Repairable fountain coded storage systems for multi-tier mobile edge caching networks

Y Wang, S Gu, L Zhao, N Zhang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Mobile edge caching (MEC) is an emerging paradigm where cloud services are extended to
base stations (BSs) and devices to support a variety of applications and services in the …

Secure and private cloud storage systems with random linear fountain codes

MK Kiskani, HR Sadjadpour - … Internet of People and Smart City …, 2017 - ieeexplore.ieee.org
An information theoretic approach to security and privacy called Secure And Private
Information Retrieval (SAPIR) is introduced. SAPIR is applied to distributed data storage …

Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1

L Wang, F Niu, J Jin, L Yu - Applied Sciences, 2023 - mdpi.com
Fountain code can significantly increase eavesdroppers' untranslated efficiency in the
wireless communication eavesdropping channel. The secondary LT coding anti …

Low complexity secure code (LCSC) design for big data in cloud storage systems

MK Kiskani, HR Sadjadpour, MR Rahimi… - 2018 IEEE …, 2018 - ieeexplore.ieee.org
In the era of big data, reducing the computational complexity of servers in data centers will
be an important goal. We propose Low Complexity Secure Codes (LCSCs) that are …

Achieving perfect secrecy with one bit keys

MK Kiskani, HR Sadjadpour - MILCOM 2018-2018 IEEE …, 2018 - ieeexplore.ieee.org
Shannon perfect secrecy, also known as one-time pad, can only be achieved by using
exactly a different key bit for each information bit. This requirement makes the …

On the robustness of three classes of rateless codes against pollution attacks in P2P networks

R Gaeta, M Grangetto - Peer-to-Peer Networking and Applications, 2021 - Springer
Rateless codes (aka fountain codes, digital fountain) have found their way in numerous peer-
to-peer based applications although their robustness to the so called pollution attack has not …

Secure Partially Collaborative Codes

S Liu, F Ye - IEEE Communications Letters, 2022 - ieeexplore.ieee.org
We study secrecy in distributed storage systems (DSS) in the presence of a passive
eavesdropper. In particular, we are interested in the repair model called partially …

Secure and private information retrieval (SAPIR) in cloud storage systems

MK Kiskani, HR Sadjadpour - IEEE Transactions on Vehicular …, 2018 - ieeexplore.ieee.org
An information theoretic approach to security and privacy for cloud data storage systems is
introduced in this paper. The approach called Secure and Private Information Retrieval …

[图书][B] Coded Caching in Wireless Networks and Storage Systems

MK Kiskani - 2017 - search.proquest.com
Coded caching in wireless networks and storage systems is studied. Caching based on two
types of codes, index codes and fountain codes, is investigated in terms of network …

Extra-compact key with reusable common key for encryption

HR Sadjadpour - US Patent 11,741,268, 2023 - Google Patents
Techniques for secure public exposure of digital data include extracting first digital data
comprising one or more batches, each batch comprising a plurality of no more than a …