BUPLE: securing passive RFID communication through physical layer enhancements
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
ICITS'12 Proceedings of the 6th international conference on Information Theoretic Security
Security and privacy issues for the network of the future
Security and Communication Networks
Securing wireless communications in transmit-beamforming systems by precoding jamming noise signals
Security and Communication Networks
Optimal tag suppression for privacy protection in the semantic Web
Data & Knowledge Engineering
Public and private resource trade-offs for a quantum channel
Quantum Information Processing
Game theory meets network security and privacy
ACM Computing Surveys (CSUR)
Message transmission and key establishment: conditions for equality of weak and strong capacities
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Control of wireless networks with secrecy
IEEE/ACM Transactions on Networking (TON)
Wireless Personal Communications: An International Journal
Secure cooperative physical-layer coding for the internet of things
Proceedings of the International Workshop on Adaptive Security
Security of plug-and-play QKD arrangements with finite resources
Quantum Information & Computation
Strong secrecy for multiple access channels
Information Theory, Combinatorics, and Search Theory
On oblivious transfer capacity
Information Theory, Combinatorics, and Search Theory
Measuring the privacy of user profiles in personalized information systems
Future Generation Computer Systems
Wireless Personal Communications: An International Journal
Asymmetric "4+2" protocol for quantum key distribution with finite resources
Quantum Information Processing
Optimization Schemes for Protective Jamming
Mobile Networks and Applications
Secrecy Rate of Two-Hop AF Relaying Networks with an Untrusted Relay
Wireless Personal Communications: An International Journal
A New Relay and Jammer Selection Schemes for Secure One-Way Cooperative Networks
Wireless Personal Communications: An International Journal
Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks
IEEE/ACM Transactions on Networking (TON)
Hi-index | 754.84 |
Given two discrete memoryless channels (DMC's) with a common input, it is desired to transmit private messages to receiver1rateR_{1}and common messages to both receivers at rateR_{o}, while keeping receiver2as ignorant of the private messages as possible. Measuring ignorance by equivocation, a single-letter characterization is given of the achievable triples(R_{1},R_{e},R_{o})whereR_{e}is the equivocation rate. Based on this channel coding result, the related source-channel matching problem is also settled. These results generalize those of Wyner on the wiretap channel and of Körner-Marton on the broadcast Channel.