Method and unit of operating a storage means, storage means and system for data processing
2022
Secret Key Generation from a Two Component Compound Source with Rate Constrained One Way Communication: Perfect Secrecy
IEEE International Workshop on Information Foresnics and Security
WIFS
IEEE
2019
Secure Storage Capacity under Rate Constraints — Continuity and Super Activation
IEEE Transactions on Information Forensics and Security
2020
15
959-970
On the Algorithmic Computability of the Secret Key and Authentication Capacity under Channel, Storage, and Privacy Leakage Constraints
IEEE Transactions on Signal Processing
2019
67
17
Sep
4636-4648
Secret Key Generation from a Biometric Source with an Eavesdropping Jammer
IEEE Conference on Computer Communcations INFOCOM Workshops
IEEE BigSecurity 2019
IEEE
2019
Secure Storage for Identification; Random Resources and Privacy Leakage
IEEE Transactions on Information Forensics and Security
2019
14
8
Aug
2013-2027
Secure Storage for Identification
IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications
SPAWC
IEEE
2018
Robust secure storage of data sources with perfect secrecy
2017 IEEE Workshop on Information Forensics and Security (WIFS)
IEEE
2017