SearchNote: This “quick search” only finds text in the shown fields,
not in abstracts or keywords. The search term must have at least
3 letters.
2022
- CSI Clustering with Variational Autoencoding. IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE, 2022ICCASP 2022 more… Full text ( DOI )
2020
- Secure Storage Capacity under Rate Constraints — Continuity and Super Activation. IEEE Transactions on Information Forensics and Security 15, 2020, 959-970 more… Full text ( DOI )
2019
- On the Algorithmic Computability of the Secret Key and Authentication Capacity under Channel, Storage, and Privacy Leakage Constraints. IEEE Transactions on Signal Processing 67 (17), 2019, 4636-4648 more… Full text ( DOI )
- Secure Storage for Identification; Random Resources and Privacy Leakage. IEEE Transactions on Information Forensics and Security 14 (8), 2019, 2013-2027 more… Full text ( DOI )
- Secret Key Generation from a Biometric Source with an Eavesdropping Jammer. IEEE Conference on Computer Communcations INFOCOM Workshops, IEEE, 2019IEEE BigSecurity 2019 more…
- Secret Key Generation from a Two Component Compound Source with Rate Constrained One Way Communication: Perfect Secrecy. IEEE International Workshop on Information Foresnics and Security, IEEE, 2019WIFS more…
2018
- Secure Storage for Identification. IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications, IEEE, 2018SPAWC more…
- Robust Secure Authentication and Data Storage with Perfect Secrecy. Cryptography 2 (2), 2018, - more… Full text ( DOI )
2017
- Optimal capacity region for PUF-based authentication with a constraint on the number of challenge-response pairs. 2017 IEEE Conference on Communications and Network Security (CNS), IEEE, 2017 more… Full text ( DOI )
- Compound Biometric Authentication Systems with Strong Secrecy. 11th International ITG Conference on Systems, Communications and Coding, ITG im VDE, 2017 more…
- Robust Authentication and Data Storage with Perfect Secrecy. IEEE International Conference on Computer Communications, IEEE, 2017 more…
- Storage of general data sources on a public database with security and privacy constraints. 2017 IEEE Conference on Communications and Network Security (CNS), IEEE, 2017 more… Full text ( DOI )
- Robust secure storage of data sources with perfect secrecy. 2017 IEEE Workshop on Information Forensics and Security (WIFS), IEEE, 2017 more… Full text ( DOI )