[图书][B] Physical-layer security: from information theory to security engineering

M Bloch, J Barros - 2011 - books.google.com
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …

On security against pollution attacks in network coding enabled 5g networks

VA Vasudevan, C Tselios, I Politis - IEEE Access, 2020 - ieeexplore.ieee.org
Future communication networks need to harness the available spectrum more efficiently to
cater the requirements of the ever-increasing digital devices. Higher data rate with low …

Secure network coding on a wiretap network

N Cai, RW Yeung - IEEE Transactions on Information Theory, 2010 - ieeexplore.ieee.org
In the paradigm of network coding, the nodes in a network are allowed to encode the
information received from the input links. With network coding, the full capacity of the …

Network coding applications

C Fragouli, E Soljanin - Foundations and Trends® in …, 2008 - nowpublishers.com
Network coding is an elegant and novel technique introduced at the turn of the millennium to
improve network throughput and performance. It is expected to be a critical technology for …

Securing dynamic distributed storage systems against eavesdropping and adversarial attacks

S Pawar, S El Rouayheb… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
We address the problem of securing distributed storage systems against eavesdropping and
adversarial attacks. An important aspect of these systems is node failures over time …

Universal secure network coding via rank-metric codes

D Silva, FR Kschischang - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
The problem of securing a network coding communication system against an eavesdropper
is considered. The network implements linear network coding to deliver n packets from …

Reliable and secure multishot network coding using linearized Reed-Solomon codes

U Martínez-Peñas… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Multishot network coding is considered in a worst-case adversarial setting in which an
omniscient adversary with unbounded computational resources may inject erroneous …

Coding for large-scale distributed machine learning

M Xiao, M Skoglund - Entropy, 2022 - mdpi.com
This article aims to give a comprehensive and rigorous review of the principles and recent
development of coding for large-scale distributed machine learning (DML). With increasing …

Secure network coding for wiretap networks of type II

S El Rouayheb, E Soljanin… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
We consider the problem of securing a multicast network against a wiretapper that can
eavesdrop on the packets on a limited number of network edges of its choice. We assume …

Network coding-based post-quantum cryptography

A Cohen, RGL D'Oliveira, S Salamatian… - IEEE journal on …, 2021 - ieeexplore.ieee.org
We propose a novel hybrid universal network-coding cryptosystem (HUNCC) to obtain
secure post-quantum cryptography at high communication rates. The secure network-coding …