Login / Signup

Information leakage for correlated sources with compromised source symbols over wiretap channel II.

Reevana BalmahoonA. J. Han VinckLing Cheng
Published in: Allerton (2014)
Keyphrases
  • information leakage
  • personal information
  • sensitive information
  • secret information
  • data sources