[图书][B] Physical-layer security: from information theory to security engineering
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …
implementation, challenges and benefits of a groundbreaking new model for secure …
On security against pollution attacks in network coding enabled 5g networks
Future communication networks need to harness the available spectrum more efficiently to
cater the requirements of the ever-increasing digital devices. Higher data rate with low …
cater the requirements of the ever-increasing digital devices. Higher data rate with low …
Secure network coding on a wiretap network
N Cai, RW Yeung - IEEE Transactions on Information Theory, 2010 - ieeexplore.ieee.org
In the paradigm of network coding, the nodes in a network are allowed to encode the
information received from the input links. With network coding, the full capacity of the …
information received from the input links. With network coding, the full capacity of the …
Network coding applications
C Fragouli, E Soljanin - Foundations and Trends® in …, 2008 - nowpublishers.com
Network coding is an elegant and novel technique introduced at the turn of the millennium to
improve network throughput and performance. It is expected to be a critical technology for …
improve network throughput and performance. It is expected to be a critical technology for …
Securing dynamic distributed storage systems against eavesdropping and adversarial attacks
S Pawar, S El Rouayheb… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
We address the problem of securing distributed storage systems against eavesdropping and
adversarial attacks. An important aspect of these systems is node failures over time …
adversarial attacks. An important aspect of these systems is node failures over time …
Universal secure network coding via rank-metric codes
D Silva, FR Kschischang - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
The problem of securing a network coding communication system against an eavesdropper
is considered. The network implements linear network coding to deliver n packets from …
is considered. The network implements linear network coding to deliver n packets from …
Reliable and secure multishot network coding using linearized Reed-Solomon codes
U Martínez-Peñas… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Multishot network coding is considered in a worst-case adversarial setting in which an
omniscient adversary with unbounded computational resources may inject erroneous …
omniscient adversary with unbounded computational resources may inject erroneous …
Coding for large-scale distributed machine learning
M Xiao, M Skoglund - Entropy, 2022 - mdpi.com
This article aims to give a comprehensive and rigorous review of the principles and recent
development of coding for large-scale distributed machine learning (DML). With increasing …
development of coding for large-scale distributed machine learning (DML). With increasing …
Secure network coding for wiretap networks of type II
S El Rouayheb, E Soljanin… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
We consider the problem of securing a multicast network against a wiretapper that can
eavesdrop on the packets on a limited number of network edges of its choice. We assume …
eavesdrop on the packets on a limited number of network edges of its choice. We assume …
Network coding-based post-quantum cryptography
We propose a novel hybrid universal network-coding cryptosystem (HUNCC) to obtain
secure post-quantum cryptography at high communication rates. The secure network-coding …
secure post-quantum cryptography at high communication rates. The secure network-coding …