A novel secret image sharing scheme in color images using small shadow images
Information Sciences: an International Journal
General theory of information transfer: Updated
Discrete Applied Mathematics
General Theory of Information Transfer and Combinatorics
Public and private resource trade-offs for a quantum channel
Quantum Information Processing
Limitations of generating a secret key using wireless fading under active adversary
IEEE/ACM Transactions on Networking (TON)
Low-power secret-key agreement over OFDM
Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
Secrecy results for compound wiretap channels
Problems of Information Transmission
Message transmission and key establishment: conditions for equality of weak and strong capacities
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Proceedings of the 5th conference on Innovations in theoretical computer science
Strong secrecy for multiple access channels
Information Theory, Combinatorics, and Search Theory
Capacity results for arbitrarily varying wiretap channels
Information Theory, Combinatorics, and Search Theory
On oblivious transfer capacity
Information Theory, Combinatorics, and Search Theory
Bibliography of publications by Rudolf Ahlswede
Information Theory, Combinatorics, and Search Theory
Multi-user wireless channel probing for shared key generation with a fuzzy controller
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 754.84 |
As the first part of a study of problems involving common randomness at distance locations, information-theoretic models of secret sharing (generating a common random key at two terminals, without letting an eavesdropper obtain information about this key) are considered. The concept of key-capacity is defined. Single-letter formulas of key-capacity are obtained for several models, and bounds to key-capacity are derived for other models