Обзор технологий беспроводных сетей

АИ Колыбельников - Труды Московского физико-технического …, 2012 - cyberleninka.ru
Обзор технологий беспроводных сетей – тема научной статьи по компьютерным и
информационным наукам читайте бесплатно текст научно-исследовательской работы в …

Network coding based privacy preservation against traffic analysis in multi-hop wireless networks

Y Fan, Y Jiang, H Zhu, J Chen… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Privacy threat is one of the critical issues in multi-hop wireless networks, where attacks such
as traffic analysis and flow tracing can be easily launched by a malicious adversary due to …

Opportunistic relaying and random linear network coding for secure and reliable communication

AS Khan, I Chatzigeorgiou - IEEE Transactions on Wireless …, 2017 - ieeexplore.ieee.org
Opportunistic relaying has the potential to achieve full diversity gain, while random linear
network coding (RLNC) can reduce latency and energy consumption. In recent years, there …

Secure network coding for multi-resolution wireless video streaming

L Lima, S Gheorghiu, J Barros… - IEEE Journal on …, 2010 - ieeexplore.ieee.org
Emerging practical schemes indicate that algebraic mixing of different packets by means of
random linear network coding can increase the throughput and robustness of streaming …

Security and privacy issues for the network of the future

GF Marias, J Barros, M Fiedler, A Fischer… - Security and …, 2012 - Wiley Online Library
The vision towards the Network of the Future cannot be separated from the fact that today's
networks, and networking services are subject to sophisticated and very effective attacks …

安全网络编码综述

曹张华, 唐元生 - 计算机应用, 2010 - joca.cn
对安全网络编码的研究和发展作了综述, 在介绍网络编码核心思想的基础上,
详细阐述了通信网络中各种常见的攻击, 并给出了对抗这些攻击所构建的安全网络编码协议 …

Novel compressed linear network coding vectors for multihop communication networks

AA Abudaqa, ASH Mahmoud, AA ALsaggaf… - Telecommunication …, 2024 - Springer
Abstract Random Linear Network Coding (RLNC) is well-known to provide high throughput
and low latency for vast communication networks. However, RLNC often suffers from high …

[图书][B] Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach

B Zolfaghari, K Bibak - 2022 - books.google.com
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-
secure cryptosystem guarantees that the malicious third party cannot guess anything …

eSPOC: Enhanced secure practical network coding for better efficiency and lower latency

S Pfennig, E Franz - 2016 IEEE Globecom Workshops (GC …, 2016 - ieeexplore.ieee.org
Network Coding is a key technique to fulfill the demands of next generation information
technology. However, stored and transmitted data is only valuable if its confidentiality is …

Hide and code: Session anonymity in wireless line networks with coded packets

H Sousa-Pinto, DE Lucani… - 2012 Information Theory …, 2012 - ieeexplore.ieee.org
The broadcast nature of the communication channel enables a malicious eavesdropper to
gain information about connectivity and active sessions in a multi-hop wireless network. This …