A.K. Chorppath, T. Alpacan, H. Boche Bayesian Mechanisms and Detection Methods for Wireless Network with Malicious UsersIEEE Transactions on Mobile Computing 201615Oct2452-2465
J. Nötzel, C. ArendtUsing dependent component analysis for blind channel estimation in distributed antenna systems IEEE Global Conference on Signal and Information ProcessingGlobalSIPIEEE2016
A.S. Mansour, H. Boche, R.F. SchaeferList decoding for arbitrarily varying wiretap channels2016 IEEE Conference on Communications and Network Security2016
A.S. Mansour, H. BocheStrong Secrecy Capactiy of Arbitrarily Varying Wiretap Channels with Finite Coordination Resources2016 IEEE Global Conference on Signal and Information ProcessingIEEE2016
M. Goldenbaum, H. Boche, H.V. PoorSecure computation of linear functions over linear discrete multiple-access wiretap channels1670-16742016 50th Asilomar Conference on Signals, Systems and Computers2016
H. Boche, A.S. MansourThe Classic Wiretap Channel14-39Hiding Data - Selected TopicsA. Ahlswede, I. Althöfer, C. Deppe and U. TammSpringer International Publishing2016
H. Boche, R.F. Schaefer, H.V. PoorSuper-activation as a unique feature of secure communication in malicious environmentsInformation201672May24
H. Boche, M. Cai, J. NötzelClassical-quantum channels with causal and non-causal channel state information at the sender2046-20532016 IEEE International Symposium on Information Theory(ISIT)IEEE2016
H. Boche, U.J. MönichSignal and system spaces with non-convergent sampling representation2131-213524th European Signal Processing Conference (EUSIPCO 2016)2016
M. Goldenbaum, H. Boche, H.V. PoorOn secure computation over the binary modulo-2 adder multiple-access wiretap channelIEEE Information Theory WorkshopIEEE2016