Information Theory and Security Practices
This cluster focuses on the intersection of information theory and secure practices. It addresses how theoretical constructs can be utilized to enhance information security in various applications, including data protection strategies.
1,596 papers
Parent topic: Information Theory and Applications
AI-assisted content · The overview, paper groupings, and influence analysis on this page are AI-generated. They are intended as a starting point for exploring the field and may contain inaccuracies. Report an error
Papers Over Time
Top Papers
2013 · 178 citations
1991 · 139 citations
1998 · 30 citations
2015 · 29 citations
1986 · 27 citations
1990 · 22 citations
2018 · 10 citations
1993 · 7 citations
1993 · 3 citations
2002 · 3 citations
2011 · 1 citations
0 · 0 citations
0 · 0 citations
0 · 0 citations
0 · 0 citations
0 · 0 citations
0 · 0 citations
0 · 0 citations