暂无分享,去创建一个
Tracey Ho | Shirin Jalali | T. Ho | S. Jalali
[1] Shirin Jalali,et al. On the separation of lossy source-network coding and channel coding in wireline networks , 2010, 2010 IEEE International Symposium on Information Theory.
[2] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[3] Ning Cai,et al. Theory of Secure Network Coding , 2011, Proceedings of the IEEE.
[4] Zhen Zhang,et al. An Implicit Characterization of the Achievable Rate Region for Acyclic Multisource Multisink Network Coding , 2012, IEEE Transactions on Information Theory.
[5] Lihua Song,et al. Zero-error network coding for acyclic network , 2003, IEEE Trans. Inf. Theory.
[6] Tracey Ho,et al. Network equivalence in the presence of an eavesdropper , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[7] Alex J. Grant,et al. Network Coding Capacity Regions via Entropy Functions , 2012, IEEE Transactions on Information Theory.
[8] John Odentrantz,et al. Markov Chains: Gibbs Fields, Monte Carlo Simulation, and Queues , 2000, Technometrics.
[9] Noam Nisan,et al. Extracting Randomness: A Survey and New Constructions , 1999, J. Comput. Syst. Sci..
[10] Jack K. Wolf,et al. Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.
[11] Salil P. Vadhan,et al. Extracting All the Randomness from a Weakly Random Source , 1998, Electron. Colloquium Comput. Complex..
[12] Abbas El Gamal,et al. Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).
[13] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[14] Tracey Ho,et al. On delay and security in network coding , 2013 .
[15] Noam Nisan,et al. Extracting randomness: how and why. A survey , 1996, Proceedings of Computational Complexity (Formerly Structure in Complexity Theory).
[16] Ning Cai,et al. Secure Network Coding on a Wiretap Network , 2011, IEEE Transactions on Information Theory.
[17] Muriel Médard,et al. A Theory of Network Equivalence— Part I: Point-to-Point Channels , 2011, IEEE Transactions on Information Theory.
[18] Zhen Zhang,et al. On Characterization of Entropy Function via Information Inequalities , 1998, IEEE Trans. Inf. Theory.
[19] Ueli Maurer,et al. Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.
[20] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[21] Alon Orlitsky,et al. Coding for computing , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[22] W. Hoeffding. Probability Inequalities for sums of Bounded Random Variables , 1963 .
[23] R. Yeung,et al. Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.
[24] Raymond W. Yeung,et al. Information Theory and Network Coding , 2008 .
[25] T. Chan,et al. Capacity bounds for secure network coding , 2008, 2008 Australian Communications Theory Workshop.
[26] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.