Обзор технологий беспроводных сетей
АИ Колыбельников - Труды Московского физико-технического …, 2012 - cyberleninka.ru
Обзор технологий беспроводных сетей – тема научной статьи по компьютерным и
информационным наукам читайте бесплатно текст научно-исследовательской работы в …
информационным наукам читайте бесплатно текст научно-исследовательской работы в …
Network coding based privacy preservation against traffic analysis in multi-hop wireless networks
Privacy threat is one of the critical issues in multi-hop wireless networks, where attacks such
as traffic analysis and flow tracing can be easily launched by a malicious adversary due to …
as traffic analysis and flow tracing can be easily launched by a malicious adversary due to …
Opportunistic relaying and random linear network coding for secure and reliable communication
AS Khan, I Chatzigeorgiou - IEEE Transactions on Wireless …, 2017 - ieeexplore.ieee.org
Opportunistic relaying has the potential to achieve full diversity gain, while random linear
network coding (RLNC) can reduce latency and energy consumption. In recent years, there …
network coding (RLNC) can reduce latency and energy consumption. In recent years, there …
Secure network coding for multi-resolution wireless video streaming
Emerging practical schemes indicate that algebraic mixing of different packets by means of
random linear network coding can increase the throughput and robustness of streaming …
random linear network coding can increase the throughput and robustness of streaming …
Security and privacy issues for the network of the future
The vision towards the Network of the Future cannot be separated from the fact that today's
networks, and networking services are subject to sophisticated and very effective attacks …
networks, and networking services are subject to sophisticated and very effective attacks …
Novel compressed linear network coding vectors for multihop communication networks
Abstract Random Linear Network Coding (RLNC) is well-known to provide high throughput
and low latency for vast communication networks. However, RLNC often suffers from high …
and low latency for vast communication networks. However, RLNC often suffers from high …
[图书][B] Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach
B Zolfaghari, K Bibak - 2022 - books.google.com
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-
secure cryptosystem guarantees that the malicious third party cannot guess anything …
secure cryptosystem guarantees that the malicious third party cannot guess anything …
eSPOC: Enhanced secure practical network coding for better efficiency and lower latency
S Pfennig, E Franz - 2016 IEEE Globecom Workshops (GC …, 2016 - ieeexplore.ieee.org
Network Coding is a key technique to fulfill the demands of next generation information
technology. However, stored and transmitted data is only valuable if its confidentiality is …
technology. However, stored and transmitted data is only valuable if its confidentiality is …
Hide and code: Session anonymity in wireless line networks with coded packets
H Sousa-Pinto, DE Lucani… - 2012 Information Theory …, 2012 - ieeexplore.ieee.org
The broadcast nature of the communication channel enables a malicious eavesdropper to
gain information about connectivity and active sessions in a multi-hop wireless network. This …
gain information about connectivity and active sessions in a multi-hop wireless network. This …