Network coding theory part I: single source

RW Yeung, SYR Li, N Cai… - Foundations and Trends® …, 2006 - nowpublishers.com
Store-and-forward had been the predominant technique for transmitting information through
a network until its optimality was refuted by network coding theory. Network coding offers a …

[图书][B] Physical-layer security: from information theory to security engineering

M Bloch, J Barros - 2011 - books.google.com
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …

Network coding: an instant primer

C Fragouli, JY Le Boudec, J Widmer - ACM SIGCOMM Computer …, 2006 - dl.acm.org
Network coding is a new research area that may have interesting applications in practical
networking systems. With network coding, intermediate nodes may send out packets that are …

[图书][B] Network coding: an introduction

T Ho, D Lun - 2008 - books.google.com
Network coding promises to significantly impact the way communications networks are
designed, operated, and understood. This book presents a unified and intuitive overview of …

On security against pollution attacks in network coding enabled 5g networks

VA Vasudevan, C Tselios, I Politis - IEEE Access, 2020 - ieeexplore.ieee.org
Future communication networks need to harness the available spectrum more efficiently to
cater the requirements of the ever-increasing digital devices. Higher data rate with low …

Secure network coding on a wiretap network

N Cai, RW Yeung - IEEE Transactions on Information Theory, 2010 - ieeexplore.ieee.org
In the paradigm of network coding, the nodes in a network are allowed to encode the
information received from the input links. With network coding, the full capacity of the …

Network coding applications

C Fragouli, E Soljanin - Foundations and Trends® in …, 2008 - nowpublishers.com
Network coding is an elegant and novel technique introduced at the turn of the millennium to
improve network throughput and performance. It is expected to be a critical technology for …

Universal secure network coding via rank-metric codes

D Silva, FR Kschischang - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
The problem of securing a network coding communication system against an eavesdropper
is considered. The network implements linear network coding to deliver n packets from …

Random linear network coding: A free cipher?

L Lima, M Médard, J Barros - 2007 IEEE international …, 2007 - ieeexplore.ieee.org
We consider the level of information security provided by random linear network coding in
network scenarios in which all nodes comply with the communication protocols yet are …

Byzantine modification detection in multicast networks with random network coding

T Ho, B Leong, R Koetter, M Médard… - IEEE Transactions …, 2008 - ieeexplore.ieee.org
An information-theoretic approach for detecting Byzantine or adversarial modifications in
networks employing random linear network coding is described. Each exogenous source …