Login / Signup
Information leakage for correlated sources with compromised source symbols over wiretap channel II.
Reevana Balmahoon
A. J. Han Vinck
Ling Cheng
Published in:
Allerton (2014)
Keyphrases
</>
information leakage
personal information
sensitive information
secret information
data sources