Keyless authentication and authenticated capacity W Tu, L Lai IEEE Transactions on Information Theory 64 (5), 3696-3714, 2018 | 28 | 2018 |
On function computation with privacy and secrecy constraints W Tu, L Lai IEEE Transactions on Information Theory 65 (10), 6716-6733, 2019 | 18 | 2019 |
On simultaneously generating multiple keys in a joint source-channel model W Tu, M Goldenbaum, L Lai, HV Poor IEEE Transactions on Information Forensics and Security 12 (2), 298-308, 2016 | 8 | 2016 |
On the simulatability condition in key generation over a non-authenticated public channel W Tu, L Lai 2015 IEEE International Symposium on Information Theory (ISIT), 720-724, 2015 | 6 | 2015 |
Function computation with privacy constraints W Tu, L Lai 2017 51st Asilomar Conference on Signals, Systems, and Computers, 1672-1676, 2017 | 4 | 2017 |
Keyless authentication over noisy channel W Tu, L Lai 2016 50th Asilomar Conference on Signals, Systems and Computers, 1665-1669, 2016 | 3 | 2016 |
Simultaneously generating multiple keys over a cascade of a noiseless channel and a wiretap channel W Tu, M Goldenbaum, L Lai, HV Poor 2016 IEEE Information Theory Workshop (ITW), 206-210, 2016 | 3 | 2016 |
On private lossy function computation W Tu, L Lai 2018 IEEE 19th International Workshop on Signal Processing Advances in …, 2018 | 2 | 2018 |
Key generation with a Byzantine helper W Tu, L Lai 2015 IEEE International Conference on Communication Workshop (ICCW), 429-434, 2015 | 1 | 2015 |
On secret key generation from finite source observations W Tu, L Lai 2014 48th Annual Conference on Information Sciences and Systems (CISS), 1-6, 2014 | 1 | 2014 |
Secret Key and Private Key Capacities Over an Unauthenticated Public Channel W Tu, L Lai 2019 IEEE Conference on Communications and Network Security (CNS), 1-5, 2019 | | 2019 |
Information Theoretic Approaches for Security and Privacy W Tu University of California, Davis, 2018 | | 2018 |
Secret Key Generation under Active Attacks W Tu, L Lai From Internet of Things to Smart Cities, 227-253, 2017 | | 2017 |
Multiple key generation with restricted public discussion structure W Tu, M Goldenbaum, L Lai, HV Poor 2016 IEEE Conference on Communications and Network Security (CNS), 641-645, 2016 | | 2016 |
On the Simulatability Condition in Key Generation with an Active Adversary W Tu, L Lai | | |