Author:
Sasaki Tatsuya,Agbor Bateh Mathias,Masuda Shingo,Hayashi Yu-ichi,Mizuki Takaaki,Sone Hideaki
Publisher
Springer International Publishing
Reference16 articles.
1. Lecture Notes in Computer Science;H Ahmadi,2014
2. Bennett, C.H., Brassard, G., Crépeau, C., Maurer, U.M.: Generalized privacy amplification. IEEE Trans. Inf. Theory 41(6), 1915–1923 (1995).
https://doi.org/10.1109/18.476316
3. Colbourn, C.J., Colbourn, C.: The Combinatorics of Network Reliability, vol. 200. Oxford University Press, New York (1987)
4. Csiszár, I., Narayan, P.: Secrecy capacities for multiple terminals. IEEE Trans. Inf. Theory 50(12), 3047–3061 (2004).
https://doi.org/10.1109/TIT.2004.838380
5. Dolev, D., Dwork, C., Waarts, O., Yung, M.: Perfectly secure message transmission. J. ACM 40(1), 17–47 (1993).
https://doi.org/10.1145/138027.138036