Randomness Capacities for Wire-Tape Channels with Secure Feedback from the Decoder , 2005, GTIT-C.
[23] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[24] Shlomo Shamai,et al. On multi-user MISO wiretap channels with delayed CSIT , 2014, 2014 IEEE International Symposium on Information Theory.
[25] H. Vincent Poor,et al. The Wiretap Channel With Feedback: Encryption Over the Channel , 2007, IEEE Transactions on Information Theory.
[26] Wei Liu,et al. Wiretap Channel With Two-Sided Channel State Information , 2007, 2007 Conference Record of the Forty-First Asilomar Conference on Signals, Systems and Computers.
[27] Abbas El Gamal,et al. Wiretap Channel With Causal State Information , 2012, IEEE Transactions on Information Theory.
[28] Shlomo Shamai,et al. Secrecy Degrees of Freedom of MIMO Broadcast Channels With Delayed CSIT , 2011, IEEE Transactions on Information Theory.
[29] Cyril Leung,et al. An achievable rate region for the multiple-access channel with feedback , 1981, IEEE Trans. Inf. Theory.
[30] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[31] Vinod M. Prabhakaran,et al. Secrecy via Sources and Channels , 2008, IEEE Transactions on Information Theory.
[32] Suhas N. Diggavi,et al. Secret Communication Over Broadcast Erasure Channels With State-Feedback , 2014, IEEE Transactions on Information Theory.
[33] Aylin Yener,et al. The Role of Feedback in Two-Way Secure Communications , 2009, IEEE Transactions on Information Theory.
[34] Suhas N. Diggavi,et al. Secret-Key Generation Using Correlated Sources and Channels , 2009, IEEE Transactions on Information Theory.
[35] Thomas Kailath,et al. A coding scheme for additive noise channels with feedback-I: No bandwidth constraint , 1966, IEEE Trans. Inf. Theory.