Volgen
Wenwen Tu
Wenwen Tu
Black Sesame Technologies Inc. (PhD from University of California-Davis)
Geverifieerd e-mailadres voor ucdavis.edu
Titel
Geciteerd door
Geciteerd door
Jaar
Keyless authentication and authenticated capacity
W Tu, L Lai
IEEE Transactions on Information Theory 64 (5), 3696-3714, 2018
282018
On function computation with privacy and secrecy constraints
W Tu, L Lai
IEEE Transactions on Information Theory 65 (10), 6716-6733, 2019
182019
On simultaneously generating multiple keys in a joint source-channel model
W Tu, M Goldenbaum, L Lai, HV Poor
IEEE Transactions on Information Forensics and Security 12 (2), 298-308, 2016
82016
On the simulatability condition in key generation over a non-authenticated public channel
W Tu, L Lai
2015 IEEE International Symposium on Information Theory (ISIT), 720-724, 2015
62015
Function computation with privacy constraints
W Tu, L Lai
2017 51st Asilomar Conference on Signals, Systems, and Computers, 1672-1676, 2017
42017
Keyless authentication over noisy channel
W Tu, L Lai
2016 50th Asilomar Conference on Signals, Systems and Computers, 1665-1669, 2016
32016
Simultaneously generating multiple keys over a cascade of a noiseless channel and a wiretap channel
W Tu, M Goldenbaum, L Lai, HV Poor
2016 IEEE Information Theory Workshop (ITW), 206-210, 2016
32016
On private lossy function computation
W Tu, L Lai
2018 IEEE 19th International Workshop on Signal Processing Advances in …, 2018
22018
Key generation with a Byzantine helper
W Tu, L Lai
2015 IEEE International Conference on Communication Workshop (ICCW), 429-434, 2015
12015
On secret key generation from finite source observations
W Tu, L Lai
2014 48th Annual Conference on Information Sciences and Systems (CISS), 1-6, 2014
12014
Secret Key and Private Key Capacities Over an Unauthenticated Public Channel
W Tu, L Lai
2019 IEEE Conference on Communications and Network Security (CNS), 1-5, 2019
2019
Information Theoretic Approaches for Security and Privacy
W Tu
University of California, Davis, 2018
2018
Secret Key Generation under Active Attacks
W Tu, L Lai
From Internet of Things to Smart Cities, 227-253, 2017
2017
Multiple key generation with restricted public discussion structure
W Tu, M Goldenbaum, L Lai, HV Poor
2016 IEEE Conference on Communications and Network Security (CNS), 641-645, 2016
2016
On the Simulatability Condition in Key Generation with an Active Adversary
W Tu, L Lai
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–15