Applebaum, Benny; Arkis, Barak; Raykov, Pavel; Vasudevan, Prashant Nalini Conditional disclosure of secrets: amplification, closure, amortization, lower-bounds, and separations. (English) Zbl 07307640 SIAM J. Comput. 50, 32-67 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{B. Applebaum} et al., SIAM J. Comput. 50, 32--67 (2021; Zbl 07307640) Full Text: DOI
Bamiloshin, Michael; Ben-Efraim, Aner; Farràs, Oriol; Padró, Carles Common information, matroid representation, and secret sharing for matroid ports. (English) Zbl 07300836 Des. Codes Cryptography 89, No. 1, 143-166 (2021). MSC: 68P30 52B40 94A62 94A60 PDF BibTeX XML Cite \textit{M. Bamiloshin} et al., Des. Codes Cryptography 89, No. 1, 143--166 (2021; Zbl 07300836) Full Text: DOI
Waqas, Ghulam Jilani; Ahmad, Ishtiaq; Samee, Muhammad Kashif; Khan, Muhammad Nasir; Raza, Ali A hybrid OFDM-CDMA-based robust image watermarking technique. (English) Zbl 07308330 Int. J. Wavelets Multiresolut. Inf. Process. 18, No. 6, Article ID 2050043, 15 p. (2020). MSC: 94A62 42C05 68U10 92C55 94A08 PDF BibTeX XML Cite \textit{G. J. Waqas} et al., Int. J. Wavelets Multiresolut. Inf. Process. 18, No. 6, Article ID 2050043, 15 p. (2020; Zbl 07308330) Full Text: DOI
Cheraghi, Abbas The lower bound and exact value of the information rate of some developed graph access structures. (English) Zbl 07300011 Proyecciones 39, No. 4, 1005-1017 (2020). MSC: 94A62 PDF BibTeX XML Cite \textit{A. Cheraghi}, Proyecciones 39, No. 4, 1005--1017 (2020; Zbl 07300011) Full Text: DOI
Farràs, Oriol; Kaced, Tarik; Martín, Sebastià; Padro, Carles Improving the linear programming technique in the search for lower bounds in secret sharing. (English) Zbl 07282295 IEEE Trans. Inf. Theory 66, No. 11, 7088-7100 (2020). MSC: 94A62 90C05 PDF BibTeX XML Cite \textit{O. Farràs} et al., IEEE Trans. Inf. Theory 66, No. 11, 7088--7100 (2020; Zbl 07282295) Full Text: DOI
Attia, Mohamed Adel; Kumar, Deepak; Tandon, Ravi The capacity of private information retrieval from uncoded storage constrained databases. (English) Zbl 07282265 IEEE Trans. Inf. Theory 66, No. 11, 6617-6634 (2020). MSC: 94A62 68P20 68P27 PDF BibTeX XML Cite \textit{M. A. Attia} et al., IEEE Trans. Inf. Theory 66, No. 11, 6617--6634 (2020; Zbl 07282265) Full Text: DOI
Zheng, Xiao-Yi; Kuang, Chang Arbitration quantum signature protocol based on XOR encryption. (English) Zbl 1450.81035 Int. J. Quantum Inf. 18, No. 5, Article ID 2050025, 10 p. (2020). MSC: 81P94 81P45 81P40 81P65 94A62 PDF BibTeX XML Cite \textit{X.-Y. Zheng} and \textit{C. Kuang}, Int. J. Quantum Inf. 18, No. 5, Article ID 2050025, 10 p. (2020; Zbl 1450.81035) Full Text: DOI
Zhang, Pan; Lei, Mingyu Demand information sharing of the manufacturer and reverse channel design in closed-loop supply chains. (Chinese. English summary) Zbl 07267167 J. Syst. Eng. 35, No. 2, 232-243 (2020). MSC: 91B44 90B06 91A80 PDF BibTeX XML Cite \textit{P. Zhang} and \textit{M. Lei}, J. Syst. Eng. 35, No. 2, 232--243 (2020; Zbl 07267167) Full Text: DOI
Wang, Han; Wang, Xu’an; Zhou, Neng; Liu, Yudong Blockchain based public verifiable scheme for sharing data. (Chinese. English summary) Zbl 07266758 J. Guangxi Norm. Univ., Nat. Sci. 38, No. 2, 1-7 (2020). MSC: 68P20 68P25 PDF BibTeX XML Cite \textit{H. Wang} et al., J. Guangxi Norm. Univ., Nat. Sci. 38, No. 2, 1--7 (2020; Zbl 07266758) Full Text: DOI
Tian, Keke; Zhou, Ruiying; Dong, Haoye; Yin, Jian An abstractive summarization method based on encoder-sharing and gated network. (Chinese. English summary) Zbl 07266353 Acta Sci. Nat. Univ. Pekin. 56, No. 1, 61-67 (2020). MSC: 68T50 68P30 PDF BibTeX XML Cite \textit{K. Tian} et al., Acta Sci. Nat. Univ. Pekin. 56, No. 1, 61--67 (2020; Zbl 07266353) Full Text: DOI
Takbiri, Nazanin; Houmansadr, Amir; Goeckel, Dennis L.; Pishro-Nik, Hossein Privacy of dependent users against statistical matching. (English) Zbl 1448.94248 IEEE Trans. Inf. Theory 66, No. 9, 5842-5865 (2020). MSC: 94A62 94A15 PDF BibTeX XML Cite \textit{N. Takbiri} et al., IEEE Trans. Inf. Theory 66, No. 9, 5842--5865 (2020; Zbl 1448.94248) Full Text: DOI
Anshu, Anurag; Hayashi, Masahito; Warsi, Naqueeb Ahmad Secure communication over fully quantum Gel’fand-Pinsker wiretap channel. (English) Zbl 1448.94156 IEEE Trans. Inf. Theory 66, No. 9, 5548-5566 (2020). MSC: 94A40 94A05 94A62 PDF BibTeX XML Cite \textit{A. Anshu} et al., IEEE Trans. Inf. Theory 66, No. 9, 5548--5566 (2020; Zbl 1448.94156) Full Text: DOI
Fuller, Benjamin; Reyzin, Leonid; Smith, Adam When are fuzzy extractors possible? (English) Zbl 1446.94130 IEEE Trans. Inf. Theory 66, No. 8, 5282-5298 (2020). MSC: 94A60 94A62 94A17 PDF BibTeX XML Cite \textit{B. Fuller} et al., IEEE Trans. Inf. Theory 66, No. 8, 5282--5298 (2020; Zbl 1446.94130) Full Text: DOI
