From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

ε-Almost Collision-Flat Universal Hash Functions Motivated by Information-Theoretic Security., и . ISIT, стр. 2589-2594. IEEE, (2023)Mosaics of combinatorial designs for privacy amplification., и . ISIT, стр. 1630-1635. IEEE, (2021)Common Randomness Generation over Slow Fading Channels., , , и . ISIT, стр. 1925-1930. IEEE, (2021)Optimal power allocation policies for the reliable transmission of a single packet via ARQ protocols., , и . ACSCC, стр. 475-479. IEEE, (2008)Statistical verification of upper and lower bounds for the security performance of wiretap channels., , , и . WCNC, стр. 1-6. IEEE, (2023)Semantic Security via Seeded Modular Coding Schemes and Ramanujan Graphs., и . IEEE Trans. Inf. Theory, 67 (1): 52-80 (2021)Arbitrarily Varying Wiretap Channels with Non-Causal Side Information at the Jammer., , , и . ISIT, стр. 938-943. IEEE, (2020)Information-Theoretically Secret Reed-Muller Identification with Affine Designs., , , , и . CoRR, (2023)Implementation of Physical Layer Security into 5G NR Systems and E2E Latency Assessment., , , , , , и . GLOBECOM, стр. 4044-4050. IEEE, (2022)Identification over the Gaussian Channel in the Presence of Feedback., , , и . ISIT, стр. 278-283. IEEE, (2021)