Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Computer Networks and Communications,Computer Graphics and Computer-Aided Design,Computational Theory and Mathematics,Artificial Intelligence,General Computer Science
Reference20 articles.
1. Liang Y, Poor H, Shamai S. Secure communication over fading channels. IEEE Trans Inf Theory. 2008;54(6):2470–92.
2. Maurer UM. Secret key agreement by public discussion from common information. IEEE Trans Inf Theory. 1993;39(3):733–42.
3. Hero AO III. Secure space-time communication. IEEE Trans Inform Theory. 2003;49(12):3235–49.
4. Thangaraj A, Dihidar S, Calderbank AR, McLaughlin SW, Merolla JM. Capacity achieving codes for the wire tap channel with applications to quantum key distribution, CoRR, vol. cs.IT/0411003, 2004.
5. M Bloch, A Thangaraj, SW McLaughlin, J-M Merolla, LDPC-based Gaussian key reconciliation, in Proc. of the IEEE International Workshop on Information Theory, Punta del Este, Uruguay, 2006.