An overview of information-theoretic security and privacy: Metrics, limits and applications
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
6G and the Post‐Shannon Theory
Since the breakthrough of Shannon's seminal paper, researchers and engineers have
worked on codes and techniques that approach the fundamental limits of message …
worked on codes and techniques that approach the fundamental limits of message …
Denial-of-service attacks on communication systems: Detectability and jammer knowledge
Wireless communication systems are inherently vulnerable to intentional jamming. In this
paper, two classes of such jammers are considered: those with partial and full knowledge …
paper, two classes of such jammers are considered: those with partial and full knowledge …
The arbitrarily varying wiretap channel—Secret randomness, stability, and super-activation
We define the common randomness-assisted capacity of an arbitrarily varying wiretap
channel (AVWC) when the eavesdropper is kept ignorant about the common randomness …
channel (AVWC) when the eavesdropper is kept ignorant about the common randomness …
[图书][B] Identification and other probabilistic models
R Ahlswede, A Ahlswede - 2021 - Springer
After an introduction to classical information theory, we present now primarily own methods
and models, which go considerably beyond it. They were also sketched in our Shannon …
and models, which go considerably beyond it. They were also sketched in our Shannon …
Secure identification under passive eavesdroppers and active jamming attacks
In next-generation connectivity systems, which rely on robust and low-latency information
exchange, there exists communication tasks in which the Ahlswede/Dueck identification …
exchange, there exists communication tasks in which the Ahlswede/Dueck identification …
Covert communication in the presence of an uninformed, informed, and coordinated jammer
H ZivariFard, MR Bloch… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
This paper is eligible for the Jack Keil Wolf ISIT Student Paper Award. This paper
investigates covert communication in the presence of a cooperative jammer. Covert …
investigates covert communication in the presence of a cooperative jammer. Covert …
Arbitrarily varying wiretap channels with type constrained states
Determining a single-letter secrecy-capacity formula for the arbitrarily varying wiretap
channel (AVWTC) is an open problem largely because of two main challenges. Not only …
channel (AVWTC) is an open problem largely because of two main challenges. Not only …
Sufficiently myopic adversaries are blind
We consider a communication problem in which a sender, Alice, wishes to communicate
with a receiver, Bob, over a channel controlled by an adversarial jammer, James, who is …
with a receiver, Bob, over a channel controlled by an adversarial jammer, James, who is …
Semantic security via seeded modular coding schemes and Ramanujan graphs
M Wiese, H Boche - IEEE Transactions on Information Theory, 2020 - ieeexplore.ieee.org
A novel type of functions called biregular irreducible functions is introduced and applied as
security components (instead of, eg, universal hash functions) in seeded modular wiretap …
security components (instead of, eg, universal hash functions) in seeded modular wiretap …