Sciweavers

89
Voted
CORR
2008
Springer
72views Education» more  CORR 2008»
15 years 1 months ago
Lossless Compression with Security Constraints
Secure distributed data compression in the presence of an eavesdropper is explored. Two correlated sources that need to be reliably transmitted to a legitimate receiver are availab...
Deniz Gündüz, Elza Erkip, H. Vincent Poo...