The Relationship between Tsallis Statistics, the Fourier Transform, and Nonlinear Coupling
The Relay-Eavesdropper Channel: Cooperation for Secrecy
The restricted isometry property for time-frequency structured random matrices
The Role of Feedback in Two-way Secure Communications
The Russian effort in establishing large atomic and molecular databases
The Second Law and Informatics
The Second Law as a Cause of the Evolution
The second weight of generalized Reed-Muller codes in most cases
The Secrecy Capacity for a 3-Receiver Broadcast Channel with Degraded Message Sets
The Secrecy Capacity of the MIMO Wiretap Channel
The Secrecy Capacity Region of the Degraded Vector Gaussian Broadcast Channel
The Secrecy Capacity Region of the Gaussian MIMO Broadcast Channel
The Secrecy Capacity Region of the Gaussian MIMO Multi-receiver Wiretap Channel
The Secrecy Graph and Some of its Properties
The Secrecy Rate Region of the Broadcast Channel
The Secret Key-Private Key Capacity Region for Three Terminals
The Sender-Excited Secret Key Agreement Model: Capacity and Error Exponents
The Sensing Capacity of Sensor Networks
The Serializability of Network Codes
The Shannon capacity of a graph and the independence numbers of its powers