SLIDE 17 References References
- I. Csiszár and P. Narayan, “Secrecy capacities for multiple terminals,” IEEE Transactions on
Information Theory, vol. 50, no. 12, pp. 3047–3061, Dec. 2004.
- A. Gohari and V. Anantharam, “Information-theoretic key agreement of multiple
terminals—Part I,” IEEE Transactions on Information Theory, vol. 56, no. 8, pp. 3973 – 3996, Aug. 2010.
- S. Asoodeh, M. Diaz, F. Alajaji, and T. Linder, “Estimation efficiency under privacy
constraints,” IEEE Transactions on Information Theory, vol. 65, no. 3, pp. 1512–1534, March 2019.
- N. Tishby, F. C. Pereira, and W. Bialek, “The information bottleneck method,” in Thirty-
Seventh Annual Allerton Conference on Communication, Control, and Computing, Sep. 1999.
- H. Tyagi, P. Narayan, and P. Gupta, “When is a function securely computable?” IEEE
Transactions on Information Theory, vol. 57, no. 10, pp. 6337–6350, 2011.