Search Results - Secure Network Coding Coding

Refine Results
  1. 1

    Secure Physical Layer Network Coding versus Secure Network Coding by Hayashi, Masahito

    ISSN: 1099-4300, 1099-4300
    Published: Switzerland MDPI AG 27.12.2021
    Published in Entropy (Basel, Switzerland) (27.12.2021)
    “… Secure network coding (secure NC) is known as a method to resolve this problem, which enables the secrecy of the message when the message is transmitted over a noiseless network and a part of the edges or a part of the intermediate (untrusted…”
    Get full text
    Journal Article
  2. 2

    Secure network coding from secure proof of retrievability by Chang, Jinyong, Shao, Bilin, Ji, Yanyan, Xu, Maozhi, Xue, Rui

    ISSN: 1674-733X, 1869-1919
    Published: Beijing Science China Press 01.12.2021
    Published in Science China. Information sciences (01.12.2021)
    Get full text
    Journal Article
  3. 3

    (Secure) Linear network coding multicast: A theoretical minimum and some open problems by Fragouli, Christina, Soljanin, Emina

    ISSN: 0925-1022, 1573-7586
    Published: New York Springer US 01.01.2016
    Published in Designs, codes, and cryptography (01.01.2016)
    “…We introduce network coding in an elementary way, through a combinatorial/algebraic framework, and discuss connections with classical coding theory…”
    Get full text
    Journal Article
  4. 4

    Secure Cloud Storage Meets with Secure Network Coding by Fei Chen, Tao Xiang, Yuanyuan Yang, Chow, Sherman S. M.

    ISSN: 0018-9340, 1557-9956
    Published: New York IEEE 01.06.2016
    Published in IEEE transactions on computers (01.06.2016)
    “…This paper reveals an intrinsic relationship between secure cloud storage and secure network coding for the first time…”
    Get full text
    Journal Article
  5. 5

    P-Coding: Secure Network Coding against Eavesdropping Attacks by Peng Zhang, Yixin Jiang, Chuang Lin, Yanfei Fan, Xuemin Shen

    ISBN: 1424458366, 9781424458363
    ISSN: 0743-166X
    Published: IEEE 01.03.2010
    Published in 2010 Proceedings IEEE INFOCOM (01.03.2010)
    “…Though providing an intrinsic secrecy, network coding is still vulnerable to eavesdropping attacks, by which an adversary may compromise the confidentiality of message content…”
    Get full text
    Conference Proceeding
  6. 6

    Secure Network Coding on a Wiretap Network by Ning Cai, Yeung, Raymond W

    ISSN: 0018-9448, 1557-9654
    Published: New York, NY IEEE 01.01.2011
    Published in IEEE transactions on information theory (01.01.2011)
    “…In the paradigm of network coding, the nodes in a network are allowed to encode the information received from the input links…”
    Get full text
    Journal Article
  7. 7

    Theory of Secure Network Coding by Cai, Ning, Chan, Terence

    ISSN: 0018-9219, 1558-2256
    Published: New York IEEE 01.03.2011
    Published in Proceedings of the IEEE (01.03.2011)
    “…In this tutorial paper, we focus on the basic theory of linear secure network coding…”
    Get full text
    Journal Article
  8. 8

    Local-Encoding-Preserving Secure Network Coding by Guang, Xuan, Yeung, Raymond W., Fu, Fang-Wei

    ISSN: 0018-9448, 1557-9654
    Published: New York IEEE 01.10.2020
    Published in IEEE transactions on information theory (01.10.2020)
    “… . Secure network coding is applied to prevent the leakage of the source information to the wiretappers…”
    Get full text
    Journal Article
  9. 9

    Efficient Protocols for Perfectly Secure Message Transmission With Applications to Secure Network Coding by Spini, Gabriele, Zemor, Gilles

    ISSN: 0018-9448, 1557-9654
    Published: New York IEEE 01.10.2020
    Published in IEEE transactions on information theory (01.10.2020)
    “…In the model that has become known as "Perfectly Secure Message Transmission" (PSMT), a sender Alice is connected to a receiver Bob…”
    Get full text
    Journal Article
  10. 10

    Secure Network Coding for Wiretap Networks of Type II by El Rouayheb, S., Soljanin, E., Sprintson, A.