Sihag, Saurabh; Tajer, Ali Secure estimation under causative attacks. (English) Zbl 1446.62086 IEEE Trans. Inf. Theory 66, No. 8, 5145-5166 (2020). MSC: 62F10 62B10 94A62 PDF BibTeX XML Cite \textit{S. Sihag} and \textit{A. Tajer}, IEEE Trans. Inf. Theory 66, No. 8, 5145--5166 (2020; Zbl 1446.62086) Full Text: DOI
Chen, Zhen; Wang, Zhiying; Jafar, Syed Ali The capacity of T-private information retrieval with private side information. (English) Zbl 1446.68061 IEEE Trans. Inf. Theory 66, No. 8, 4761-4773 (2020). MSC: 68P20 68P27 94A62 PDF BibTeX XML Cite \textit{Z. Chen} et al., IEEE Trans. Inf. Theory 66, No. 8, 4761--4773 (2020; Zbl 1446.68061) Full Text: DOI
Chen, Zhen; Wang, Zhiying; Jafar, Syed Ali The asymptotic capacity of private search. (English) Zbl 1446.68048 IEEE Trans. Inf. Theory 66, No. 8, 4709-4721 (2020). MSC: 68P10 68P20 68P27 94A62 PDF BibTeX XML Cite \textit{Z. Chen} et al., IEEE Trans. Inf. Theory 66, No. 8, 4709--4721 (2020; Zbl 1446.68048) Full Text: DOI
Gyarmati, Máté; Ligeti, Péter Smallest graphs achieving the Stinson bound. (English) Zbl 1446.94170 IEEE Trans. Inf. Theory 66, No. 7, 4609-4612 (2020). MSC: 94A62 94A17 PDF BibTeX XML Cite \textit{M. Gyarmati} and \textit{P. Ligeti}, IEEE Trans. Inf. Theory 66, No. 7, 4609--4612 (2020; Zbl 1446.94170) Full Text: DOI
Hyadi, Amal; Rezki, Zouheir; Alouini, Mohamed-Slim Securing multi-user broadcast wiretap channels with finite CSI feedback. (English) Zbl 1446.94140 IEEE Trans. Inf. Theory 66, No. 7, 4468-4488 (2020). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{A. Hyadi} et al., IEEE Trans. Inf. Theory 66, No. 7, 4468--4488 (2020; Zbl 1446.94140) Full Text: DOI
Chen, Jinyuan Secure communication over interference channel: to jam or not to jam? (English) Zbl 1448.94162 IEEE Trans. Inf. Theory 66, No. 5, 2819-2841 (2020). MSC: 94A40 94A17 94A62 62B10 PDF BibTeX XML Cite \textit{J. Chen}, IEEE Trans. Inf. Theory 66, No. 5, 2819--2841 (2020; Zbl 1448.94162) Full Text: DOI
D’Oliveira, Rafael G. L.; El Rouayheb, Salim One-shot PIR: refinement and lifting. (English) Zbl 1448.94194 IEEE Trans. Inf. Theory 66, No. 4, 2443-2455 (2020). MSC: 94A60 94A62 68P20 PDF BibTeX XML Cite \textit{R. G. L. D'Oliveira} and \textit{S. El Rouayheb}, IEEE Trans. Inf. Theory 66, No. 4, 2443--2455 (2020; Zbl 1448.94194) Full Text: DOI
Goldfeld, Ziv; Cuff, Paul; Permuter, Haim H. Wiretap channels with random states non-causally available at the encoder. (English) Zbl 1446.94073 IEEE Trans. Inf. Theory 66, No. 3, 1497-1519 (2020). MSC: 94A40 94A62 PDF BibTeX XML Cite \textit{Z. Goldfeld} et al., IEEE Trans. Inf. Theory 66, No. 3, 1497--1519 (2020; Zbl 1446.94073) Full Text: DOI
Baik, Kyung Hwan; Kim, Sang-Kee Observable versus unobservable R&D investments in duopolies. (English) Zbl 1448.91142 J. Econ. 130, No. 1, 37-66 (2020). MSC: 91B38 PDF BibTeX XML Cite \textit{K. H. Baik} and \textit{S.-K. Kim}, J. Econ. 130, No. 1, 37--66 (2020; Zbl 1448.91142) Full Text: DOI
Zhou, Quan; Lv, Hongli Multi-secret sharing model based on Hermite interpolation polynomial and quantum graph state. (English) Zbl 1447.81104 Int. J. Theor. Phys. 59, No. 8, 2271-2293 (2020). MSC: 81P94 81P45 81P70 41A10 33C45 81Q35 PDF BibTeX XML Cite \textit{Q. Zhou} and \textit{H. Lv}, Int. J. Theor. Phys. 59, No. 8, 2271--2293 (2020; Zbl 1447.81104) Full Text: DOI
Huang, Zhiming; He, Zhimin Multi-party qutrit-state sharing under decoherence. (English) Zbl 1439.81024 Int. J. Mod. Phys. B 34, No. 12, Article ID 2050124, 7 p. (2020). MSC: 81P45 81P94 94A62 81S22 PDF BibTeX XML Cite \textit{Z. Huang} and \textit{Z. He}, Int. J. Mod. Phys. B 34, No. 12, Article ID 2050124, 7 p. (2020; Zbl 1439.81024) Full Text: DOI
Xian, Hequn; Liu, Hongyan; Zhang, Shuguang; Hou, Ruitao Verifiable secure data deduplication method in cloud storage. (Chinese. English summary) Zbl 1449.68027 J. Softw. 31, No. 2, 455-470 (2020). MSC: 68P20 68P25 94A62 PDF BibTeX XML Cite \textit{H. Xian} et al., J. Softw. 31, No. 2, 455--470 (2020; Zbl 1449.68027) Full Text: DOI
El Ouardighi, Fouad; Erickson, Gary; Grass, Dieter; Jørgensen, Steffen Contracts and information structure in a supply chain with operations and marketing interaction. (English) Zbl 07224032 Petrosyan, Leon A. (ed.) et al., Game theoretic analysis. Part. 1. Non-cooperative games and equilibrium analysis. Part 2. Cooperative games and axiomatic values. Hackensack, NJ: World Scientific (ISBN 978-981-12-0200-1/hbk; 978-981-12-0202-5/ebook). 93-128 (2020). MSC: 91A10 91A23 91B40 90B05 PDF BibTeX XML Cite \textit{F. El Ouardighi} et al., in: Game theoretic analysis. Part. 1. Non-cooperative games and equilibrium analysis. Part 2. Cooperative games and axiomatic values. Hackensack, NJ: World Scientific. 93--128 (2020; Zbl 07224032) Full Text: DOI
