총 601건 중 601건 출력
, 3/61 페이지
-
21
-
Statistical Random Number Generator Attack Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
-
Chamon, Christiana;
Ferdous, Shahriar;
Kish, Laszlo B.;
Department of Electrical and Computer Engineering, Texas A&M University, 400 Bizzell St., College Station, TX 77843, USA;
Department of Electrical and Computer Engineering, Texas A&M University, 400 Bizzell St., College Station, TX 77843, USA;
Department of Electrical and Computer Engineering, Texas A&M University, 400 Bizzell St., College Station, TX 77843, USA;
(Fluctuation and Noise Letters,
v.21,
2022,
pp.2250027)
-
22
-
Keyless authentication in the presence of a simultaneously transmitting adversary
-
Graves, Eric;
Yu, Paul;
Spasojevic, Predrag;
;
(Information Theory Workshop (ITW), 2016 IEEE,
v.2016,
2016,
pp.201-205)
-
23
-
Wiretapped Oblivious Transfer
-
Mishra, Manoj;
Dey, Bikash Kumar;
Prabhakaran, Vinod M.;
Diggavi, Suhas N.;
;
(IEEE transactions on information theory,
v.63,
2017,
pp.2560-2595)
-
24
-
A Comparative Secrecy Study of Flying and Ground Eavesdropping in UAV Based Communication Systems
-
Abughalwa, Monir;
Hasna, Mazen O.;
Qatar University, Electrical Engineering Department;
Qatar University, Electrical Engineering Department;
(Information and Communication Technology Convergence (ICTC), 2019 International Conference on,
v.2019,
2019,
pp.416-421)
-
25
-
Multiple key generation with restricted public discussion structure
-
Tu, Wenwen;
Goldenbaum, Mario;
Lai, Lifeng;
Poor, H. Vincent;
;
(Communications and Network Security (CNS), 2016 IEEE Conference on,
v.2016,
2016,
pp.641-645)
-
26
-
On Simultaneously Generating Multiple Keys in a Joint Source-Channel Model
-
Tu, Wenwen;
Goldenbaum, Mario;
Lai, Lifeng;
Poor, H. Vincent;
;
(IEEE transactions on information forensics and security,
v.12,
2017,
pp.298-308)
-
27
-
On the secret-key rate of binary random variables
-
Gander, M.J.;
Maurer, U.M.;
;
(Information Theory, 1994. Proceedings., 1994 IEEE International Symposium on,
v.1994,
1994,
pp.351)
-
28
-
The oblivious transfer capacity of the wiretapped binary erasure channel
-
Mishra, Manoj;
Dey, Bikash Kumar;
Prabhakaran, Vinod M.;
Diggavi, Suhas;
;
(Information Theory (ISIT), 2014 IEEE International Symposium on,
v.2014,
2014,
pp.1539-1543)
-
29
-
On the oblivious transfer capacity of the degraded wiretapped binary erasure channel
-
Mishra, Manoj;
Dey, Bikash Kumar;
Prabhakaran, Vinod M.;
Diggavi, Suhas;
;
(Information Theory (ISIT), 2015 IEEE International Symposium on,
v.2015,
2015,
pp.1169-1173)
-
30
-
Quantum key agreement
-
van Dijk, M.;
Koppelaar, A.;
;
(Information Theory, 1998. Proceedings. 1998 IEEE International Symposium on,
v.1998,
1998,
pp.350)