Secret Key Agreement From Vector Gaussian Sources by Rate Limited Public Communication
暂无分享,去创建一个
[1] Jean Cardinal,et al. Reconciliation of a quantum-distributed Gaussian key , 2001, IEEE Transactions on Information Theory.
[2] Shlomo Shamai,et al. An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009 .
[3] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[4] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[5] Max H. M. Costa,et al. A new entropy power inequality , 1985, IEEE Trans. Inf. Theory.
[6] Shun Watanabe,et al. Secret key agreement from vector Gaussian sources by rate limited public communication , 2010, 2010 IEEE International Symposium on Information Theory.
[7] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[8] Ueli Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[9] Imre Csiszár,et al. Secrecy capacities for multiple terminals , 2004, IEEE Transactions on Information Theory.
[10] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[11] Shlomo Shamai,et al. MIMO Gaussian broadcast channels with confidential and common messages , 2010, 2010 IEEE International Symposium on Information Theory.
[12] Tie Liu,et al. An Extremal Inequality Motivated by Multiterminal Information-Theoretic Problems , 2006, IEEE Transactions on Information Theory.
[13] Jun Chen. Rate region of Gaussian multiple description coding with individual and central distortion constraints , 2009, IEEE Trans. Inf. Theory.
[14] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[15] Sirin Nitinawarat. Secret key generation for correlated Gaussian sources , 2008, 2008 IEEE International Symposium on Information Theory.
[16] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[17] Shlomo Shamai,et al. Multiple-Input Multiple-Output Gaussian Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.
[18] Sennur Ulukus,et al. Capacity Region of Gaussian MIMO Broadcast Channels With Common and Confidential Messages , 2010, IEEE Transactions on Information Theory.
[19] N. Cerf,et al. Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.
[20] Shlomo Shamai,et al. On the Capacity Region of the Multi-Antenna Broadcast Channel with Common Messages , 2006, 2006 IEEE International Symposium on Information Theory.
[21] Dimitri P. Bertsekas,et al. Convex Analysis and Optimization , 2003 .
[22] Yingbin Liang,et al. Multiple-Input Multiple-Output Gaussian Broadcast Channels With Common and Confidential Messages , 2009, IEEE Transactions on Information Theory.
[23] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[24] Shlomo Shamai,et al. The Capacity Region of the Degraded Multiple-Input Multiple-Output Compound Broadcast Channel , 2009, IEEE Transactions on Information Theory.
[25] Gilles Van Assche,et al. Quantum cryptography and secret-key distillation , 2006 .
[26] Imre Csiszár,et al. Common randomness and secret key generation with a helper , 2000, IEEE Trans. Inf. Theory.
[27] Shlomo Shamai,et al. The capacity region of the Gaussian MIMO broadcast channel , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[28] Hiroki Koga,et al. Information-Spectrum Methods in Information Theory , 2002 .
[29] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[30] Shlomo Shamai,et al. The Capacity Region of the Gaussian Multiple-Input Multiple-Output Broadcast Channel , 2006, IEEE Transactions on Information Theory.
[31] Sennur Ulukus,et al. The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel , 2009, IEEE Transactions on Information Theory.
[32] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[33] Shlomo Shamai,et al. A Vector Generalization of Costa's Entropy-Power Inequality With Applications , 2009, IEEE Transactions on Information Theory.
[34] Patrick P. Bergmans,et al. A simple converse for broadcast channels with additive white Gaussian noise (Corresp.) , 1974, IEEE Trans. Inf. Theory.