Author:
Bash Boulat A.,Gheorghe Andrei H.,Patel Monika,Habif Jonathan L.,Goeckel Dennis,Towsley Don,Guha Saikat
Publisher
Springer Science and Business Media LLC
Subject
General Physics and Astronomy,General Biochemistry, Genetics and Molecular Biology,General Chemistry
Reference42 articles.
1. Menezes, A. J., Vanstone, S. A. & Oorschot, P. C. V. Handbook of Applied Cryptography 1st edn CRC Press, Inc. (1996).
2. Talbot, J. & Welsh, D. Complexity and Cryptography: An Introduction Cambridge University Press (2006).
3. Wyner, A. D. The wiretap channel. Bell Syst. Tech. J. 54, 1355 (1975).
4. Csiszár, I. & Körner, J. Broadcast channels with confidential messages. IEEE T Inform Theory 24, 339–348 (1978).
5. Bloch, M. & Barros, J. Physical-Layer Security Cambridge Univ. Press (2011).
Cited by
60 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The Optimization of Covert Communication in Asymmetric Jammer-Assist Systems;Applied Sciences;2024-01-05
2. Quantum-secured covert sensing for the Doppler effect;Physical Review Research;2023-12-05
3. Asymptotics for Strassen’s optimal transport problem;Annales de l'Institut Henri Poincaré, Probabilités et Statistiques;2023-11-01
4. Spread Photon Transceiver for Quantum Secure Communications;MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM);2023-10-30
5. Covert Optical Communication over Turbulent Terrestrial Free-Space Optical Link;2023 23rd International Conference on Transparent Optical Networks (ICTON);2023-07-02