Author of the publication

Secrecy and robustness for active attack in secure network coding.

, , , and . ISIT, page 1172-1176. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ε-convertibility of entangled states and extension of Schmidt rank in infinite-dimensional systems., , , and . Quantum Inf. Comput., 8 (1): 30-52 (2008)Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network With Free One-Way Public Communication., , and . IEEE Trans. Inf. Theory, 67 (7): 4564-4587 (2021)From Bell Inequalities to Tsirelson's Theorem., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (5): 1254-1267 (2009)Tight asymptotic bounds on local hypothesis testing between a pure bipartite state and the white noise state., and . ISIT, page 691-695. IEEE, (2015)Reduction Theorem for Secrecy over Linear Network Code for Active Attacks., , , and . Entropy, 22 (9): 1053 (2020)Secrecy and robustness for active attack in secure network coding., , , and . ISIT, page 1172-1176. IEEE, (2017)Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network with Free One-Way Public Communication., , and . CoRR, (2020)Local Hypothesis Testing Between a Pure Bipartite State and the White Noise State., and . IEEE Trans. Inf. Theory, 61 (12): 6995-7011 (2015)Tight Asymptotic Bounds on Local Hypothesis Testing Between a Pure Bipartite State and the White Noise State., and . IEEE Trans. Inf. Theory, 63 (6): 4008-4036 (2017)On the Power of the PPT Constraint in the Symmetric Extensions Test for Separability., , and . TCQ, volume 5906 of Lecture Notes in Computer Science, page 94-106. Springer, (2009)