Obserwuj
Pengwei Wang
Pengwei Wang
Zweryfikowany adres z ucalgary.ca - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
A model for adversarial wiretap channels
P Wang, R Safavi-Naini
IEEE Transactions on Information Theory 62 (2), 970-983, 2015
402015
Codes for limited view adversarial channels
R Safavi-Naini, P Wang
International Symposium on Information theory, 266-270, 2013
142013
An efficient code for Adversarial Wiretap channel
P Wang, R Safavi-Naini
Information Theory Workshop, 40-44, 2014
132014
Detecting Algebraic Manipulation in Leaky Storage Systems
F Lin, R Safavi-Naini, P Wang
Information Theoretic Security: 9th International Conference, ICITS 2016 …, 2016
72016
Efficient codes for Limited View adversarial channels
R Safavi-Naini, P Wang
IEEE Conference on Communications and Network Security, 215-223, 2013
72013
Erasure adversarial wiretap channels
P Wang, R Safavi-Naini, F Lin
2015 53rd Annual Allerton Conference on Communication, Control, and …, 2015
62015
Limited View Adversary Codes: Bounds, Constructions and Applications
P Wang, R Safavi-Naini
International Conference on Information Theoretic Security, 214-235, 2015
62015
A Model for Adversarial Wiretap Channels and its Applications
R Safavi-Naini, P Wang
Journal of Information Processing 23 (5), 554-561, 2015
62015
A General Construction for 1-Round δ-RMT and (0, δ)-SMT
R Safavi-Naini, MA Tuhin, P Wang
Applied Cryptography and Network Security, 344-362, 2012
62012
Adversarial wiretap channel with public discussion
P Wang, R Safavi-Naini
IEEE Conference on Communications and Network Security, 281-289, 2015
52015
Codes for detection of limited view algebraic tampering
F Lin, R Safavi-Naini, P Wang
International Conference on Information Security and Cryptology, 309-320, 2016
12016
Information-theoretically secure key agreement over partially corrupted channels
R Safavi-Naini, P Wang
arXiv preprint arXiv:1604.03824, 2016
12016
Secure Key Agreement over Partially Corrupted Channels
R Safavi-Naini, P Wang
2018 IEEE International Symposium on Information Theory (ISIT), 2649-2653, 2018
2018
Interactive message transmission over adversarial wiretap channel II
P Wang, R Safavi-Naini
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
2017
Detecting Algebraic Manipulation in Leaky
FLR Safavi-Naini, P Wang
Information Theoretic Security: 9th International Conference, ICITS 2016 …, 2016
2016
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–15