Book contents
- Frontmatter
- Contents
- List of Contributors
- Preface
- Part I Theoretical Foundations
- 1 Effective Secrecy: Reliability, Confusion, and Stealth
- 2 Error-Free Perfect Secrecy Systems
- 3 Secure Source Coding
- 4 Networked Secure Source Coding
- Part II Secure Communication
- Part III Secret Key Generation and Authentication
- Part IV Data Systems and Related Applications
- Index
- References
1 - Effective Secrecy: Reliability, Confusion, and Stealth
from Part I - Theoretical Foundations
Published online by Cambridge University Press: 28 June 2017
- Frontmatter
- Contents
- List of Contributors
- Preface
- Part I Theoretical Foundations
- 1 Effective Secrecy: Reliability, Confusion, and Stealth
- 2 Error-Free Perfect Secrecy Systems
- 3 Secure Source Coding
- 4 Networked Secure Source Coding
- Part II Secure Communication
- Part III Secret Key Generation and Authentication
- Part IV Data Systems and Related Applications
- Index
- References
Summary
![Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'](https://static.cambridge.org/content/id/urn%3Acambridge.org%3Aid%3Abook%3A9781316450840/resource/name/firstPage-9781316450840c1_p3-20_CBO.jpg)
- Type
- Chapter
- Information
- Publisher: Cambridge University PressPrint publication year: 2017
References
- 5
- Cited by