咨询与建议

限定检索结果

文献类型

  • 32 篇 期刊文献
  • 10 篇 会议

馆藏范围

  • 42 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 42 篇 工学
    • 31 篇 电气工程
    • 28 篇 计算机科学与技术...
    • 19 篇 信息与通信工程
    • 4 篇 电子科学与技术(可...
    • 2 篇 软件工程
    • 1 篇 控制科学与工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 网络空间安全
  • 8 篇 理学
    • 8 篇 数学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 42 篇 secure network c...
  • 15 篇 network coding
  • 5 篇 information-theo...
  • 4 篇 active attack
  • 3 篇 rank distance
  • 3 篇 network error co...
  • 3 篇 receivers
  • 3 篇 random linear ne...
  • 2 篇 secret sharing
  • 2 篇 rank-metric code...
  • 2 篇 routing
  • 2 篇 perfect secrecy
  • 2 篇 sequential injec...
  • 2 篇 secure distribut...
  • 2 篇 passive attack
  • 2 篇 graph theory
  • 2 篇 linear codes
  • 2 篇 protocols
  • 2 篇 kernel
  • 2 篇 unicast

机构

  • 4 篇 shanghaitech uni...
  • 4 篇 nankai univ sch ...
  • 4 篇 chinese univ hon...
  • 3 篇 southern univ sc...
  • 3 篇 aalborg univ dep...
  • 3 篇 nagoya univ grad...
  • 3 篇 nankai univ lpmc...
  • 3 篇 nankai univ cher...
  • 2 篇 natl univ singap...
  • 2 篇 chinese univ hon...
  • 2 篇 southern univ sc...
  • 2 篇 southern univ sc...
  • 1 篇 nagoya univ grad...
  • 1 篇 dutch org appl s...
  • 1 篇 kddi r&d labs in...
  • 1 篇 china natl digit...
  • 1 篇 china univ geosc...
  • 1 篇 soochow univ sch...
  • 1 篇 henan univ techn...
  • 1 篇 tokyo inst techn...

作者

  • 4 篇 guang xuan
  • 4 篇 yeung raymond w.
  • 4 篇 cai ning
  • 4 篇 hayashi masahito
  • 3 篇 fu fang-wei
  • 2 篇 uyematsu tomohik...
  • 2 篇 medard muriel
  • 2 篇 lu jiyong
  • 2 篇 cheng fan
  • 2 篇 huang kaizhi
  • 2 篇 jin liang
  • 2 篇 lu kejie
  • 2 篇 martinez-penas u...
  • 2 篇 kurihara jun
  • 2 篇 cohen alejandro
  • 2 篇 xiao shuaifang
  • 2 篇 guo yunfei
  • 2 篇 wang jin
  • 1 篇 brahimi mohamed ...
  • 1 篇 miller scott l.

