Signing a linear subspace: Signature schemes for network coding

D Boneh, D Freeman, J Katz, B Waters - … on Practice and Theory in Public …, 2009 - Springer
Network coding offers increased throughput and improved robustness to random faults in
completely decentralized networks. In contrast to traditional routing schemes, however …

Homomorphic MACs: MAC-based integrity for network coding

S Agrawal, D Boneh - Applied Cryptography and Network Security: 7th …, 2009 - Springer
Network coding has been shown to improve the capacity and robustness in networks.
However, since intermediate nodes modify packets en-route, integrity of data cannot be …

[图书][B] Cyber-physical systems: from theory to practice

DB Rawat, JJPC Rodrigues, I Stojmenovic - 2015 - books.google.com
Although comprehensive knowledge of cyber-physical systems (CPS) is becoming a must
for researchers, practitioners, system designers, policy makers, system managers, and …

An efficient privacy-preserving scheme against traffic analysis attacks in network coding

Y Fan, Y Jiang, H Zhu, X Shen - IEEE INFOCOM 2009, 2009 - ieeexplore.ieee.org
Privacy threat is one of the critical issues in network coding, where attacks such as traffic
analysis can be easily launched by a malicious adversary once enough encoded packets …

Security concerns and countermeasures in network coding based communication systems: A survey

VN Talooki, R Bassoli, DE Lucani, J Rodriguez… - Computer Networks, 2015 - Elsevier
This survey paper shows the state of the art in security mechanisms, where a deep review of
the current research and the status of this topic is carried out. We start by introducing …

[HTML][HTML] Optimizing efficiency of P2P content distribution with network coding: Principles, challenges, and future directions

O Lajam, S Mohammed - Journal of Network and Computer Applications, 2024 - Elsevier
Network coding technology has opened new avenues for enhancing networking
applications. Peer-to-peer (P2P) content distribution stands as a particularly promising …

5G and wireless body area networks

RW Jones, K Katzis - 2018 IEEE wireless communications and …, 2018 - ieeexplore.ieee.org
5G wireless is the next step in the evolution of mobile communications with the aim being to
provide connectivity for any kind of device and any kind of application. Wireless Body Area …

Network coding based privacy preservation against traffic analysis in multi-hop wireless networks

Y Fan, Y Jiang, H Zhu, J Chen… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Privacy threat is one of the critical issues in multi-hop wireless networks, where attacks such
as traffic analysis and flow tracing can be easily launched by a malicious adversary due to …

Preventing pollution attacks in multi-source network coding

S Agrawal, D Boneh, X Boyen, DM Freeman - Public Key Cryptography …, 2010 - Springer
Network coding is a method for achieving channel capacity in networks. The key idea is to
allow network routers to linearly mix packets as they traverse the network so that recipients …

Network coding is the 5G key enabling technology: Effects and strategies to manage heterogeneous packet lengths

P Torres Compta, FHP Fitzek… - Transactions on …, 2015 - Wiley Online Library
The exponential growth of the mobile devices market, not only smartphones but also tablets,
laptops or wearables, poses a serious challenge for 5G communications. Random linear …