Author of the publication

Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities.

, and . FPS, volume 7743 of Lecture Notes in Computer Science, page 78-94. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multipath Private Communication: An Information Theoretic Approach., and . CoRR, (2014)Secret Key Agreement over a Pair of Independent Broadcast Channels, and . CoRR, (2010)Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities., and . FPS, volume 7743 of Lecture Notes in Computer Science, page 78-94. Springer, (2012)Secret Keys from Channel Noise., and . EUROCRYPT, volume 6632 of Lecture Notes in Computer Science, page 266-283. Springer, (2011)Message transmission and key establishment: General equality for weak and strong capacities., and . J. Inf. Secur. Appl., 18 (1): 83-95 (2013)Distance Lower Bounding., , and . ICICS, volume 8958 of Lecture Notes in Computer Science, page 89-104. Springer, (2014)A bio-inspired vestibular system using MEMS sensors and 3D printing technology., , , , , and . ICST, page 1-6. IEEE, (2019)Secret key establishment over a pair of independent broadcast channels., and . ISITA, page 185-190. IEEE, (2010)Detection of Algebraic Manipulation in the Presence of Leakage., and . ICITS, volume 8317 of Lecture Notes in Computer Science, page 238-258. Springer, (2013)Graph Model Implementation of Attribute-Based Access Control Policies., and . CoRR, (2019)