Search

Your search keyword '"information theoretic security"' showing total 254 results

Search Constraints

Start Over You searched for: Descriptor "information theoretic security" Remove constraint Descriptor: "information theoretic security"
254 results on '"information theoretic security"'

Search Results

1. Randomness Recoverable Secret Sharing Schemes.

3. Experimental Integration of Quantum Key Distribution and Post‐Quantum Cryptography in a Hybrid Quantum‐Safe Cryptosystem.

4. Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing

5. Straggler- and Adversary-Tolerant Secure Distributed Matrix Multiplication Using Polynomial Codes.

6. Private Key and Decoder Side Information for Secure and Private Source Coding †.

7. Information Theoretic Secure Aggregation With User Dropouts.

8. Quantum Information Theory

9. A Distributed Computing Perspective of Unconditionally Secure Information Transmission in Russian Cards Problems

10. Directional modulation techniques for secure wireless communication: a comprehensive survey.

11. Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency

12. Secret Sharing on Evolving Multi-level Access Structure

13. Secure Groupcast With Shared Keys.

14. Role of Shared Key for Secure Communication Over 2-User Gaussian Z-Interference Channel.

15. Commodity-Based 2PC for Arithmetic Circuits

16. Atmospheric Turbulence-Controlled Cryptosystems

17. QKD-Enhanced Cybersecurity Protocols

18. Straggler- and Adversary-Tolerant Secure Distributed Matrix Multiplication Using Polynomial Codes

19. Private Key and Decoder Side Information for Secure and Private Source Coding

20. Uniform Random Number Generation and Secret Key Agreement for General Sources by Using Sparse Matrices

21. Well-Rounded Lattices: Towards Optimal Coset Codes for Gaussian and Fading Wiretap Channels.

22. QKD-Enhanced Cybersecurity Protocols.

23. Atmospheric Turbulence-Controlled Cryptosystems.

24. Exact Equivocation Expressions for Wiretap Coding Over Erasure Channel Models.

25. Physical Layer Secret Key Generation in Static Environments.

26. Private and Secure Distributed Matrix Multiplication With Flexible Communication Load.

27. The Communication Complexity of Private Simultaneous Messages, Revisited.

28. Semantically Secure Lattice Codes for Compound MIMO Channels.

29. Adding a Helper Can Totally Remove the Secrecy Constraints in a Two-User Interference Channel.

30. Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems.

31. Cloud Security and Privacy by Design

32. Position-Based Cryptography from Noisy Channels

33. Plausible Deniability Over Broadcast Channels.

34. The Wiretapped Diamond-Relay Channel.

35. Almost Universal Codes for MIMO Wiretap Channels.

36. Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography

37. [formula omitted] Regional Secret Image Sharing over Finite Fields.

38. Random-Resistor-Random-Temperature Kirchhoff-Law-Johnson-Noise (RRRT-KLJN) Key Exchange

40. Human Perfectly Secure Message Transmission Protocols and Their Applications

41. Guessing Secrecy

42. Secure Two-Party Computation over a Z-Channel

43. Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary

44. Building Oblivious Transfer on Channel Delays

45. Identity Authentication over Noisy Channels

46. Comparing Security Notions of Secret Sharing Schemes

47. Private Key and Decoder Side Information for Secure and Private Source Coding

48. Information Theoretic Security Based on Bounded Observability

49. From Equilibrium-Based Business Intelligence to Information Conservational Quantum-Fuzzy Cryptography—A Cellular Transformation of Bipolar Fuzzy Sets to Quantum Intelligence Machinery.

50. Private Coded Caching.

Catalog

Books, media, physical & digital resources