Lin, Fuchun; Safavi-Naini, Reihaneh; Wang, Pengwei Codes for detection of limited view algebraic tampering. (English) Zbl 1404.94091 Chen, Kefei (ed.) et al., Information security and cryptology. 12th international conference, Inscrypt 2016, Beijing, China, November 4–6, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-54704-6/pbk; 978-3-319-54705-3/ebook). Lecture Notes in Computer Science 10143, 309-320 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{F. Lin} et al., Lect. Notes Comput. Sci. 10143, 309--320 (2017; Zbl 1404.94091) Full Text: DOI
Wang, Pengwei; Safavi-Naini, Reihaneh A model for adversarial wiretap channels. (English) Zbl 1359.94531 IEEE Trans. Inf. Theory 62, No. 2, 970-983 (2016). MSC: 94A40 PDFBibTeX XMLCite \textit{P. Wang} and \textit{R. Safavi-Naini}, IEEE Trans. Inf. Theory 62, No. 2, 970--983 (2016; Zbl 1359.94531) Full Text: DOI arXiv
Lin, Fuchun; Safavi-Naini, Reihaneh; Wang, Pengwei Detecting algebraic manipulation in leaky storage systems. (English) Zbl 1407.94137 Nascimento, Anderson C. A. (ed.) et al., Information theoretic security. 9th international conference, ICITS 2016, Tacoma, WA, USA, August 9–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10015, 129-150 (2016). MSC: 94A60 68P20 68P25 PDFBibTeX XMLCite \textit{F. Lin} et al., Lect. Notes Comput. Sci. 10015, 129--150 (2016; Zbl 1407.94137) Full Text: DOI arXiv
Wang, Pengwei; Safavi-Naini, Reihaneh Limited view adversary codes: bounds, constructions and applications. (English) Zbl 1375.94162 Lehmann, Anja (ed.) et al., Information theoretic security. 8th international conference, ICITS 2015, Lugano, Switzerland, May 2–5, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17469-3/pbk; 978-3-319-17470-9/ebook). Lecture Notes in Computer Science 9063, 214-235 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Wang} and \textit{R. Safavi-Naini}, Lect. Notes Comput. Sci. 9063, 214--235 (2015; Zbl 1375.94162) Full Text: DOI arXiv