This paper summarizes recent contributions of the authors and their co-workers in the area of information-theoretic security.