Britz, Volker; Gersbach, Hans Information sharing in democratic mechanisms. (English) Zbl 1447.91035 Int. J. Game Theory 49, No. 2, 547-577 (2020). Reviewer: Annibal Parracho Sant’Anna (Rio de Janeiro) MSC: 91B03 91B12 91B18 PDF BibTeX XML Cite \textit{V. Britz} and \textit{H. Gersbach}, Int. J. Game Theory 49, No. 2, 547--577 (2020; Zbl 1447.91035) Full Text: DOI
Wang, Ming-Ming; Kong, Xing-Yu An asymmetric dynamic multiparty quantum secret sharing against active attacks. (English) Zbl 1441.81080 Int. J. Quantum Inf. 18, No. 3, Article ID 2050001, 10 p. (2020). MSC: 81P94 81P45 91A06 PDF BibTeX XML Cite \textit{M.-M. Wang} and \textit{X.-Y. Kong}, Int. J. Quantum Inf. 18, No. 3, Article ID 2050001, 10 p. (2020; Zbl 1441.81080) Full Text: DOI
Shi, Run-hua; Zhang, Rui; Liu, Bai; Zhang, Mingwu Cryptanalysis and improvement of quantum sealed-bid auction. (English) Zbl 1441.81038 Int. J. Theor. Phys. 59, No. 6, 1917-1926 (2020). MSC: 81P45 81P94 81P70 91B26 PDF BibTeX XML Cite \textit{R.-h. Shi} et al., Int. J. Theor. Phys. 59, No. 6, 1917--1926 (2020; Zbl 1441.81038) Full Text: DOI
Ma, Ling-yong Two-qubit quantum state sharing protocol based on Bell state. (English) Zbl 1441.81034 Int. J. Theor. Phys. 59, No. 6, 1844-1853 (2020). MSC: 81P45 81P94 81P40 81P15 PDF BibTeX XML Cite \textit{L.-y. Ma}, Int. J. Theor. Phys. 59, No. 6, 1844--1853 (2020; Zbl 1441.81034) Full Text: DOI
Zhou, Ming-Kuai Improvement of the semi-quantum secret sharing protocol of specific bits. (English) Zbl 1441.81078 Int. J. Theor. Phys. 59, No. 6, 1772-1776 (2020). MSC: 81P94 81P45 81V80 PDF BibTeX XML Cite \textit{M.-K. Zhou}, Int. J. Theor. Phys. 59, No. 6, 1772--1776 (2020; Zbl 1441.81078) Full Text: DOI
Wu, E. Five-partite continuous-variable quantum state sharing. (English) Zbl 1441.81042 Int. J. Theor. Phys. 59, No. 5, 1598-1604 (2020). MSC: 81P45 81P94 81P40 81V80 PDF BibTeX XML Cite \textit{E. Wu}, Int. J. Theor. Phys. 59, No. 5, 1598--1604 (2020; Zbl 1441.81042) Full Text: DOI
Pan, Hong-Ming Semi-quantum dialogue with Bell entangled states. (English) Zbl 07213291 Int. J. Theor. Phys. 59, No. 5, 1364-1371 (2020). MSC: 94A60 81P68 94A62 68M12 PDF BibTeX XML Cite \textit{H.-M. Pan}, Int. J. Theor. Phys. 59, No. 5, 1364--1371 (2020; Zbl 07213291) Full Text: DOI
Bunn, Paul; Ostrovsky, Rafail Oblivious sampling with applications to two-party \(k\)-means clustering. (English) Zbl 07211780 J. Cryptology 33, No. 3, 1362-1403 (2020). MSC: 94A60 94A62 94A20 68M14 68P25 68M12 PDF BibTeX XML Cite \textit{P. Bunn} and \textit{R. Ostrovsky}, J. Cryptology 33, No. 3, 1362--1403 (2020; Zbl 07211780) Full Text: DOI
Jha, Ashwin; Nandi, Mridul Tight security of cascaded LRW2. (English) Zbl 07211778 J. Cryptology 33, No. 3, 1272-1317 (2020). MSC: 94A60 94A62 94A55 PDF BibTeX XML Cite \textit{A. Jha} and \textit{M. Nandi}, J. Cryptology 33, No. 3, 1272--1317 (2020; Zbl 07211778) Full Text: DOI
Kanukurthi, Bhavana; Obbattu, Sai Lakshmi Bhavana; Sekar, Sruthi Four-state non-malleable codes with explicit constant rate. (English) Zbl 07211772 J. Cryptology 33, No. 3, 1044-1079 (2020). MSC: 94A60 94A62 94B35 PDF BibTeX XML Cite \textit{B. Kanukurthi} et al., J. Cryptology 33, No. 3, 1044--1079 (2020; Zbl 07211772) Full Text: DOI
Applebaum, Benny; Holenstein, Thomas; Mishra, Manoj; Shayevitz, Ofer The communication complexity of private simultaneous messages, revisited. (English) Zbl 07211769 J. Cryptology 33, No. 3, 917-953 (2020). MSC: 94A05 94A15 94A60 94A62 68M12 68P25 PDF BibTeX XML Cite \textit{B. Applebaum} et al., J. Cryptology 33, No. 3, 917--953 (2020; Zbl 07211769) Full Text: DOI
Ford, Weixing; Lian, Zeng; Lien, Jaimie W.; Zheng, Jie Information sharing in a contest game with group identity. (English) Zbl 1437.91068 Econ. Lett. 189, Article ID 109000, 7 p. (2020). MSC: 91A20 91A05 PDF BibTeX XML Cite \textit{W. Ford} et al., Econ. Lett. 189, Article ID 109000, 7 p. (2020; Zbl 1437.91068) Full Text: DOI
Pamukcu, Duygu; Balcik, Burcu A multi-cover routing problem for planning rapid needs assessment under different information-sharing settings. (English) Zbl 1437.90032 OR Spectrum 42, No. 1, 1-42 (2020). MSC: 90B06 90C59 90C27 PDF BibTeX XML Cite \textit{D. Pamukcu} and \textit{B. Balcik}, OR Spectrum 42, No. 1, 1--42 (2020; Zbl 1437.90032) Full Text: DOI
