An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

[图书][B] Physical-layer security: from information theory to security engineering

M Bloch, J Barros - 2011 - books.google.com
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …

Error-control coding for physical-layer secrecy

M Bloch, M Hayashi, A Thangaraj - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
The renewed interest for physical-layer security techniques has put forward a new role for
error-control codes. In addition to ensuring reliability, carefully designed codes have been …

Information theoretic security

Y Liang, HV Poor, S Shamai - Foundations and Trends® in …, 2009 - nowpublishers.com
The topic of information theoretic security is introduced and the principal results in this area
are reviewed. The basic wire-tap channel model is considered first, and then several specific …

[图书][B] Information theory

JCA Lubbe - 1997 - books.google.com
We live in the information society. The main aim of this book is to describe the basic ideas of
information theory, answering questions such as how may we transmit and store information …

[图书][B] Information theory: coding theorems for discrete memoryless systems

I Csiszár, J Körner - 2011 - books.google.com
Csiszár and Körner's book is widely regarded as a classic in the field of information theory,
providing deep insights and expert treatment of the key theoretical issues. It includes in …

Physical-layer security in the Internet of Things: Sensing and communication confidentiality under resource constraints

A Mukherjee - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
The Internet of Things (IoT) will feature pervasive sensing and control capabilities via a
massive deployment of machine-type communication (MTC) devices. The limited hardware …

The challenges facing physical layer security

W Trappe - IEEE communications magazine, 2015 - ieeexplore.ieee.org
There has recently been significant interest in applying the principles of information-
theoretical security and signal processing to secure physical layer systems. Although the …

Information security: where computer science, economics and psychology meet

R Anderson, T Moore - Philosophical Transactions of the …, 2009 - royalsocietypublishing.org
Until ca. 2000, information security was seen as a technological discipline, based on
computer science but with mathematics helping in the design of ciphers and protocols. That …

Semantic security for the wiretap channel

M Bellare, S Tessaro, A Vardy - Annual cryptology conference, 2012 - Springer
The wiretap channel is a setting where one aims to provide information-theoretic privacy of
communicated data based solely on the assumption that the channel from sender to …