Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Escucha secreta")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 318

  • Page / 13
Export

Selection :

  • and

On a Conjecture by Belfiore and Sole on Some LatticesERNVALL-HYTÖNEN, Anne-Maria.IEEE transactions on information theory. 2012, Vol 58, Num 9, pp 5950-5955, issn 0018-9448, 6 p.Article

Wiretap Channels: Implications of the More Capable Condition and Cyclic Shift SymmetryOZEL, Omur; ULUKUS, Sennur.IEEE transactions on information theory. 2013, Vol 59, Num 4, pp 2153-2164, issn 0018-9448, 12 p.Article

Three-Receiver Broadcast Channels With Common and Confidential MessagesCHIA, Yeow-Khiang; EL GAMAL, Abbas.IEEE transactions on information theory. 2012, Vol 58, Num 5, pp 2748-2765, issn 0018-9448, 18 p.Article

Rate regions of secret key sharing in a new source modelSALIMI, S; SALMASIZADEH, M; AREF, M. R et al.IET communications (Print). 2011, Vol 5, Num 4, pp 443-455, issn 1751-8628, 13 p.Article

From the Archives: Colonel Butler's Satire of Bletchley ParkGREY, Christopher.Cryptologia. 2014, Vol 38, Num 3, pp 266-275, issn 0161-1194, 10 p.Article

From Identification to Signatures Via the Fiat-Shamir Transform : Necessary and Sufficient Conditions for Security and Forward-SecurityABDALLA, Michel; JEE HEA AN; BELLARE, Mihir et al.IEEE transactions on information theory. 2008, Vol 54, Num 8, pp 3631-3646, issn 0018-9448, 16 p.Article

Some Results Related to the Conjecture by Belfiore and SoléERNVALL-HYTÖNEN, Anne-Maria.IEEE transactions on information theory. 2014, Vol 60, Num 5, pp 2805-2812, issn 0018-9448, 8 p.Article

The Jack Butcher Case: A Story of Courage, Commitment, and ConcernFLYNN, William G; MANEKI, Sharon.Cryptologia. 2013, Vol 37, Num 3, pp 210-214, issn 0161-1194, 5 p.Article

Wiretap Channel With Side InformationYANLING CHEN; HAN VINCK, A. J.IEEE transactions on information theory. 2008, Vol 54, Num 1, pp 395-402, issn 0018-9448, 8 p.Article

Randomized quantum key distributionSHER, Muhammad; MUSHARRAF, Muhammad; MAGEDANZ, Thomas et al.Journal of optical communications. 2006, Vol 27, Num 5, pp 278-281, issn 0173-4911, 4 p.Article

Anonymity and closely related terms in the cyberspace: An analysis by example : Identity Protection and ManagementKAMBOURAKIS, Georgios.Journal of information security and applications. 2014, Vol 19, Num 1, pp 2-17, 16 p.Article

Finding More Than One Worm in the AppleBLAND, Mike.Communications of the ACM. 2014, Vol 57, Num 7, pp 58-64, issn 0001-0782, 7 p.Article

Security analysis of two lightweight RFID authentication protocolsSHAO-HUI, Wang; HAN ZHIJIE; SUJUAN, Liu et al.Annales des télécommunications. 2014, Vol 69, Num 5-6, pp 273-282, issn 0003-4347, 10 p.Article

Efficient and feasible quantum private comparison of equality against the collective amplitude damping noiseCHEN, Xiu-Bo; YUAN SU; NIU, Xin-Xin et al.Quantum information processing (Print). 2014, Vol 13, Num 1, pp 101-112, issn 1570-0755, 12 p.Article

New Results on Multiple-Input Multiple-Output Broadcast Channels With Confidential MessagesRUOHENG LIU; TIE LIU; VINCENT, H et al.IEEE transactions on information theory. 2013, Vol 59, Num 3, pp 1346-1359, issn 0018-9448, 14 p.Article

On Secure Network Coding With Nonuniform or Restricted Wiretap SetsTAO CUI; HO, Tracey; KLIEWER, Jörg et al.IEEE transactions on information theory. 2013, Vol 59, Num 1, pp 166-176, issn 0018-9448, 11 p.Article

Secure Multiplex Coding Attaining Channel Capacity in Wiretap ChannelsKOBAYASHI, Daisuke; YAMAMOTO, Hirosuke; OGAWA, Tomohiro et al.IEEE transactions on information theory. 2013, Vol 59, Num 12, pp 8131-8143, issn 0018-9448, 13 p.Article

Secure Network Coding for Wiretap Networks of Type IIEL ROUAYHEB, Salim; SOLJANIN, Emina; SPRINTSON, Alex et al.IEEE transactions on information theory. 2012, Vol 58, Num 3, pp 1361-1371, issn 0018-9448, 11 p.Article

Wiretap Channel With Causal State InformationCHIA, Yeow-Khiang; EL GAMAL, Abbas.IEEE transactions on information theory. 2012, Vol 58, Num 5, pp 2838-2849, issn 0018-9448, 12 p.Article

Photonic CDMA Systems with Security Physical LayersKIM, Ajung.IEEE communications letters. 2011, Vol 15, Num 1, pp 1-3, issn 1089-7798, 3 p.Article

A novel efficient conference scheme for mobile communicationsHUANG, Hui-Feng.International journal of mobile communications (print). 2008, Vol 6, Num 6, pp 750-759, issn 1470-949X, 10 p.Article

Backward Channel Protection Based on Randomized Tree-Walking Algorithm and Its Analysis for Securing RFID Tag Information and PrivacyCHOI, Wonjoon; YOON, Myungchul; ROH, Byeong-Hee et al.IEICE transactions on communications. 2008, Vol 91, Num 1, pp 172-182, issn 0916-8516, 11 p.Article

Man-in-the-middle attack on quantum secure communications with authenticationTZU HAN LIN; TZONELISH HWANG.Quantum information processing (Print). 2014, Vol 13, Num 4, pp 917-923, issn 1570-0755, 7 p.Article

Toward Photon-Efficient Key Distribution Over Optical ChannelsKOCHMAN, Yuval; LIGONG WANG; WORNELL, Gregory W et al.IEEE transactions on information theory. 2014, Vol 60, Num 8, pp 4958-4972, issn 0018-9448, 15 p.Article

Bipartite coherent-state quantum key distribution with strong reference pulseMISHRA, Manoj K; PRAKASH, Hari.Quantum information processing (Print). 2013, Vol 12, Num 2, pp 907-920, issn 1570-0755, 14 p.Article

  • Page / 13