Pengwei Wang

Affiliations:
  • University of Calgary, Calgary, Canada


According to our database1, Pengwei Wang authored at least 16 papers between 2012 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Secure Key Agreement over Partially Corrupted Channels.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2017
Interactive message transmission over adversarial wiretap channel II.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
A Model for Adversarial Wiretap Channels.
IEEE Trans. Inf. Theory, 2016

Information-theoretically Secure Key Agreement over Partially Corrupted Channels.
CoRR, 2016

Detecting Algebraic Manipulation in Leaky Storage Systems.
Proceedings of the Information Theoretic Security - 9th International Conference, 2016

Codes for Detection of Limited View Algebraic Tampering.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
A Model for Adversarial Wiretap Channels and its Applications.
J. Inf. Process., 2015

Limited View Adversary Codes: Bounds, Constructions and Applications.
Proceedings of the Information Theoretic Security - 8th International Conference, 2015

Adversarial wiretap channel with public discussion.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Erasure adversarial wiretap channels.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

2014
Efficient Codes for Adversarial Wiretap Channels.
CoRR, 2014

An efficient code for Adversarial Wiretap channel.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

2013
A Model for Adversarial Wiretap Channel.
CoRR, 2013

Codes for limited view adversarial channels.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Efficient codes for Limited View adversarial channels.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
A General Construction for 1-round δ-RMT and (0, δ)-SMT.
IACR Cryptol. ePrint Arch., 2012


  Loading...