Cai, Keyuan; He, Zhen; Lou, Yaqi; He, Shuguang Risk-aversion information in a supply chain with price and warranty competition. (English) Zbl 1437.91200 Ann. Oper. Res. 287, No. 1, 61-107 (2020). MSC: 91B16 90B06 91B44 PDF BibTeX XML Cite \textit{K. Cai} et al., Ann. Oper. Res. 287, No. 1, 61--107 (2020; Zbl 1437.91200) Full Text: DOI
Solak, Senay; Zhuo, Yueran Optimal policies for information sharing in information system security. (English) Zbl 1441.91042 Eur. J. Oper. Res. 284, No. 3, 934-950 (2020). MSC: 91B44 90B05 PDF BibTeX XML Cite \textit{S. Solak} and \textit{Y. Zhuo}, Eur. J. Oper. Res. 284, No. 3, 934--950 (2020; Zbl 1441.91042) Full Text: DOI
Slinko, Arkadii Algebra for applications. Cryptography, secret sharing, error-correcting, fingerprinting, compression. 2nd revised edition. (English) Zbl 1435.94001 Springer Undergraduate Mathematics Series. Cham: Springer (ISBN 978-3-030-44073-2/pbk; 978-3-030-44074-9/ebook). xiv, 368 p. (2020). MSC: 94-01 00A06 11-01 12-01 20-01 94A60 94Bxx PDF BibTeX XML Cite \textit{A. Slinko}, Algebra for applications. Cryptography, secret sharing, error-correcting, fingerprinting, compression. 2nd revised edition. Cham: Springer (2020; Zbl 1435.94001) Full Text: DOI
Chang, Li-Wei; Zhang, Yu-Qing; Tian, Xiao-Xiong; Qian, Yu-Hua; Zheng, Shi-Hui; Liu, Yang Fault tolerant multi-party authenticated quantum conference against collective noise. (English) Zbl 1433.81027 Int. J. Theor. Phys. 59, No. 3, 786-806 (2020). MSC: 81P45 81P94 94A60 94A62 81S22 PDF BibTeX XML Cite \textit{L.-W. Chang} et al., Int. J. Theor. Phys. 59, No. 3, 786--806 (2020; Zbl 1433.81027) Full Text: DOI
Denderski, Piotr; Stoltenberg, Christian A. Risk sharing with private and public information. (English) Zbl 1432.91098 J. Econ. Theory 186, Article ID 104988, 40 p. (2020). MSC: 91G05 91B05 PDF BibTeX XML Cite \textit{P. Denderski} and \textit{C. A. Stoltenberg}, J. Econ. Theory 186, Article ID 104988, 40 p. (2020; Zbl 1432.91098) Full Text: DOI
Chou, Rémi A.; Yener, Aylin Strongly secure multiuser communication and authentication with anonymity constraints. (English) Zbl 1433.94104 IEEE Trans. Inf. Theory 66, No. 1, 572-586 (2020). MSC: 94A62 94A40 PDF BibTeX XML Cite \textit{R. A. Chou} and \textit{A. Yener}, IEEE Trans. Inf. Theory 66, No. 1, 572--586 (2020; Zbl 1433.94104) Full Text: DOI
Sudan, Madhu; Tyagi, Himanshu; Watanabe, Shun Communication for generating correlation: a unifying survey. (English) Zbl 1433.94107 IEEE Trans. Inf. Theory 66, No. 1, 5-37 (2020). MSC: 94A62 94A17 62B10 PDF BibTeX XML Cite \textit{M. Sudan} et al., IEEE Trans. Inf. Theory 66, No. 1, 5--37 (2020; Zbl 1433.94107) Full Text: DOI
Zhang, Shichen; Zhang, Jianxiong Agency selling or reselling: e-tailer information sharing with supplier offline entry. (English) Zbl 1430.90158 Eur. J. Oper. Res. 280, No. 1, 134-151 (2020). MSC: 90B06 90B05 91A80 PDF BibTeX XML Cite \textit{S. Zhang} and \textit{J. Zhang}, Eur. J. Oper. Res. 280, No. 1, 134--151 (2020; Zbl 1430.90158) Full Text: DOI
Wang, Liang; Wang, Baocang; Song, Wei; Zhang, Zhili A key-sharing based secure deduplication scheme in cloud storage. (English) Zbl 07306716 Inf. Sci. 504, 48-60 (2019). MSC: 68P25 68M11 68P20 94A60 PDF BibTeX XML Cite \textit{L. Wang} et al., Inf. Sci. 504, 48--60 (2019; Zbl 07306716) Full Text: DOI
Wang, Huige; Zhang, Yuan; Chen, Kefei; Sui, Guangye; Zhao, Yunlei; Huang, Xinyi Functional broadcast encryption with applications to data sharing for cloud storage. (English) Zbl 07306076 Inf. Sci. 502, 109-124 (2019). MSC: 68P25 68M11 68P20 PDF BibTeX XML Cite \textit{H. Wang} et al., Inf. Sci. 502, 109--124 (2019; Zbl 07306076) Full Text: DOI
Hashimoto, Keitaro; Ogata, Wakaha Unrestricted and compact certificateless aggregate signature scheme. (English) Zbl 1451.94037 Inf. Sci. 487, 97-114 (2019). MSC: 94A62 PDF BibTeX XML Cite \textit{K. Hashimoto} and \textit{W. Ogata}, Inf. Sci. 487, 97--114 (2019; Zbl 1451.94037) Full Text: DOI
Davarzani, Mahmood Visual cryptography scheme on graphs with \(m^*(G)=4\). (English) Zbl 07276677 Trans. Comb. 8, No. 2, 53-66 (2019). MSC: 94A62 94A15 PDF BibTeX XML Cite \textit{M. Davarzani}, Trans. Comb. 8, No. 2, 53--66 (2019; Zbl 07276677) Full Text: DOI
Beelen, Peter Book review of: R. Pellikaan et al., Codes, cryptology and curves with computer algebra. (English) Zbl 1451.00025 Nieuw Arch. Wiskd. (5) 20, No. 2, 146-147 (2019). MSC: 00A17 94-01 94Bxx 94A60 94A62 11T71 PDF BibTeX XML Cite \textit{P. Beelen}, Nieuw Arch. Wiskd. (5) 20, No. 2, 146--147 (2019; Zbl 1451.00025)
