Network coding theory part I: single source
RW Yeung, SYR Li, N Cai… - Foundations and Trends® …, 2006 - nowpublishers.com
Store-and-forward had been the predominant technique for transmitting information through
a network until its optimality was refuted by network coding theory. Network coding offers a …
a network until its optimality was refuted by network coding theory. Network coding offers a …
[图书][B] Physical-layer security: from information theory to security engineering
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …
implementation, challenges and benefits of a groundbreaking new model for secure …
Network coding: an instant primer
Network coding is a new research area that may have interesting applications in practical
networking systems. With network coding, intermediate nodes may send out packets that are …
networking systems. With network coding, intermediate nodes may send out packets that are …
On security against pollution attacks in network coding enabled 5g networks
Future communication networks need to harness the available spectrum more efficiently to
cater the requirements of the ever-increasing digital devices. Higher data rate with low …
cater the requirements of the ever-increasing digital devices. Higher data rate with low …
Secure network coding on a wiretap network
N Cai, RW Yeung - IEEE Transactions on Information Theory, 2010 - ieeexplore.ieee.org
In the paradigm of network coding, the nodes in a network are allowed to encode the
information received from the input links. With network coding, the full capacity of the …
information received from the input links. With network coding, the full capacity of the …
Network coding applications
C Fragouli, E Soljanin - Foundations and Trends® in …, 2008 - nowpublishers.com
Network coding is an elegant and novel technique introduced at the turn of the millennium to
improve network throughput and performance. It is expected to be a critical technology for …
improve network throughput and performance. It is expected to be a critical technology for …
Universal secure network coding via rank-metric codes
D Silva, FR Kschischang - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
The problem of securing a network coding communication system against an eavesdropper
is considered. The network implements linear network coding to deliver n packets from …
is considered. The network implements linear network coding to deliver n packets from …
Random linear network coding: A free cipher?
We consider the level of information security provided by random linear network coding in
network scenarios in which all nodes comply with the communication protocols yet are …
network scenarios in which all nodes comply with the communication protocols yet are …
Byzantine modification detection in multicast networks with random network coding
An information-theoretic approach for detecting Byzantine or adversarial modifications in
networks employing random linear network coding is described. Each exogenous source …
networks employing random linear network coding is described. Each exogenous source …