相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Guessing Individual Sequences: Generating Randomized Guesses Using Finite-State Machines
Neri Merhav
IEEE TRANSACTIONS ON INFORMATION THEORY (2020)
Secure Multiplex Coding With Dependent and Non-Uniform Multiple Messages
Masahito Hayashi et al.
IEEE TRANSACTIONS ON INFORMATION THEORY (2016)
On the Data Processing Theorem in the Semi-deterministic Setting
Neri Merhav
IEEE TRANSACTIONS ON INFORMATION THEORY (2014)
Perfectly Secure Encryption of Individual Sequences
Neri Merhav
IEEE TRANSACTIONS ON INFORMATION THEORY (2013)
Wiretap Channel With Secure Rate-Limited Feedback
Ehsan Ardestanizadeh et al.
IEEE TRANSACTIONS ON INFORMATION THEORY (2009)
Shannon's secrecy system with informed receivers and its application to systematic coding for wiretapped channels
Neri Merhav
IEEE TRANSACTIONS ON INFORMATION THEORY (2008)
The Gaussian Multiple Access Wire-Tap Channel
Ender Tekin et al.
IEEE TRANSACTIONS ON INFORMATION THEORY (2008)
Upper bounds of eavesdropper's performances in finite-length code with the decoy method
Masahito Hayashi
PHYSICAL REVIEW A (2007)
An achievable region for the Gaussian wiretap channel with side information
C Mitrpant et al.
IEEE TRANSACTIONS ON INFORMATION THEORY (2006)
Universal detection of messages via finite-state channels
N Merhav
IEEE TRANSACTIONS ON INFORMATION THEORY (2000)