Zhang, Qikun; Wang, Xianmin; Yuan, Junling; Liu, Lu; Wang, Ruifang; Huang, Hong; Li, Yuanzhang A hierarchical group key agreement protocol using orientable attributes for cloud computing. (English) Zbl 1443.68024 Inf. Sci. 480, 55-69 (2019). MSC: 68M12 68M11 94A60 94A62 PDF BibTeX XML Cite \textit{Q. Zhang} et al., Inf. Sci. 480, 55--69 (2019; Zbl 1443.68024) Full Text: DOI
Huan, Meili; Chen, Pengfei; Zhang, Li; Hou, Yunxian Information sharing mechanism of dairy supply chain under emergencies. (Chinese. English summary) Zbl 1449.91060 J. Univ. Sci. Technol. China 49, No. 6, 506-516 (2019). MSC: 91B44 90B06 91A80 PDF BibTeX XML Cite \textit{M. Huan} et al., J. Univ. Sci. Technol. China 49, No. 6, 506--516 (2019; Zbl 1449.91060) Full Text: DOI
Wu, Junjian; Wang, Haiyan Vertical demand information sharing when suppliers exert cost reduction efforts. (Chinese. English summary) Zbl 1449.90020 J. Syst. Eng. 34, No. 4, 536-554 (2019). MSC: 90B05 91A20 PDF BibTeX XML Cite \textit{J. Wu} and \textit{H. Wang}, J. Syst. Eng. 34, No. 4, 536--554 (2019; Zbl 1449.90020) Full Text: DOI
Pan, Chongxia; Zhong, Weijun; Mei, Shu’e Information investment strategies for two risk-averse firms under heterogeneous attacks. (Chinese. English summary) Zbl 1449.91030 J. Syst. Eng. 34, No. 4, 497-510 (2019). MSC: 91A35 91A30 91B44 91A80 PDF BibTeX XML Cite \textit{C. Pan} et al., J. Syst. Eng. 34, No. 4, 497--510 (2019; Zbl 1449.91030) Full Text: DOI
Zhang, Chuang; Zhao, Xiubin; Pang, Chunlei; Feng, Bo; Gao, Chao Adaptive fault tolerance federated filter method for SINS/GNSS/CNS integrated navigation. (Chinese. English summary) Zbl 1449.93151 Control Theory Appl. 36, No. 9, 1469-1476 (2019). MSC: 93C40 93E11 PDF BibTeX XML Cite \textit{C. Zhang} et al., Control Theory Appl. 36, No. 9, 1469--1476 (2019; Zbl 1449.93151) Full Text: DOI
Teşeleanu, George Subliminal hash channels. (English) Zbl 07215972 Gueye, Cheikh Thiecoumba (ed.) et al., Algebra, codes and cryptology. Proceedings of the first international conference, A2C 2019, in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5–7, 2019. Cham: Springer (ISBN 978-3-030-36236-2/pbk; 978-3-030-36237-9/ebook). Communications in Computer and Information Science 1133, 149-165 (2019). MSC: 94A40 94A05 94A60 94A62 68M11 PDF BibTeX XML Cite \textit{G. Teşeleanu}, Commun. Comput. Inf. Sci. 1133, 149--165 (2019; Zbl 07215972) Full Text: DOI
Marino, Simeone; Zhou, Nina; Zhao, Yi; Wang, Lu; Wu, Qiucheng; Dinov, Ivo D. HDDA: DataSifter: statistical obfuscation of electronic health records and other sensitive datasets. (English) Zbl 07193723 J. Stat. Comput. Simulation 89, No. 2, 249-271 (2019). MSC: 62 PDF BibTeX XML Cite \textit{S. Marino} et al., J. Stat. Comput. Simulation 89, No. 2, 249--271 (2019; Zbl 07193723) Full Text: DOI
Wei, Jie; Zhao, Jing; Hou, Xiaorui Bilateral information sharing in two supply chains with complementary products. (English) Zbl 07187091 Appl. Math. Modelling 72, 28-49 (2019). MSC: 90 91 PDF BibTeX XML Cite \textit{J. Wei} et al., Appl. Math. Modelling 72, 28--49 (2019; Zbl 07187091) Full Text: DOI
Hao, Zhongyuan; Jiang, Li Direct selling by suppliers improves system-wide information flow. (English) Zbl 07165797 Oper. Res. Lett. 47, No. 4, 305-310 (2019). MSC: 90 PDF BibTeX XML Cite \textit{Z. Hao} and \textit{L. Jiang}, Oper. Res. Lett. 47, No. 4, 305--310 (2019; Zbl 07165797) Full Text: DOI
Brânzei, Simina; Orlandi, Claudio; Yang, Guang Sharing information with competitors. (English) Zbl 1431.91088 Fotakis, Dimitris (ed.) et al., Algorithmic game theory. 12th International symposium, SAGT 2019, Athens, Greece, September 30 – October 3, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11801, 34-48 (2019). MSC: 91B03 91B44 PDF BibTeX XML Cite \textit{S. Brânzei} et al., Lect. Notes Comput. Sci. 11801, 34--48 (2019; Zbl 1431.91088) Full Text: DOI Link
Ozbek, İbrahim; Temiz, Fatih; Siap, İrfan A generalization of the Mignotte’s scheme over Euclidean domains and applications to secret image sharing. (English) Zbl 1440.94100 J. Algebra Comb. Discrete Struct. Appl. 6, No. 3, 147-161 (2019). MSC: 94A62 11T71 13F07 94A08 PDF BibTeX XML Cite \textit{İ. Ozbek} et al., J. Algebra Comb. Discrete Struct. Appl. 6, No. 3, 147--161 (2019; Zbl 1440.94100) Full Text: DOI
Banawan, Karim; Ulukus, Sennur Noisy private information retrieval: on separability of channel coding and information retrieval. (English) Zbl 1433.94101 IEEE Trans. Inf. Theory 65, No. 12, 8232-8249 (2019). MSC: 94A62 68P25 94A40 PDF BibTeX XML Cite \textit{K. Banawan} and \textit{S. Ulukus}, IEEE Trans. Inf. Theory 65, No. 12, 8232--8249 (2019; Zbl 1433.94101) Full Text: DOI
