Principles of physical layer security in multiuser wireless networks: A survey
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …
multiuser wireless networks. The essential premise of physical layer security is to enable the …
Network coding theory part I: single source
RW Yeung, SYR Li, N Cai… - Foundations and Trends® …, 2006 - nowpublishers.com
Store-and-forward had been the predominant technique for transmitting information through
a network until its optimality was refuted by network coding theory. Network coding offers a …
a network until its optimality was refuted by network coding theory. Network coding offers a …
[图书][B] Information theory and network coding
RW Yeung - 2008 - books.google.com
This book is an evolution from my book A First Course in Information Theory published in
2002 when network coding was still at its infancy. The last few years have witnessed the …
2002 when network coding was still at its infancy. The last few years have witnessed the …
Information theoretic security
The topic of information theoretic security is introduced and the principal results in this area
are reviewed. The basic wire-tap channel model is considered first, and then several specific …
are reviewed. The basic wire-tap channel model is considered first, and then several specific …
Resilient network coding in the presence of byzantine adversaries
Network coding substantially increases network throughput. But since it involves mixing of
information inside the network, a single corrupted packet generated by a malicious node can …
information inside the network, a single corrupted packet generated by a malicious node can …
Secure network coding on a wiretap network
N Cai, RW Yeung - IEEE Transactions on Information Theory, 2010 - ieeexplore.ieee.org
In the paradigm of network coding, the nodes in a network are allowed to encode the
information received from the input links. With network coding, the full capacity of the …
information received from the input links. With network coding, the full capacity of the …
[PDF][PDF] Weakly secure network coding
K Bhattad, KR Narayanan - NetCod, Apr, 2005 - researchgate.net
In this work we consider the problem of secure data transmission on an acyclic multicast
network. A new information theoretic model for security is proposed that defines the system …
network. A new information theoretic model for security is proposed that defines the system …
Network coding applications
C Fragouli, E Soljanin - Foundations and Trends® in …, 2008 - nowpublishers.com
Network coding is an elegant and novel technique introduced at the turn of the millennium to
improve network throughput and performance. It is expected to be a critical technology for …
improve network throughput and performance. It is expected to be a critical technology for …
Securing dynamic distributed storage systems against eavesdropping and adversarial attacks
S Pawar, S El Rouayheb… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
We address the problem of securing distributed storage systems against eavesdropping and
adversarial attacks. An important aspect of these systems is node failures over time …
adversarial attacks. An important aspect of these systems is node failures over time …