Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coding for Non-IID Sources and Channels: Entropic Approximations and a Question of Ahlswede., , and . ITW, page 1-5. IEEE, (2019)Private Authentication with Physical Identifiers Through Broadcast Channel Measurements., , and . ITW, page 1-5. IEEE, (2019)On the Optimality of D2D Coded Caching With Uncoded Cache Placement and One-Shot Delivery., , , and . IEEE Trans. Commun., 67 (12): 8179-8192 (2019)An I-MMSE based graphical representation of rate and equivocation for the Gaussian broadcast channel., , , and . CNS, page 53-58. IEEE, (2015)Information Theoretic Methods for Future Communication Systems., , , and . Entropy, 25 (3): 392 (March 2023)Secure Lossy Function Computation with Multiple Private Remote Source Observations., , and . IACR Cryptol. ePrint Arch., (2022)Secure Integrated Sensing and Communication., , , and . IACR Cryptol. ePrint Arch., (2022)Code Constructions and Bounds for Identification via Channels., , , and . IACR Cryptol. ePrint Arch., (2021)Privacy, Secrecy, and Storage With Nested Randomized Polar Subcode Constructions., , , , and . IEEE Trans. Commun., 70 (1): 514-525 (2022)Turing Meets Shannon: On the Algorithmic Construction of Channel-Aware Codes., , and . IEEE Trans. Commun., 70 (4): 2256-2267 (2022)