Blockchain for supply chain quality management: challenges and opportunities in context of open manufacturing and industrial internet of things

J Li, A Maiti, M Springer, T Gray - International Journal of Computer …, 2020 - Taylor & Francis
ABSTRACT In global Supply Chain Quality Management (SCQM), there are methods to
ensure continuity of supply, at appropriate prices while meeting quality standards. But they …

[图书][B] Cyber-physical systems: from theory to practice

DB Rawat, JJPC Rodrigues, I Stojmenovic - 2015 - books.google.com
Although comprehensive knowledge of cyber-physical systems (CPS) is becoming a must
for researchers, practitioners, system designers, policy makers, system managers, and …

On security against pollution attacks in network coding enabled 5g networks

VA Vasudevan, C Tselios, I Politis - IEEE Access, 2020 - ieeexplore.ieee.org
Future communication networks need to harness the available spectrum more efficiently to
cater the requirements of the ever-increasing digital devices. Higher data rate with low …

Homomorphic network coding signatures in the standard model

N Attrapadung, B Libert - Public Key Cryptography–PKC 2011: 14th …, 2011 - Springer
Network coding is known to provide improved resilience to packet loss and increased
throughput. Unlike traditional routing techniques, it allows network nodes to perform …

Padding for orthogonality: Efficient subspace authentication for network coding

P Zhang, Y Jiang, C Lin, H Yao… - 2011 Proceedings …, 2011 - ieeexplore.ieee.org
Network coding provides a promising alternative to traditional store-and-forward
transmission paradigm. However, due to its information-mixing nature, network coding is …

Security analysis and improvements on two homomorphic authentication schemes for network coding

C Cheng, J Lee, T Jiang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Recently, based on the homomorphic signatures, the authentication schemes, such as
homomorphic subspace signature (HSS) and key predistribution-based tag encoding …

Cooperative defense against pollution attacks in network coding using spacemac

A Le, A Markopoulou - IEEE Journal on Selected Areas in …, 2012 - ieeexplore.ieee.org
Intra-session network coding is inherently vulnerable to pollution attacks. In this paper, first,
we introduce a novel homomorphic MAC scheme called SpaceMac, which allows an …

A tag encoding scheme against pollution attack to linear network coding

X Wu, Y Xu, C Yuen, L Xiang - IEEE Transactions on Parallel …, 2013 - ieeexplore.ieee.org
Network coding allows intermediate nodes to encode data packets to improve network
throughput and robustness. However, it increases the propagation speed of polluted data …

An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks

A Esfahani, G Mantas, J Rodriguez… - International Journal of …, 2017 - Springer
Recent research efforts have shown that wireless networks can benefit from network coding
(NC) technology in terms of bandwidth, robustness to packet losses, delay and energy …

Preventing pollution attacks in multi-source network coding

S Agrawal, D Boneh, X Boyen, DM Freeman - Public Key Cryptography …, 2010 - Springer
Network coding is a method for achieving channel capacity in networks. The key idea is to
allow network routers to linearly mix packets as they traverse the network so that recipients …