Liao, Jiachun; Kosut, Oliver; Sankar, Lalitha; Calmon, Flavio Du Pin Tunable measures for information leakage and applications to privacy-utility tradeoffs. (English) Zbl 1433.94043 IEEE Trans. Inf. Theory 65, No. 12, 8043-8066 (2019). MSC: 94A17 62F30 94A62 PDF BibTeX XML Cite \textit{J. Liao} et al., IEEE Trans. Inf. Theory 65, No. 12, 8043--8066 (2019; Zbl 1433.94043) Full Text: DOI
Mojahedian, Mohammad Mahdi; Beigi, Salman; Gohari, Amin; Yassaee, Mohammad Hossein; Aref, Mohammad Reza A correlation measure based on vector-valued \(L_p\)-norms. (English) Zbl 1433.94044 IEEE Trans. Inf. Theory 65, No. 12, 7985-8004 (2019). MSC: 94A17 94A62 PDF BibTeX XML Cite \textit{M. M. Mojahedian} et al., IEEE Trans. Inf. Theory 65, No. 12, 7985--8004 (2019; Zbl 1433.94044) Full Text: DOI
Banawan, Karim; Ulukus, Sennur Asymmetry hurts: private information retrieval under asymmetric traffic constraints. (English) Zbl 1433.94100 IEEE Trans. Inf. Theory 65, No. 11, 7628-7645 (2019). MSC: 94A62 68P25 68P30 94A15 PDF BibTeX XML Cite \textit{K. Banawan} and \textit{S. Ulukus}, IEEE Trans. Inf. Theory 65, No. 11, 7628--7645 (2019; Zbl 1433.94100) Full Text: DOI
Dupuis, Frédéric; Fawzi, Omar Entropy accumulation with improved second-order term. (English) Zbl 1433.94042 IEEE Trans. Inf. Theory 65, No. 11, 7596-7612 (2019). MSC: 94A17 94A60 94A62 PDF BibTeX XML Cite \textit{F. Dupuis} and \textit{O. Fawzi}, IEEE Trans. Inf. Theory 65, No. 11, 7596--7612 (2019; Zbl 1433.94042) Full Text: DOI
Bracher, Annina; Hof, Eran; Lapidoth, Amos Guessing attacks on distributed-storage systems. (English) Zbl 1433.94102 IEEE Trans. Inf. Theory 65, No. 11, 6975-6998 (2019). MSC: 94A62 94A17 PDF BibTeX XML Cite \textit{A. Bracher} et al., IEEE Trans. Inf. Theory 65, No. 11, 6975--6998 (2019; Zbl 1433.94102) Full Text: DOI
Han, Te Sun; Sasaki, Masahide Wiretap channels with causal state information: strong secrecy. (English) Zbl 1432.94102 IEEE Trans. Inf. Theory 65, No. 10, 6750-6765 (2019). MSC: 94A40 94A29 94A62 PDF BibTeX XML Cite \textit{T. S. Han} and \textit{M. Sasaki}, IEEE Trans. Inf. Theory 65, No. 10, 6750--6765 (2019; Zbl 1432.94102) Full Text: DOI
Jia, Zhuqing; Sun, Hua; Jafar, Syed Ali Cross subspace alignment and the asymptotic capacity of \(X\)-secure \(T\)-private information retrieval. (English) Zbl 1432.68122 IEEE Trans. Inf. Theory 65, No. 9, 5783-5798 (2019). MSC: 68P20 68P27 94A62 PDF BibTeX XML Cite \textit{Z. Jia} et al., IEEE Trans. Inf. Theory 65, No. 9, 5783--5798 (2019; Zbl 1432.68122) Full Text: DOI
Li, Chong; Liang, Yingbin; Poor, H. Vincent; Shamai, Shlomo Secrecy capacity of colored Gaussian noise channels with feedback. (English) Zbl 1432.94026 IEEE Trans. Inf. Theory 65, No. 9, 5771-5782 (2019). MSC: 94A12 94A40 94A62 PDF BibTeX XML Cite \textit{C. Li} et al., IEEE Trans. Inf. Theory 65, No. 9, 5771--5782 (2019; Zbl 1432.94026) Full Text: DOI
Dey, Bikash Kumar; Jaggi, Sidharth; Langberg, Michael Sufficiently myopic adversaries are blind. (English) Zbl 1432.94130 IEEE Trans. Inf. Theory 65, No. 9, 5718-5736 (2019). MSC: 94A60 94A62 94A24 94A40 PDF BibTeX XML Cite \textit{B. K. Dey} et al., IEEE Trans. Inf. Theory 65, No. 9, 5718--5736 (2019; Zbl 1432.94130) Full Text: DOI
Zhang, Yiwei; Wang, Xin; Wei, Hengjia; Ge, Gennian On private information retrieval array codes. (English) Zbl 1432.68124 IEEE Trans. Inf. Theory 65, No. 9, 5565-5573 (2019). MSC: 68P20 68P27 94A29 94A62 PDF BibTeX XML Cite \textit{Y. Zhang} et al., IEEE Trans. Inf. Theory 65, No. 9, 5565--5573 (2019; Zbl 1432.68124) Full Text: DOI
Zhao, Daozhi; Chen, Mingyang Ex-ante versus ex-post destination information model for on-demand service ride-sharing platform. (English) Zbl 1430.91053 Ann. Oper. Res. 279, No. 1-2, 301-341 (2019). MSC: 91B42 91B44 PDF BibTeX XML Cite \textit{D. Zhao} and \textit{M. Chen}, Ann. Oper. Res. 279, No. 1--2, 301--341 (2019; Zbl 1430.91053) Full Text: DOI
Mu, Yi (ed.); Deng, Robert H. (ed.); Huang, Xinyi (ed.) Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25–27, 2019. Proceedings. (English) Zbl 1428.68039 Lecture Notes in Computer Science 11829. Cham: Springer (ISBN 978-3-030-31577-1/pbk; 978-3-030-31578-8/ebook). xiii, 540 p. (2019). MSC: 68-06 94-06 68P25 94A60 94A62 00B25 PDF BibTeX XML Cite \textit{Y. Mu} (ed.) et al., Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25--27, 2019. Proceedings. Cham: Springer (2019; Zbl 1428.68039) Full Text: DOI
Yu, Yong (ed.); Yang, Guomin (ed.); Wang, Huaxiong (ed.) Special issue: Cryptography and provable security. Preface. (English) Zbl 1427.94003 Int. J. Found. Comput. Sci. 30, No. 4, 489-492 (2019). MSC: 94-06 68P25 94A60 94A62 00B25 PDF BibTeX XML Cite \textit{Y. Yu} (ed.) et al., Int. J. Found. Comput. Sci. 30, No. 4, 489--492 (2019; Zbl 1427.94003) Full Text: DOI