语言

  • 39 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"主题词=secure network coding"
42 条 记 录,以下是1-10 订阅
secure network coding in the presence of eavesdroppers
收藏 引用
Science China(Information Sciences) 2010年 第3期53卷 648-658页
作者: LUO MingXing1,2,3, YANG YiXian1,2,3, WANG LiCheng1,2,3 & NIU XinXin1,2,3 1Information Security Center, State Key Laboratory of networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China 2Key Laboratory of network and Information Attack and Defence Technology of MOE, Beijing University of Posts and Telecommunications, Beijing 100876, China 3National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China 1. Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China2. Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China3. National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
Our concern, in the paper, is to construct information-theoretic secure network coding in the presence of eavesdroppers. Based on the generalized attack model and all-or-nothing transformation, the security of network... 详细信息
来源: 评论
secure network coding and Non-Malleable Codes: Protection Against Linear Tampering
Secure Network Coding and Non-Malleable Codes: Protection Ag...
收藏 引用
IEEE International Symposium on Information Theory
作者: Chabanne, Herve Cohen, Gerard Patey, Alain Morpho Paris France Telecom ParisTech Paris France Morpho Ident & Secur Alliance Paris France Telecom ParisTech Ident & Secur Alliance Paris France
At ICS 2010, Dziembowski et al. introduced the notion of Non-Malleable Codes (NMC), adapting the cryptographic notion of non-malleability to the coding theory. Using NMC, if an attacker modifies a codeword, decoding t... 详细信息
来源: 评论
An efficient MAC scheme for secure network coding with probabilistic detection
收藏 引用
Frontiers of Computer Science 2012年 第4期6卷 429-441页
作者: Boyang WANG Hui LI Jin CAO State Key Laboratory of Integrated Services Networks Xidian UniversityXi'an 710071China
network coding is vulnerable to pollution at- tacks, which prevent receivers from recovering the source message correctly. Most existing schemes against pollution attacks either bring significant redundancy to the ori... 详细信息
来源: 评论
Efficient Protocols for Perfectly secure Message Transmission With Applications to secure network coding
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2020年 第10期66卷 6340-6353页
作者: Spini, Gabriele Zemor, Gilles Ctr Wiskunde & Informat CWI NL-1098 XG Amsterdam Netherlands Dutch Org Appl Sci Res TNO Cyber Secur & Robustness Dept NL-2595 DA The Hague Netherlands Univ Bordeaux Inst Math Bordeaux UMR 5251 F-33400 Talence France
In the model that has become known as "Perfectly secure Message Transmission" (PSMT), a sender Alice is connected to a receiver Bob through n parallel two-way channels. A computationally unbounded adversary ... 详细信息
来源: 评论
On the mobile relay placement in hybrid MANETs with secure network coding
收藏 引用
SECURITY AND COMMUNICATION networkS 2014年 第4期7卷 738-749页
作者: Wang, Jin Lu, Kejie Soochow Univ Sch Comp Sci & Technol Suzhou Peoples R China Univ Puerto Rico Dept Elect & Comp Engn Mayaguez PR 00680 USA
In mobile ad hoc networks (MANET), deploying a small number of mobile relays can greatly improve the throughput, delay, and security performance. However, in such a hybrid MANET, it is challenging to determine the opt... 详细信息
来源: 评论
Refined secure network coding Scheme with no Restriction on coding Vectors
收藏 引用
IEEE COMMUNICATIONS LETTERS 2012年 第11期16卷 1907-1910页
作者: Kim, Young-Sik Chosun Univ Dept Informat & Commun Engn Kwangju South Korea
In this letter, we consider the secure network coding problem with no restriction on the network coding vectors. Adeli and Liu proposed a scheme achieving perfect security in a network with network coding. In order to... 详细信息
来源: 评论
On the Optimality of secure network coding
收藏 引用
IEEE COMMUNICATIONS LETTERS 2015年 第7期19卷 1165-1168页
作者: Guang, Xuan Lu, Jiyong Fu, Fang-Wei Nankai Univ Sch Math Sci Tianjin 300071 Peoples R China Nankai Univ LPMC Tianjin 300071 Peoples R China Nankai Univ Chern Inst Math Tianjin 300071 Peoples R China
In network communications, information transmission often encounters wiretapping attacks. secure network coding is introduced to prevent information from being leaked to adversaries. The investigation of performance b... 详细信息
来源: 评论
Cooperative Group Secret Key Generation Based on secure network coding
收藏 引用
IEEE COMMUNICATIONS LETTERS 2018年 第7期22卷 1466-1469页
作者: Xiao, Shuaifang Guo, Yunfei Huang, Kaizhi Jin, Liang China Natl Digital Switching Syst Engn & Technol Zhengzhou 450002 Henan Peoples R China
Most of the existing works on group secret key (GSK) generation are based on pairwise key which wasting the total time and power of the group users. We present a cooperative GSK generation algorithm via star topology ... 详细信息
来源: 评论
On the optimal design of secure network coding against wiretapping attack
收藏 引用
COMPUTER networkS 2016年 99卷 82-98页
作者: Chang, Xiangmao Wang, Jin Wang, Jianping Lu, Kejie Zhuang, Yi Nanjing Univ Aeronaut & Astronaut Sch Comp Sci & Technol 29 Jiangjun Rd Nanjing 211106 Jiangsu Peoples R China Soochow Univ Dept Comp Sci & Technol 1 Shizi Rd Suzhou 215006 Peoples R China City Univ Hong Kong Dept Comp Sci Kowloon Hong Kong Peoples R China Shanghai Univ Elect Power Coll Comp Sci & Technol 2588 Changyang Rd Shanghai 200090 Peoples R China Univ Puerto Rico Dept Elect & Comp Engn Mayaguez PR 00681 USA Collaborat Innovat Ctr Novel Software Technol & I Nanjing 210023 Jiangsu Peoples R China
In this paper, we study the optimal design of weakly secure linear network coding (WSLNC) against wiretapping attack. Specifically, given a set of wiretapped links, we investigate how to maximize the weakly secure tra... 详细信息
来源: 评论
Local-Encoding-Preserving secure network coding
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2020年 第10期66卷 5965-5994页
作者: Guang, Xuan Yeung, Raymond W. Fu, Fang-Wei Nankai Univ Sch Math Sci Tianjin 300071 Peoples R China Nankai Univ LPMC Tianjin 300071 Peoples R China Chinese Univ Hong Kong Inst Network Coding Hong Kong Peoples R China Chinese Univ Hong Kong Dept Informat Engn Hong Kong Peoples R China Nankai Univ Chern Inst Math Tianjin 300071 Peoples R China Nankai Univ Tianjin Key Lab Network & Data Secur Technol Tianjin 300071 Peoples R China
Information-theoretic security is considered in the paradigm of network coding in the presence of wiretappers, who can access one arbitrary edge subset up to a certain size, also referred to as the security level. Sec... 详细信息
来源: 评论