MK Kiskani, HR Sadjadpour - … Internet of People and Smart City …, 2017 - ieeexplore.ieee.org
An information theoretic approach to security and privacy called Secure And Private Information Retrieval (SAPIR) is introduced. SAPIR is applied to distributed data storage …
L Wang, F Niu, J Jin, L Yu - Applied Sciences, 2023 - mdpi.com
Fountain code can significantly increase eavesdroppers' untranslated efficiency in the wireless communication eavesdropping channel. The secondary LT coding anti …
In the era of big data, reducing the computational complexity of servers in data centers will be an important goal. We propose Low Complexity Secure Codes (LCSCs) that are …
Shannon perfect secrecy, also known as one-time pad, can only be achieved by using exactly a different key bit for each information bit. This requirement makes the …
R Gaeta, M Grangetto - Peer-to-Peer Networking and Applications, 2021 - Springer
Rateless codes (aka fountain codes, digital fountain) have found their way in numerous peer- to-peer based applications although their robustness to the so called pollution attack has not …
S Liu, F Ye - IEEE Communications Letters, 2022 - ieeexplore.ieee.org
We study secrecy in distributed storage systems (DSS) in the presence of a passive eavesdropper. In particular, we are interested in the repair model called partially …
An information theoretic approach to security and privacy for cloud data storage systems is introduced in this paper. The approach called Secure and Private Information Retrieval …
Coded caching in wireless networks and storage systems is studied. Caching based on two types of codes, index codes and fountain codes, is investigated in terms of network …
HR Sadjadpour - US Patent 11,741,268, 2023 - Google Patents
Techniques for secure public exposure of digital data include extracting first digital data comprising one or more batches, each batch comprising a plurality of no more than a …