Ye, Chong-Qiang; Ye, Tian-Yu; He, De; Gan, Zhi-Gang Multiparty semi-quantum secret sharing with \(d\)-level single-particle states. (English) Zbl 1428.81037 Int. J. Theor. Phys. 58, No. 11, 3797-3814 (2019). MSC: 81P45 81P94 94A60 PDF BibTeX XML Cite \textit{C.-Q. Ye} et al., Int. J. Theor. Phys. 58, No. 11, 3797--3814 (2019; Zbl 1428.81037) Full Text: DOI
Zhang, Shun; Wang, Sheng-lan; Wang, Qing; Shi, Run-hua Quantum anonymous voting protocol with the privacy protection of the candidate. (English) Zbl 1428.81055 Int. J. Theor. Phys. 58, No. 10, 3323-3332 (2019). MSC: 81P45 91B12 94A62 PDF BibTeX XML Cite \textit{S. Zhang} et al., Int. J. Theor. Phys. 58, No. 10, 3323--3332 (2019; Zbl 1428.81055) Full Text: DOI
Zhao, Xing-Qiang; Chen, Hua-Ying; Wang, Yun-Qian; Zhou, Nan-Run Semi-quantum bi-signature scheme based on W states. (English) Zbl 1428.81056 Int. J. Theor. Phys. 58, No. 10, 3239-3251 (2019). MSC: 81P45 81P94 94A62 PDF BibTeX XML Cite \textit{X.-Q. Zhao} et al., Int. J. Theor. Phys. 58, No. 10, 3239--3251 (2019; Zbl 1428.81056) Full Text: DOI
Lou, Xiaoping; Tang, Wensheng; Long, Hu; Cheng, Yu A quantum blind signature scheme based on block encryption and quantum Fourier transfer. (English) Zbl 1428.81045 Int. J. Theor. Phys. 58, No. 10, 3192-3202 (2019). MSC: 81P45 94A62 94A60 81P94 65T50 81P40 PDF BibTeX XML Cite \textit{X. Lou} et al., Int. J. Theor. Phys. 58, No. 10, 3192--3202 (2019; Zbl 1428.81045) Full Text: DOI
Xia, Zhe; Liu, Yining; Hsu, Ching-Fang; Chang, Chin-Chen An information theoretically secure e-lottery scheme based on symmetric bivariate polynomials. (English) Zbl 1423.94135 Symmetry 11, No. 1, Paper No. 88, 12 p. (2019). MSC: 94A62 05E05 PDF BibTeX XML Cite \textit{Z. Xia} et al., Symmetry 11, No. 1, Paper No. 88, 12 p. (2019; Zbl 1423.94135) Full Text: DOI
Wang, Ming-Ming; Liu, Jun-Li; Gong, Lin-Ming Semiquantum secure direct communication with authentication based on single-photons. (English) Zbl 1426.81020 Int. J. Quantum Inf. 17, No. 3, Article ID 1950024, 10 p. (2019). MSC: 81P45 81Q20 81P94 94A60 94A62 81V80 PDF BibTeX XML Cite \textit{M.-M. Wang} et al., Int. J. Quantum Inf. 17, No. 3, Article ID 1950024, 10 p. (2019; Zbl 1426.81020) Full Text: DOI
Yang, Dong; Qi, Wen-Feng; Chen, Hua-Jin Provable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structures. (English) Zbl 1440.94084 Des. Codes Cryptography 87, No. 11, 2683-2700 (2019). MSC: 94A60 94A62 11T71 94A55 PDF BibTeX XML Cite \textit{D. Yang} et al., Des. Codes Cryptography 87, No. 11, 2683--2700 (2019; Zbl 1440.94084) Full Text: DOI
Steinfeld, Ron (ed.); Yuen, Tsz Hon (ed.) Provable security. 13th international conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019. Proceedings. (English) Zbl 1425.94004 Lecture Notes in Computer Science 11821. Cham: Springer (ISBN 978-3-030-31918-2/pbk; 978-3-030-31919-9/ebook). xi, 382 p. (2019). MSC: 94-06 94A60 94A62 00B25 PDF BibTeX XML Cite \textit{R. Steinfeld} (ed.) and \textit{T. H. Yuen} (ed.), Provable security. 13th international conference, ProvSec 2019, Cairns, QLD, Australia, October 1--4, 2019. Proceedings. Cham: Springer (2019; Zbl 1425.94004) Full Text: DOI
Mehta, Sanyam; Saraswat, Vishal; Sen, Smith Secret sharing using near-MDS codes. (English) Zbl 07116573 Carlet, Claude (ed.) et al., Codes, cryptology and information security. Third international conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019. Proceedings – in honor of Said el Hajji. Cham: Springer (ISBN 978-3-030-16457-7/pbk; 978-3-030-16458-4/ebook). Lecture Notes in Computer Science 11445, 195-214 (2019). MSC: 68P25 68P30 94A60 94Bxx PDF BibTeX XML Cite \textit{S. Mehta} et al., Lect. Notes Comput. Sci. 11445, 195--214 (2019; Zbl 07116573) Full Text: DOI
Azizi, Abdelmalek Arabic cryptography and steganography in Morocco. (English) Zbl 1432.94005 Carlet, Claude (ed.) et al., Codes, cryptology and information security. Third international conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019. Proceedings – in honor of Said el Hajji. Cham: Springer. Lect. Notes Comput. Sci. 11445, 43-54 (2019). MSC: 94-03 94A60 94A62 68P25 68P30 PDF BibTeX XML Cite \textit{A. Azizi}, Lect. Notes Comput. Sci. 11445, 43--54 (2019; Zbl 1432.94005) Full Text: DOI
Li, Kai; Li, Wei; An, Gang Retailer’s demand information sharing strategy based on different R&D patterns. (Chinese. English summary) Zbl 1438.91079 J. Syst. Eng. 34, No. 2, 186-198 (2019). MSC: 91B44 91B38 PDF BibTeX XML Cite \textit{K. Li} et al., J. Syst. Eng. 34, No. 2, 186--198 (2019; Zbl 1438.91079) Full Text: DOI
