Author of the publication

Network Security for Client-Server Architecture Using Wiretap Codes.

, , and . IEEE Trans. Inf. Forensics Secur., 3 (3): 404-413 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated Direct-Modulation Based Quantum Cryptography System., , , and . OpNeTec, volume 164 of IFIP International Federation for Information Processing, page 390-395. Springer, (2004)Simultaneous Seismic Sources Separation Based on Matrioshka Orthogonal Matching Pursuit, Application in Oil and Gas Exploration., , , , and . IEEE Trans. Geosci. Remote. Sens., 58 (7): 4529-4546 (2020)Secrecy Rates for a Channel With Two Senders and Two Receivers., , and . CoRR, (2019)Strong Coordination of Signals and Actions over Noisy Channels., , , and . CoRR, (2017)LDPC-based secret key agreement over the Gaussian wiretap channel., , , and . ISIT, page 1179-1183. IEEE, (2006)Embedding Covert Information in Broadcast Communications., and . IEEE Trans. Inf. Forensics Secur., 14 (10): 2787-2801 (2019)On Covert Quantum Sensing and the Benefits of Entanglement., and . CoRR, (2020)Keyless Covert Communication in the Presence of Channel State Information., , and . ISIT, page 834-839. IEEE, (2020)A 25-34-GHz Eight-Element MIMO Transmitter for Keyless High Throughput Directionally Secure Communication., , , , , , and . IEEE J. Solid State Circuits, 57 (5): 1244-1256 (2022)Covert Communication Over Noisy Channels: A Resolvability Perspective.. IEEE Trans. Inf. Theory, 62 (5): 2334-2354 (2016)