A survey on quantum channel capacities

L Gyongyosi, S Imre, HV Nguyen - … Communications Surveys & …, 2018 - ieeexplore.ieee.org
Quantum information processing exploits the quantum nature of information. It offers
fundamentally new solutions in the field of computer science and extends the possibilities to …

Network coding theory: A survey

R Bassoli, H Marques, J Rodriguez… - … Surveys & Tutorials, 2013 - ieeexplore.ieee.org
This article surveys all known fields of network coding theory and leads the reader through
the antecedents of the network coding theory to the most recent results, considering also …

[หนังสือ][B] Physical-layer security: from information theory to security engineering

M Bloch, J Barros - 2011 - books.google.com
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …

[หนังสือ][B] Network information theory

A El Gamal, YH Kim - 2011 - books.google.com
This comprehensive treatment of network information theory and its applications provides
the first unified coverage of both classical and recent results. With an approach that …

Determinants of behavioral intention to mobile banking

JC Gu, SC Lee, YH Suh - Expert Systems with Applications, 2009 - Elsevier
With the improvement of mobile technologies and devices, banking users are able to
conduct banking services at anyplace and at anytime. Recently, many banks in the world …

[หนังสือ][B] Information theory and network coding

RW Yeung - 2008 - books.google.com
This book is an evolution from my book A First Course in Information Theory published in
2002 when network coding was still at its infancy. The last few years have witnessed the …

Information theoretic security

Y Liang, HV Poor, S Shamai - Foundations and Trends® in …, 2009 - nowpublishers.com
The topic of information theoretic security is introduced and the principal results in this area
are reviewed. The basic wire-tap channel model is considered first, and then several specific …

Wireless network information flow: A deterministic approach

AS Avestimehr, SN Diggavi… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
In a wireless network with a single source and a single destination and an arbitrary number
of relay nodes, what is the maximum rate of information flow achievable? We make progress …

Resilient network coding in the presence of byzantine adversaries

S Jaggi, M Langberg, S Katti, T Ho… - … INFOCOM 2007-26th …, 2007 - ieeexplore.ieee.org
Network coding substantially increases network throughput. But since it involves mixing of
information inside the network, a single corrupted packet generated by a malicious node can …

Homomorphic signatures for polynomial functions

D Boneh, DM Freeman - … in Cryptology–EUROCRYPT 2011: 30th Annual …, 2011 - Springer
We construct the first homomorphic signature scheme that is capable of evaluating
multivariate polynomials on signed data. Given the public key and a signed data set, there is …