Network coding theory: A survey

R Bassoli, H Marques, J Rodriguez… - … Surveys & Tutorials, 2013 - ieeexplore.ieee.org
This article surveys all known fields of network coding theory and leads the reader through
the antecedents of the network coding theory to the most recent results, considering also …

Coding in diffusion-based molecular nanonetworks: A comprehensive survey

P Hofmann, JA Cabrera, R Bassoli, M Reisslein… - IEEE …, 2023 - ieeexplore.ieee.org
Diffusion-based molecular nanonetworks exploit the diffusion of molecules, eg, in free space
or in blood vessels, for the purpose of communication. This article comprehensively surveys …

[图书][B] Physical-layer security: from information theory to security engineering

M Bloch, J Barros - 2011 - books.google.com
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …

[图书][B] Network information theory

A El Gamal, YH Kim - 2011 - books.google.com
This comprehensive treatment of network information theory and its applications provides
the first unified coverage of both classical and recent results. With an approach that …

Information theoretic security

Y Liang, HV Poor, S Shamai - Foundations and Trends® in …, 2009 - nowpublishers.com
The topic of information theoretic security is introduced and the principal results in this area
are reviewed. The basic wire-tap channel model is considered first, and then several specific …

Microcast: Cooperative video streaming on smartphones

L Keller, A Le, B Cici, H Seferoglu, C Fragouli… - Proceedings of the 10th …, 2012 - dl.acm.org
Video streaming is one of the increasingly popular, as well as demanding, applications on
smartphones today. In this paper, we consider a group of smartphone users, within proximity …

Reliable physical layer network coding

B Nazer, M Gastpar - Proceedings of the IEEE, 2011 - ieeexplore.ieee.org
When two or more users in a wireless network transmit simultaneously, their electromagnetic
signals are linearly superimposed on the channel. As a result, a receiver that is interested in …

Homomorphic encryption and network coding in iot architectures: Advantages and future challenges

G Peralta, RG Cid-Fuentes, J Bilbao, PM Crespo - Electronics, 2019 - mdpi.com
The introduction of the Internet of Things (IoT) is creating manifold new services and
opportunities. This new technological trend enables the connection of a massive number of …

Modern random access protocols

M Berioli, G Cocco, G Liva… - Foundations and Trends …, 2016 - nowpublishers.com
Random access represents possibly the simplest and yet one of the best known approaches
for sharing a channel among several users. Since their introduction in the 1970s, random …

Joint inter-flow network coding and opportunistic routing in multi-hop wireless mesh networks: A comprehensive survey

S Kafaie, Y Chen, OA Dobre… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Network coding and opportunistic routing are two recognized innovative ideas to improve
the performance of wireless networks by utilizing the broadcast nature of the wireless …