W. Saad, Z. Han, M. Debbah, A. Hjørungnes, and T. Basar. (2009)cite arxiv:0905.4057
Comment: IEEE Signal Processing Magazine, Special Issue on Game Theory, to
appear, 2009. IEEE Signal Processing Magazine, Special Issue on Game Theory,
to appear, 2009.
F. Xie, T. Furon, and C. Fontaine. MM&\#38;Sec '08: Proceedings of the 10th ACM workshop on Multimedia and security, page 101--106. New York, NY, USA, ACM, (2008)
N. Anthapadmanabhan, and A. Barg. (2009)cite arxiv:0905.0417
Comment: 5 pages, 1 figure, Proc. 2009 IEEE International Symposium on
Information Theory (ISIT 2009), Seoul, Korea, June 28 - July 3, 2009.
P. Moulin, and N. Kiyevash. Proc. IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2007, 2, page II-157--II-160. (15--20 April 2007)
W. gyum Kim, S. Lee, Y. seok Seo, and Y. Suh. Proc. Fifth International Conference on Information, Communications and Signal Processing, page 1112--1115. (06--09 Dec. 2005)
F. Benhammadi, K. Beghdad, and H. Hentous. Proc. IEEE/ACS International Conference on Computer Systems and Applications AICCSA 2008, page 530--536. (March 2008)
A. Barg, and G. Kabatiansky. Journal of Complexity, 20 (2-3):
137 - 147(2004)Festschrift for Harald Niederreiter, Special Issue on Coding and Cryptography.
N. Anthapadmanabhan, A. Barg, and I. Dumer. (2006)cite arxiv:cs/0612073
Comment: final version, 12 pages, 2 figures, to appear in IEEE Trans. on
Inform. Theory - Special Issue on Information-theoretic Security, Jun 2008,
simplified proofs in Sections II and III, changes in Theorem 4.1.