Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On MMSE properties of optimal codes for the Gaussian wiretap channel., , , and . ITW, page 1-5. IEEE, (2015)An I-MMSE based graphical representation of rate and equivocation for the Gaussian broadcast channel., , , and . CNS, page 53-58. IEEE, (2015)The Deterministic and Correlated Random Public-Confidential Capacity Regions of the Arbitrarily Varying Wiretap Channel., , and . WIFS, page 1-7. IEEE, (2018)On the Optimality of D2D Coded Caching With Uncoded Cache Placement and One-Shot Delivery., , , and . IEEE Trans. Commun., 67 (12): 8179-8192 (2019)On Stochastic Orders and Fast Fading Multiuser Channels with Statistical CSIT., , , , and . CoRR, (2017)Artificial Noise-Aided Physical Layer Security in Underlay Cognitive Massive MIMO Systems with Pilot Contamination., , and . Entropy, 19 (7): 349 (2017)Secure Integrated Sensing and Communication., , , and . IACR Cryptol. ePrint Arch., (2022)Code Constructions and Bounds for Identification via Channels., , , and . IACR Cryptol. ePrint Arch., (2021)Secure Lossy Function Computation with Multiple Private Remote Source Observations., , and . IACR Cryptol. ePrint Arch., (2022)Information Theoretic Methods for Future Communication Systems., , , and . Entropy, 25 (3): 392 (March 2023)