Wireless network secrecy with public feedback. Perron, E., Diggavi, S N., & Telatar, E. In Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, pages 753–760, September, 2008. abstract bibtex We study a line network with an eavesdropper having access to the relay transmission. We assume that there could also be a public feedback channel from the destination. We develop achievable strategies to achieve certain rate-equivocation pairs.
@inproceedings{PDTj08,
abstract = {We study a line network with an eavesdropper having access to the
relay transmission. We assume that there could also be a public feedback channel from the destination. We develop achievable strategies to achieve certain rate-equivocation pairs.},
author = {E. Perron and S N. Diggavi and E. Telatar},
booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},
file = {:papers:pdt_allerton08.pdf},
month = {September},
note = {},
pages = {753--760},
tags = {conf,ITsecrecy,IT,WiNetSec,WiNetInfFlow,WiNet,InteractiveSec,SelConf},
title = {Wireless network secrecy with public feedback},
type = {4},
year = {2008}
}
Downloads: 0
{"_id":"5J7cs2FDovPPNv5oP","bibbaseid":"perron-diggavi-telatar-wirelessnetworksecrecywithpublicfeedback-2008","author_short":["Perron, E.","Diggavi, S N.","Telatar, E."],"bibdata":{"bibtype":"inproceedings","type":"4","abstract":"We study a line network with an eavesdropper having access to the relay transmission. We assume that there could also be a public feedback channel from the destination. We develop achievable strategies to achieve certain rate-equivocation pairs.","author":[{"firstnames":["E."],"propositions":[],"lastnames":["Perron"],"suffixes":[]},{"firstnames":["S","N."],"propositions":[],"lastnames":["Diggavi"],"suffixes":[]},{"firstnames":["E."],"propositions":[],"lastnames":["Telatar"],"suffixes":[]}],"booktitle":"Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois","file":":papers:pdt_allerton08.pdf","month":"September","note":"","pages":"753–760","tags":"conf,ITsecrecy,IT,WiNetSec,WiNetInfFlow,WiNet,InteractiveSec,SelConf","title":"Wireless network secrecy with public feedback","year":"2008","bibtex":"@inproceedings{PDTj08,\n abstract = {We study a line network with an eavesdropper having access to the\nrelay transmission. We assume that there could also be a public feedback channel from the destination. We develop achievable strategies to achieve certain rate-equivocation pairs.},\n author = {E. Perron and S N. Diggavi and E. Telatar},\n booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},\n file = {:papers:pdt_allerton08.pdf},\n month = {September},\n note = {},\n pages = {753--760},\n tags = {conf,ITsecrecy,IT,WiNetSec,WiNetInfFlow,WiNet,InteractiveSec,SelConf},\n title = {Wireless network secrecy with public feedback},\n type = {4},\n year = {2008}\n}\n\n","author_short":["Perron, E.","Diggavi, S N.","Telatar, E."],"key":"PDTj08","id":"PDTj08","bibbaseid":"perron-diggavi-telatar-wirelessnetworksecrecywithpublicfeedback-2008","role":"author","urls":{},"metadata":{"authorlinks":{}},"html":""},"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/e2kjGxYgtBo8SWSbC","dataSources":["hicKnsKYNEFXC4CgH","jxCYzXXYRqw2fiEXQ","wCByFFrQMyRwfzrJ6","yuqM5ah4HMsTyDrMa","YaM87hGQiepg5qijZ","n9wmfkt5w8CPqCepg","soj2cS6PgG8NPmWGr","FaDBDiyFAJY5pL28h","ycfdiwWPzC2rE6H77"],"keywords":[],"search_terms":["wireless","network","secrecy","public","feedback","perron","diggavi","telatar"],"title":"Wireless network secrecy with public feedback","year":2008}