Duari, Barun; Giri, Debasis An ideal and perfect \((t, n)\) multi-secret sharing scheme based on finite geometry. (English) Zbl 1420.94101 Chandra, Peeyush (ed.) et al., Information technology and applied mathematics. ICITAM 2017, Haldia Institute of Technology, Haldia, India, October 30 – November 1, 2017. Singapore: Springer. Adv. Intell. Syst. Comput. 699, 85-94 (2019). MSC: 94A62 PDF BibTeX XML Cite \textit{B. Duari} and \textit{D. Giri}, Adv. Intell. Syst. Comput. 699, 85--94 (2019; Zbl 1420.94101) Full Text: DOI
Zhang, Wei; Rong, Zhenbang; Huang, Zhiming; Zheng, Shenggen A novel quantum broadcasting multiple blind signature scheme based on multi-particle partial entanglement. (English) Zbl 1433.81025 Int. J. Theor. Phys. 58, No. 8, 2744-2756 (2019). MSC: 81P40 81P45 94A62 PDF BibTeX XML Cite \textit{W. Zhang} et al., Int. J. Theor. Phys. 58, No. 8, 2744--2756 (2019; Zbl 1433.81025) Full Text: DOI
Zhang, Xiao; Zhang, Jian-Zhong; Xie, Shu-Cui A quantum proxy signature scheme by using random sequence to blind the message. (English) Zbl 1422.81071 Int. J. Theor. Phys. 58, No. 7, 2081-2090 (2019). MSC: 81P45 81P40 81P15 94A62 81Q93 PDF BibTeX XML Cite \textit{X. Zhang} et al., Int. J. Theor. Phys. 58, No. 7, 2081--2090 (2019; Zbl 1422.81071) Full Text: DOI
Tiliwalidi, Kalibinuer; Zhang, Jian-Zhong; Xie, Shu-Cui A proxy blind signature scheme of quantum information transmission in two-particle state. (English) Zbl 1422.81066 Int. J. Theor. Phys. 58, No. 6, 2016-2026 (2019). MSC: 81P45 81P40 81P15 81P94 94A62 81Q93 PDF BibTeX XML Cite \textit{K. Tiliwalidi} et al., Int. J. Theor. Phys. 58, No. 6, 2016--2026 (2019; Zbl 1422.81066) Full Text: DOI
Zhao, Xing-Qiang; Wang, Yun-Qian; Gong, Li-Hua; Zeng, Qing-Wei New bi-signature scheme based on GHZ states and W states. (English) Zbl 1422.81072 Int. J. Theor. Phys. 58, No. 5, 1555-1567 (2019). MSC: 81P45 81P40 81P15 81P94 94A62 PDF BibTeX XML Cite \textit{X.-Q. Zhao} et al., Int. J. Theor. Phys. 58, No. 5, 1555--1567 (2019; Zbl 1422.81072) Full Text: DOI
Zilberman, Eduardo; Carrasco, Vinicius; Hemsley, Pedro Risk sharing contracts with private information and one-sided commitment. (English) Zbl 1422.91383 Econ. Theory 68, No. 1, 53-81 (2019). MSC: 91B30 91B40 PDF BibTeX XML Cite \textit{E. Zilberman} et al., Econ. Theory 68, No. 1, 53--81 (2019; Zbl 1422.91383) Full Text: DOI
Amir, Ofra; Grosz, Barbara J.; Gajos, Krzysztof Z.; Gultchin, Limor Personalized change awareness: reducing information overload in loosely-coupled teamwork. (English) Zbl 07099228 Artif. Intell. 275, 204-233 (2019). MSC: 68T PDF BibTeX XML Cite \textit{O. Amir} et al., Artif. Intell. 275, 204--233 (2019; Zbl 07099228) Full Text: DOI
Xu, Jinsong Reversible hidden data access algorithm in cloud computing environment. (English) Zbl 1422.68010 Discrete Contin. Dyn. Syst., Ser. S 12, No. 4-5, 1219-1232 (2019). MSC: 68M11 68P20 68P25 68T05 68T20 94A62 PDF BibTeX XML Cite \textit{J. Xu}, Discrete Contin. Dyn. Syst., Ser. S 12, No. 4--5, 1219--1232 (2019; Zbl 1422.68010) Full Text: DOI
Wang, Tao; Yang, Bo; Liu, Hongyu; Yu, Yong; Qiu, Guoyong; Xia, Zhe An alternative approach to public cloud data auditing supporting data dynamics. (English) Zbl 1418.68078 Soft Comput. 23, No. 13, 4939-4953 (2019). MSC: 68P20 68M11 68M12 94A62 PDF BibTeX XML Cite \textit{T. Wang} et al., Soft Comput. 23, No. 13, 4939--4953 (2019; Zbl 1418.68078) Full Text: DOI
Nafea, Mohamed; Yener, Aylin Generalizing multiple access wiretap and wiretap II channel models: achievable rates and cost of strong secrecy. (English) Zbl 1432.94108 IEEE Trans. Inf. Theory 65, No. 8, 5125-5143 (2019). MSC: 94A40 94A62 PDF BibTeX XML Cite \textit{M. Nafea} and \textit{A. Yener}, IEEE Trans. Inf. Theory 65, No. 8, 5125--5143 (2019; Zbl 1432.94108) Full Text: DOI arXiv
Kamel, Sarah; Sarkiss, Mireille; Wigger, Michèle; Rekaya-Ben Othman, Ghaya Secrecy capacity-memory tradeoff of erasure broadcast channels. (English) Zbl 1432.94104 IEEE Trans. Inf. Theory 65, No. 8, 5094-5124 (2019). MSC: 94A40 94A62 PDF BibTeX XML Cite \textit{S. Kamel} et al., IEEE Trans. Inf. Theory 65, No. 8, 5094--5124 (2019; Zbl 1432.94104) Full Text: DOI arXiv
Kumar, Siddhartha; Lin, Hsuan-Yin; Rosnes, Eirik; Graell i Amat, Alexandre Achieving maximum distance separable private information retrieval capacity with linear codes. (English) Zbl 1432.94172 IEEE Trans. Inf. Theory 65, No. 7, 4243-4273 (2019). MSC: 94B05 94A62 68P20 68P27 PDF BibTeX XML Cite \textit{S. Kumar} et al., IEEE Trans. Inf. Theory 65, No. 7, 4243--4273 (2019; Zbl 1432.94172) Full Text: DOI arXiv