@article{VSPUI_2011_2_a4,
author = {M. A. Zolotukhin and A. Yu. Garnaev and V. V. Zakharov},
title = {Data transmissions with information leakage},
journal = {Vestnik Sankt-Peterburgskogo universiteta. Prikladna\^a matematika, informatika, processy upravleni\^a},
pages = {40--54},
year = {2011},
number = {2},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/VSPUI_2011_2_a4/}
}
TY - JOUR AU - M. A. Zolotukhin AU - A. Yu. Garnaev AU - V. V. Zakharov TI - Data transmissions with information leakage JO - Vestnik Sankt-Peterburgskogo universiteta. Prikladnaâ matematika, informatika, processy upravleniâ PY - 2011 SP - 40 EP - 54 IS - 2 UR - http://geodesic.mathdoc.fr/item/VSPUI_2011_2_a4/ LA - ru ID - VSPUI_2011_2_a4 ER -
%0 Journal Article %A M. A. Zolotukhin %A A. Yu. Garnaev %A V. V. Zakharov %T Data transmissions with information leakage %J Vestnik Sankt-Peterburgskogo universiteta. Prikladnaâ matematika, informatika, processy upravleniâ %D 2011 %P 40-54 %N 2 %U http://geodesic.mathdoc.fr/item/VSPUI_2011_2_a4/ %G ru %F VSPUI_2011_2_a4
M. A. Zolotukhin; A. Yu. Garnaev; V. V. Zakharov. Data transmissions with information leakage. Vestnik Sankt-Peterburgskogo universiteta. Prikladnaâ matematika, informatika, processy upravleniâ, no. 2 (2011), pp. 40-54. http://geodesic.mathdoc.fr/item/VSPUI_2011_2_a4/
[1] Bennett C., Brassard G., Crepeau C., Maurer U. M., “Generalized privacy amplification”, IEEE Trans. on Information Theory, 41 (1995), 1915–1923 | DOI | MR | Zbl
[2] Garnaev A. Trappe W., “An eavesdropping game with SINR as an objective function”, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 19, 2009, 142–162 | DOI | Zbl
[3] Hero A. E., “Secure Space-Time Communication”, IEEE Trans. Info. Theory, 23 (2003), 3235–3249 | DOI | MR
[4] Koorapaty H., Hassan A. A., Chennakeshu S., “Secure Information Transmission for Mobile Radio”, IEEE Trans. Wireless Commun., 41 (2003), 52–55
[5] Liang Y., Poor H. V., Shamai S., “Secure Communication over Fading Channels”, IEEE Transactions on Information Theory, 54:6, Special issue on Information Theoretic Security (2008), 2470–2492 | DOI | MR
[6] Wyner A., “The wire-tap channel”, Bell. Syst. Tech. J., 54:8 (1975), 1355–1387 | MR | Zbl
[7] Gopala P. K., Lai L., El Gamal H., “On the Secrecy Capacity of Fading Channels”, IEEE Transactions on Information Theory, 54:10 (2008), 4687–4698 | DOI | MR
[8] Ueli M. Maurer, Stefan Wolf., “Information-theoretic key agreement: From weak to strong secrecy for free”, EUROCRYPT, 2000, 351–368 | MR | Zbl
[9] Shannon C. E., “A Mathematical Theory of Communication”, Bell System Technical Journal, 27 (1948), 379–423, 623–656 | MR | Zbl
[10] Shannon C. E., “Communication theory of secrecy systems”, Bell System Technical Journal, 28 (1949), 656–715 | MR | Zbl
[11] Altman E., Avrachenkov K., Garnaev A., “A jamming game in wireless networks with transmission cost”, Lecture Notes in Computer Science, 4465, 2007, 1–12 | DOI | Zbl
[12] Vishnevskii V. M., Lyakhov A. I., Portnoi S. L., Shakhnovich I. V., Shirokopolosnye besprovodnye seti peredachi informatsii, Tekhnosfera, M., 2005, 592 pp.
[13] Leung-Yan-Cheong S. K., Hellman M. E., “The Gaussian Wire-Tap Channel”, IEEE Trans. on Information Theory, 24 (1978), 451–456 | DOI | MR | Zbl
[14] Liang Y., Poor H. V., “Generalized multiple access channels with confidential messages”, IEEE Trans. on Information Theory, 2007, 112–122 | MR