The secrecy capacity of an extended communication model of wiretap channelII is determined. In this channel model, the source message is encoded into a digital sequence of length N and transmitted to the legitimate receiver through a discrete memoryless channel (DMC). There exists an eavesdropper who is able to observe arbitrary μ = N α digital symbols from the transmitter through a second DMC, where 0 ≤ α ≤ 1 is a constant real number. A pair of an encoder and a decoder is designed to let the receiver be able to recover the source message with a vanishing decoding error probability and keep the eavesdropper ignorant of the message. This communication model includes a variety of wiretap channels as special cases. The coding ...
In this paper, we investigate the effects of an additional trusted relay node on the secrecy of mult...
Abstract—We study the capacity of secret-key agreement over a wiretap channel with state parameters....
Abstract—This paper studies the problem of secure communi-cation over a degraded wiretap channel p(y...
This paper considers the compound wiretap channel, which generalizes Wyner’s wiretap model to allow ...
We study the security of communication between a single transmitter and many receivers in the prese...
This paper considers the compound wiretap channel, which generalizes Wyner’s wiretap model to allow ...
This paper considers a special class of wiretap networks with a single source node and K sink nodes....
Abstract—In the wiretap channel model, symbols transmitted through a main channel to a legitimate re...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
International audienceWith the advent of quantum key distribution (QKD) systems, perfect (i.e. infor...
Information embedding on actions is a new channel model in which a specific decoder is used to obser...
permits unrestricted use, distribution, and reproduction in any medium, provided the original work i...
International audienceWe study the two-transmitter two-receiver channel with confidential messages c...
Abstract—We study information-theoretic security for discrete memoryless interference and broadcast ...
A wiretap channel is a communication channel between a transmitter Alice and a legitimate receiver B...
In this paper, we investigate the effects of an additional trusted relay node on the secrecy of mult...
Abstract—We study the capacity of secret-key agreement over a wiretap channel with state parameters....
Abstract—This paper studies the problem of secure communi-cation over a degraded wiretap channel p(y...
This paper considers the compound wiretap channel, which generalizes Wyner’s wiretap model to allow ...
We study the security of communication between a single transmitter and many receivers in the prese...
This paper considers the compound wiretap channel, which generalizes Wyner’s wiretap model to allow ...
This paper considers a special class of wiretap networks with a single source node and K sink nodes....
Abstract—In the wiretap channel model, symbols transmitted through a main channel to a legitimate re...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
International audienceWith the advent of quantum key distribution (QKD) systems, perfect (i.e. infor...
Information embedding on actions is a new channel model in which a specific decoder is used to obser...
permits unrestricted use, distribution, and reproduction in any medium, provided the original work i...
International audienceWe study the two-transmitter two-receiver channel with confidential messages c...
Abstract—We study information-theoretic security for discrete memoryless interference and broadcast ...
A wiretap channel is a communication channel between a transmitter Alice and a legitimate receiver B...
In this paper, we investigate the effects of an additional trusted relay node on the secrecy of mult...
Abstract—We study the capacity of secret-key agreement over a wiretap channel with state parameters....
Abstract—This paper studies the problem of secure communi-cation over a degraded wiretap channel p(y...