{"_id":"i2nBcvRC7u273X5cG","bibbaseid":"bloch-gnl-yener-oggier-poor-sankar-schaefer-anoverviewofinformationtheoreticsecurityandprivacymetricslimitsandapplications-2021","author_short":["Bloch, M. R.","Günlü, O.","Yener, A.","Oggier, F. E.","Poor, H. V.","Sankar, L.","Schaefer, R. F."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Matthieu","R."],"propositions":[],"lastnames":["Bloch"],"suffixes":[]},{"firstnames":["Onur"],"propositions":[],"lastnames":["Günlü"],"suffixes":[]},{"firstnames":["Aylin"],"propositions":[],"lastnames":["Yener"],"suffixes":[]},{"firstnames":["Frédérique","E."],"propositions":[],"lastnames":["Oggier"],"suffixes":[]},{"firstnames":["H.","Vincent"],"propositions":[],"lastnames":["Poor"],"suffixes":[]},{"firstnames":["Lalitha"],"propositions":[],"lastnames":["Sankar"],"suffixes":[]},{"firstnames":["Rafael","F."],"propositions":[],"lastnames":["Schaefer"],"suffixes":[]}],"title":"An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications","journal":"IEEE J. Sel. Areas Inf. Theory","volume":"2","number":"1","pages":"5–22","year":"2021","url":"https://doi.org/10.1109/JSAIT.2021.3062755","doi":"10.1109/JSAIT.2021.3062755","timestamp":"Wed, 07 Apr 2021 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/jsait/BlochGYOPSS21.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/jsait/BlochGYOPSS21,\n author = {Matthieu R. Bloch and\n Onur G{\\\"{u}}nl{\\\"{u}} and\n Aylin Yener and\n Fr{\\'{e}}d{\\'{e}}rique E. Oggier and\n H. Vincent Poor and\n Lalitha Sankar and\n Rafael F. Schaefer},\n title = {An Overview of Information-Theoretic Security and Privacy: Metrics,\n Limits and Applications},\n journal = {{IEEE} J. Sel. Areas Inf. Theory},\n volume = {2},\n number = {1},\n pages = {5--22},\n year = {2021},\n url = {https://doi.org/10.1109/JSAIT.2021.3062755},\n doi = {10.1109/JSAIT.2021.3062755},\n timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/jsait/BlochGYOPSS21.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Bloch, M. R.","Günlü, O.","Yener, A.","Oggier, F. E.","Poor, H. V.","Sankar, L.","Schaefer, R. F."],"key":"DBLP:journals/jsait/BlochGYOPSS21","id":"DBLP:journals/jsait/BlochGYOPSS21","bibbaseid":"bloch-gnl-yener-oggier-poor-sankar-schaefer-anoverviewofinformationtheoreticsecurityandprivacymetricslimitsandapplications-2021","role":"author","urls":{"Paper":"https://doi.org/10.1109/JSAIT.2021.3062755"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://dblp.org/pid/82/5303.bib","dataSources":["FdmGugSWQcS4h8nAc"],"keywords":[],"search_terms":["overview","information","theoretic","security","privacy","metrics","limits","applications","bloch","günlü","yener","oggier","poor","sankar","schaefer"],"title":"An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications","year":2021}