Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …

Network coding theory part I: single source

RW Yeung, SYR Li, N Cai… - Foundations and Trends® …, 2006 - nowpublishers.com
Store-and-forward had been the predominant technique for transmitting information through
a network until its optimality was refuted by network coding theory. Network coding offers a …

[图书][B] Information theory and network coding

RW Yeung - 2008 - books.google.com
This book is an evolution from my book A First Course in Information Theory published in
2002 when network coding was still at its infancy. The last few years have witnessed the …

Information theoretic security

Y Liang, HV Poor, S Shamai - Foundations and Trends® in …, 2009 - nowpublishers.com
The topic of information theoretic security is introduced and the principal results in this area
are reviewed. The basic wire-tap channel model is considered first, and then several specific …

Resilient network coding in the presence of byzantine adversaries

S Jaggi, M Langberg, S Katti, T Ho… - … INFOCOM 2007-26th …, 2007 - ieeexplore.ieee.org
Network coding substantially increases network throughput. But since it involves mixing of
information inside the network, a single corrupted packet generated by a malicious node can …

[图书][B] Network coding: an introduction

T Ho, D Lun - 2008 - books.google.com
Network coding promises to significantly impact the way communications networks are
designed, operated, and understood. This book presents a unified and intuitive overview of …

Secure network coding on a wiretap network

N Cai, RW Yeung - IEEE Transactions on Information Theory, 2010 - ieeexplore.ieee.org
In the paradigm of network coding, the nodes in a network are allowed to encode the
information received from the input links. With network coding, the full capacity of the …

[PDF][PDF] Weakly secure network coding

K Bhattad, KR Narayanan - NetCod, Apr, 2005 - researchgate.net
In this work we consider the problem of secure data transmission on an acyclic multicast
network. A new information theoretic model for security is proposed that defines the system …

Network coding applications

C Fragouli, E Soljanin - Foundations and Trends® in …, 2008 - nowpublishers.com
Network coding is an elegant and novel technique introduced at the turn of the millennium to
improve network throughput and performance. It is expected to be a critical technology for …

Securing dynamic distributed storage systems against eavesdropping and adversarial attacks

S Pawar, S El Rouayheb… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
We address the problem of securing distributed storage systems against eavesdropping and
adversarial attacks. An important aspect of these systems is node failures over time …