    ISSN: 0018-9448, 1557-9654
    Published: New York, NY IEEE 01.03.2012
    Published in IEEE transactions on information theory (01.03.2012)
    “… We assume that the network employs network coding to simultaneously deliver the packets available at the source to all the…”
    Get full text
    Journal Article
  11. 11

    Secure Cloud Storage With Data Dynamics Using Secure Network Coding Techniques by Sengupta, Binanda, Dixit, Akanksha, Ruj, Sushmita

    ISSN: 2168-7161, 2372-0018
    Published: Piscataway IEEE 01.07.2022
    Published in IEEE transactions on cloud computing (01.07.2022)
    “… storage for dynamic data by leveraging the algorithms involved in secure network coding…”
    Get full text
    Journal Article
  12. 12

    Universal Secure Network Coding via Rank-Metric Codes by Silva, D, Kschischang, F R

    ISSN: 0018-9448, 1557-9654
    Published: New York IEEE 01.02.2011
    Published in IEEE transactions on information theory (01.02.2011)
    “…The problem of securing a network coding communication system against an eavesdropper is considered…”
    Get full text
    Journal Article
  13. 13

    Secure physical layer network coding versus secure network coding by Hayashi, Masahito

    Published: IEEE 01.11.2018
    “…Secure network coding realizes the secrecy of the message when the message is transmitted via noiseless network and a part of edges or a part of intermediate nodes are eavesdropped…”
    Get full text
    Conference Proceeding
  14. 14

    Network Coding Assisted Secure Transmission in Full-Duplex Relay Networks by He, Hongliang, Lyu, Shanxiang, He, Qinghao, Xu, Dongyang

    ISSN: 0018-9545, 1939-9359
    Published: New York IEEE 01.08.2020
    Published in IEEE transactions on vehicular technology (01.08.2020)
    “…Secure transmission in full-duplex relay networks is considered in this paper. To ensure security, we propose a network coding assisted relaying scheme…”
    Get full text
    Journal Article
  15. 15

    Reliable and Secure Multishot Network Coding Using Linearized Reed-Solomon Codes by Martinez-Penas, Umberto, Kschischang, Frank R.

    ISSN: 0018-9448, 1557-9654
    Published: New York IEEE 01.08.2019
    Published in IEEE transactions on information theory (01.08.2019)
    “…Multishot network coding is considered in a worst-case adversarial setting in which an omniscient adversary with unbounded computational resources may inject…”
    Get full text
    Journal Article
  16. 16

    On Secure Network Coding for Multiple Unicast Traffic by Agarwal, Gaurav Kumar, Cardone, Martina, Fragouli, Christina

    ISSN: 0018-9448, 1557-9654
    Published: New York IEEE 01.08.2020
    Published in IEEE transactions on information theory (01.08.2020)
    “… The main focus of this paper is on characterizing the secure capacity region, when the adversary has unbounded computational capabilities, but limited network presence…”
    Get full text
    Journal Article
  17. 17

    Secure physical layer network coding versus secure network coding by Hayashi, Masahito

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 01.12.2018
    Published in arXiv.org (01.12.2018)
    “…Secure network coding realizes the secrecy of the message when the message is transmitted via noiseless network and a part of edges or a part of intermediate nodes are eavesdropped…”
    Get full text
    Paper
  18. 18

    Single-Unicast Secure Network Coding and Network Error Correction are as Hard as Multiple-Unicast Network Coding by Huang, Wentao, Ho, Tracey, Langberg, Michael, Kliewer, Jorg

    ISSN: 0018-9448, 1557-9654
    Published: New York IEEE 01.06.2018
    Published in IEEE transactions on information theory (01.06.2018)
    “…This paper reduces multiple-unicast network coding to single-unicast secure network coding and single-unicast network error correction…”
    Get full text
    Journal Article
  19. 19

    Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach by Guang, Xuan, Yeung, Raymond W.

    ISSN: 0018-9448, 1557-9654
    Published: New York IEEE 01.06.2018
    Published in IEEE transactions on information theory (01.06.2018)
    “… The collection of wiretap sets can be arbitrary. Secure network coding is applied to prevent the source information from being leaked to the wiretappers…”
    Get full text
    Journal Article
  20. 20

    On Secure Network Coding With Nonuniform or Restricted Wiretap Sets by Tao Cui, Ho, T., Kliewer, J.

    ISSN: 0018-9448, 1557-9654
    Published: New York, NY IEEE 01.01.2013
    Published in IEEE transactions on information theory (01.01.2013)
    “… no information about the message. This paper considers secure network coding with nonuniform or restricted wiretap sets, for example, networks with unequal link capacities where a wiretapper can wiretap any subset of k links…”
    Get full text
    Journal Article