Sciweavers

67
Voted
CORR
2008
Springer
72views Education» more  CORR 2008»
14 years 10 months ago
Lossless Compression with Security Constraints
Secure distributed data compression in the presence of an eavesdropper is explored. Two correlated sources that need to be reliably transmitted to a legitimate receiver are availab...
Deniz Gündüz, Elza Erkip, H. Vincent Poo...