Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An achievable region for the Wiretap multiple-access channel with common message., and . ISIT, page 249-253. IEEE, (2012)On the weakest resource for coordination in AV-MACs with conferencing encoders., and . ITW, page 1-5. IEEE, (2013)Secure estimation for unstable systems., , , , , and . CDC, page 5059-5064. IEEE, (2016)The performance of QPSK in low-SNR interference channels., , , and . ISITA, page 708-713. IEEE, (2010)Frequency hopping does not increase anti-jamming resilience of wireless channels., and . CoRR, (2015)The arbitrarily varying wiretap channel - communication under uncoordinated attacks., , and . ISIT, page 2146-2150. IEEE, (2015)Secure Estimation and Zero-Error Secrecy Capacity., , , , , and . CoRR, (2016)Semantic Security and the Second-Largest Eigenvalue of Biregular Graphs., and . CoRR, (2018)A Channel Under Simultaneous Jamming and Eavesdropping Attack - Correlated Random Coding Capacities Under Strong Secrecy Criteria., , and . IEEE Trans. Information Theory, 62 (7): 3844-3862 (2016)The Compound Multiple Access Channel With Partially Cooperating Encoders., , , and . IEEE Trans. Information Theory, 57 (5): 3045-3066 (2011)