International audienceThe paper studies the wiretap erasure broadcast channel (BC) with an external eavesdropper when the legitimate receivers have cache memories. Various secure coding schemes are proposed for a scenario where Kw weak receivers have same erasure probabilities and Ks strong receivers have same erasure probabilities. The coding schemes achieve the cache-aided secrecy capacity when only weak receivers have cache memories and this cache memory is either small or large. They also allow to conclude the following: 1) Under a total cache budget it is often beneficial to assign the cache memories unequally between strong and weak receivers. 2.) Joint cache-channel coding is necessary to attain the optimal performance. 3.) The secre...
International audienceThe paper considers a coded caching setup with two libraries and where only on...
Abstract — We study secret-key agreement with public discussion over a flat-fading wiretap channel m...
International audienceWe study the problem of achieving strong secrecy over wiretap channels at negl...
International audienceThe paper studies the wiretap erasure broadcast channel (BC) with an external ...
International audienceThis paper derives upper and lower bounds on the secrecy capacity-memory trade...
Conference of 2017 IEEE International Conference on Communications, ICC 2017 ; Conference Date: 21 M...
International audienceWe consider a K-receiver wiretap broadcast channel where Kw receivers are weak...
Conference of 2017 IEEE Wireless Communications and Networking Conference, WCNC 2017 ; Conference Da...
International audienceWe derive upper bounds on the rate-memory trade-off of cache-aided erasure bro...
A cache-aided erasure broadcast channel is studied. The receivers are divided into two sets: the wea...
A cache-aided broadcast network is studied, in which a server delivers contents to a group of receiv...
A cache-aided broadcast network is studied, in which a server delivers contents to a group of receiv...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
International audienceAn erasure broadcast network is considered with two disjoint sets of receivers...
We consider code design for Wyner’s wiretap channel. Optimal coding schemes for this channel require...
International audienceThe paper considers a coded caching setup with two libraries and where only on...
Abstract — We study secret-key agreement with public discussion over a flat-fading wiretap channel m...
International audienceWe study the problem of achieving strong secrecy over wiretap channels at negl...
International audienceThe paper studies the wiretap erasure broadcast channel (BC) with an external ...
International audienceThis paper derives upper and lower bounds on the secrecy capacity-memory trade...
Conference of 2017 IEEE International Conference on Communications, ICC 2017 ; Conference Date: 21 M...
International audienceWe consider a K-receiver wiretap broadcast channel where Kw receivers are weak...
Conference of 2017 IEEE Wireless Communications and Networking Conference, WCNC 2017 ; Conference Da...
International audienceWe derive upper bounds on the rate-memory trade-off of cache-aided erasure bro...
A cache-aided erasure broadcast channel is studied. The receivers are divided into two sets: the wea...
A cache-aided broadcast network is studied, in which a server delivers contents to a group of receiv...
A cache-aided broadcast network is studied, in which a server delivers contents to a group of receiv...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
International audienceAn erasure broadcast network is considered with two disjoint sets of receivers...
We consider code design for Wyner’s wiretap channel. Optimal coding schemes for this channel require...
International audienceThe paper considers a coded caching setup with two libraries and where only on...
Abstract — We study secret-key agreement with public discussion over a flat-fading wiretap channel m...
International audienceWe study the problem of achieving strong secrecy over wiretap channels at negl...