Skip to main navigation
Skip to search
Skip to main content
Princeton University Home
Help & FAQ
Home
Profiles
Research units
Facilities
Projects
Research output
Press/Media
Search by expertise, name or affiliation
Using a secret key to foil an eavesdropper
Paul Cuff
Electrical and Computer Engineering
Research output
:
Chapter in Book/Report/Conference proceeding
›
Conference contribution
14
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Using a secret key to foil an eavesdropper'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Adversary
100%
Distributed Systems
33%
Eavesdropper
100%
Equivocation
33%
Information Sharing
33%
Optimal Communication
33%
Secret Key
100%
Systems-based
33%
Value Function
33%
Computer Science
Distributed Systems
100%
Function Value
100%
Share Information
100%
Engineering
Share Information
50%