Theory of linear and integer programming
Theory of linear and integer programming
Authentication theory/coding theory
Proceedings of CRYPTO 84 on Advances in cryptology
Information-theoretic bounds for authentication schemes
Journal of Cryptology
Elements of information theory
Elements of information theory
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Efficient and secure keys management for wireless mobile communications
Proceedings of the second ACM international workshop on Principles of mobile computing
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Toward Secure Key Distribution in Truly Ad-Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
An algebraic approach to network coding
IEEE/ACM Transactions on Networking (TON)
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
Error Control Coding, Second Edition
Error Control Coding, Second Edition
Quantum privacy and quantum wiretap channels
Problems of Information Transmission
Efficient and robust key management for large mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge
IEEE Transactions on Dependable and Secure Computing
Network coding theory part II: multiple source
Communications and Information Theory
Network coding theory: single sources
Communications and Information Theory
Secret Key Agreement from Correlated Source Outputs Using Low Density Parity Check Matrices
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Secure and efficient key management in mobile ad hoc networks
Journal of Network and Computer Applications
Foundations and Trends® in Networking
Robust key generation from signal envelopes in wireless networks
Proceedings of the 14th ACM conference on Computer and communications security
Foundations and Trends® in Networking
Topics in Multi-User Information Theory
Foundations and Trends in Communications and Information Theory
Amplify-and-forward based cooperation for secure wireless communications
ICASSP '09 Proceedings of the 2009 IEEE International Conference on Acoustics, Speech and Signal Processing
An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Secrecy capacity of a class of orthogonal relay eavesdropper channels
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Capacity bounds for broadcast channels with confidential messages
IEEE Transactions on Information Theory
Capacity of cognitive interference channels with and without secrecy
IEEE Transactions on Information Theory
Authentication over noisy channels
IEEE Transactions on Information Theory
Error exponents for asymmetric two-user discrete memoryless source-channel coding systems
IEEE Transactions on Information Theory
On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels
IEEE Transactions on Information Theory
A note on the secrecy capacity of the multiple-antenna wiretap channel
IEEE Transactions on Information Theory
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: the 2-2-1 channel
IEEE Transactions on Information Theory
An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
MIMO Gaussian broadcast channels with confidential messages
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Secret-key sharing based on layered broadcast coding over fading channels
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
On the degrees-of-freedom of the K -user Gaussian interference channel
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
On the compound MIMO broadcast channels with confidential messages
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Information-theoretic key agreement: from weak to strong secrecy for free
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
New bounds in secret-key agreement: the gap between formation and secrecy extraction
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Secrecy capacity region of a multiple-antenna Gaussian broadcast channel with confidential messages
IEEE Transactions on Information Theory
Secure hybrid encryption from weakened key encapsulation
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Modern Coding Theory
Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels
IEEE Transactions on Information Forensics and Security - Part 1
On a special class of broadcast channels with confidential messages
IEEE Transactions on Information Theory
Capacity of fading channels with channel side information
IEEE Transactions on Information Theory
The common randomness capacity of a pair of independent discrete memoryless channels
IEEE Transactions on Information Theory
Common randomness in information theory and cryptography. II. CR capacity
IEEE Transactions on Information Theory
Optimum power control over fading channels
IEEE Transactions on Information Theory
Common randomness and secret key generation with a helper
IEEE Transactions on Information Theory
The common randomness capacity of a network of discrete memoryless channels
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Authentication theory and hypothesis testing
IEEE Transactions on Information Theory
Efficient encoding of low-density parity-check codes
IEEE Transactions on Information Theory
Capacity and optimal resource allocation for fading broadcast channels .I. Ergodic capacity
IEEE Transactions on Information Theory
Capacity and optimal resource allocation for fading broadcast channels .II. Outage capacity
IEEE Transactions on Information Theory
Nested linear/lattice codes for structured multiterminal binning
IEEE Transactions on Information Theory
Capacity-achieving sequences for the erasure channel
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Secret-key agreement over unauthenticated public channels .I. Definitions and a completeness result
IEEE Transactions on Information Theory
Secret-key agreement over unauthenticated public channels-Part II: the simulatability condition
IEEE Transactions on Information Theory
Secret-key agreement over unauthenticated public channels .II. Privacy amplification
IEEE Transactions on Information Theory
Secrecy capacities for multiple terminals
IEEE Transactions on Information Theory
Cooperative Strategies and Capacity Theorems for Relay Networks
IEEE Transactions on Information Theory
Lattices which are good for (almost) everything
IEEE Transactions on Information Theory
An achievable region for the Gaussian wiretap channel with side information
IEEE Transactions on Information Theory
The Capacity Region of the Gaussian Multiple-Input Multiple-Output Broadcast Channel
IEEE Transactions on Information Theory
A Random Linear Network Coding Approach to Multicast
IEEE Transactions on Information Theory
An Extremal Inequality Motivated by Multiterminal Information-Theoretic Problems
IEEE Transactions on Information Theory
Applications of LDPC Codes to the Wiretap Channel
IEEE Transactions on Information Theory
Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution
IEEE Transactions on Information Theory
Wiretap Channel With Side Information
IEEE Transactions on Information Theory
Interference Channels With Common Information
IEEE Transactions on Information Theory
Multiple-Access Channels With Confidential Messages
IEEE Transactions on Information Theory
Wireless Information-Theoretic Security
IEEE Transactions on Information Theory
Secrecy Capacities for Multiterminal Channel Models
IEEE Transactions on Information Theory
Secure Broadcasting Over Fading Channels
IEEE Transactions on Information Theory
Secure Communication Over Fading Channels
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
The Relay–Eavesdropper Channel: Cooperation for Secrecy
IEEE Transactions on Information Theory
On the Secrecy Capacity of Fading Channels
IEEE Transactions on Information Theory
The Wiretap Channel With Feedback: Encryption Over the Channel
IEEE Transactions on Information Theory
The Gaussian Multiple Access Wire-Tap Channel
IEEE Transactions on Information Theory
Key agreement in ad hoc networks
Computer Communications
An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Fading cognitive multiple-access channels with confidential messages
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Combinatorial Designs for Authentication and Secrecy Codes
Foundations and Trends in Communications and Information Theory
Multiple-input multiple-output Gaussian broadcast channels with confidential messages
IEEE Transactions on Information Theory
Achieving secret communication for fast rayleigh fading channels
IEEE Transactions on Wireless Communications
Strong secrecy for multiple access channels
Information Theory, Combinatorics, and Search Theory
Wireless Personal Communications: An International Journal
Journal of Computational Electronics
Hi-index | 0.06 |
The topic of information theoretic security is introduced and the principal results in this area are reviewed. The basic wire-tap channel model is considered first, and then several specific types of wire-tap channels are considered, including Gaussian, multi-input multi-output (MIMO), compound, and feedback wire-tap channels, as well as the wire-tap channel with side information. Practical code design techniques to achieve secrecy for wire-tap channels are also introduced. The wire-tap formalism is then extended to the basic channels of multi-user networks, including broadcast channels, multiple-access channels (MACs), interference channels, relay channels and two-way channels. For all of these models, results on the fundamental communication limits under secrecy constraints and corresponding coding schemes are reviewed. Furthermore, several related topics including key agreement through common randomness, secure network coding, authentication, cross-layer design, and secure source coding are discussed.