Information Theoretic Security
From MaRDI portal
Publication:3589015
DOI10.1561/0100000036zbMath1194.94006OpenAlexW4293702014WikidataQ57258690 ScholiaQ57258690MaRDI QIDQ3589015
Yingbin Liang, H. Vincent Poor, Shlomo Shamai
Publication date: 10 September 2010
Published in: Foundations and Trends® in Communications and Information Theory (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1561/0100000036
Cryptography (94A60) Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02)
Related Items
Basics of Secrecy Coding, Privacy-constrained network formation, 2- and 3-modular lattice wiretap codes in small dimensions, Physical layer security over Tsallis statistics for wireless communications with hardware impairments in the presence of some eavesdroppers, (Secure) linear network coding multicast, The secrecy capacity of the arbitrarily varying wiretap channel under list decoding, Performance degradation of stealthy attacks against sensor measurements in vector systems, Strong Secrecy for Multiple Access Channels, Privacy Aware Learning, Common Information, Noise Stability, and Their Extensions