咨询与建议

限定检索结果

文献类型

  • 32 篇 期刊文献
  • 10 篇 会议

馆藏范围

  • 42 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 42 篇 工学
    • 31 篇 电气工程
    • 28 篇 计算机科学与技术...
    • 19 篇 信息与通信工程
    • 4 篇 电子科学与技术(可...
    • 2 篇 软件工程
    • 1 篇 控制科学与工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 网络空间安全
  • 8 篇 理学
    • 8 篇 数学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 42 篇 secure network c...
  • 15 篇 network coding
  • 5 篇 information-theo...
  • 4 篇 active attack
  • 3 篇 rank distance
  • 3 篇 network error co...
  • 3 篇 receivers
  • 3 篇 random linear ne...
  • 2 篇 secret sharing
  • 2 篇 rank-metric code...
  • 2 篇 routing
  • 2 篇 perfect secrecy
  • 2 篇 sequential injec...
  • 2 篇 secure distribut...
  • 2 篇 passive attack
  • 2 篇 graph theory
  • 2 篇 linear codes
  • 2 篇 protocols
  • 2 篇 kernel
  • 2 篇 unicast

机构

  • 4 篇 shanghaitech uni...
  • 4 篇 nankai univ sch ...
  • 4 篇 chinese univ hon...
  • 3 篇 southern univ sc...
  • 3 篇 aalborg univ dep...
  • 3 篇 nagoya univ grad...
  • 3 篇 nankai univ lpmc...
  • 3 篇 nankai univ cher...
  • 2 篇 natl univ singap...
  • 2 篇 chinese univ hon...
  • 2 篇 southern univ sc...
  • 2 篇 southern univ sc...
  • 1 篇 nagoya univ grad...
  • 1 篇 dutch org appl s...
  • 1 篇 kddi r&d labs in...
  • 1 篇 china natl digit...
  • 1 篇 china univ geosc...
  • 1 篇 soochow univ sch...
  • 1 篇 henan univ techn...
  • 1 篇 tokyo inst techn...

作者

  • 4 篇 guang xuan
  • 4 篇 yeung raymond w.
  • 4 篇 cai ning
  • 4 篇 hayashi masahito
  • 3 篇 fu fang-wei
  • 2 篇 uyematsu tomohik...
  • 2 篇 medard muriel
  • 2 篇 lu jiyong
  • 2 篇 cheng fan
  • 2 篇 huang kaizhi
  • 2 篇 jin liang
  • 2 篇 lu kejie
  • 2 篇 martinez-penas u...
  • 2 篇 kurihara jun
  • 2 篇 cohen alejandro
  • 2 篇 xiao shuaifang
  • 2 篇 guo yunfei
  • 2 篇 wang jin
  • 1 篇 brahimi mohamed ...
  • 1 篇 miller scott l.

语言

  • 39 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"主题词=secure network coding"
42 条 记 录,以下是21-30 订阅
排序:
secure network Code for Adaptive and Active Attacks With No-Randomness in Intermediate Nodes
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2020年 第3期66卷 1428-1448页
作者: Cai, Ning Hayashi, Masahito ShanghaiTech Univ Sch Informat Sci & Technol Shanghai 201210 Peoples R China Nagoya Univ Grad Sch Math Nagoya Aichi 4648602 Japan Southern Univ Sci & Technol Shenzhen Inst Quantum Sci & Engn Shenzhen 518055 Peoples R China Natl Univ Singapore Ctr Quantum Technol Singapore 117542 Singapore Peng Cheng Lab Ctr Quantum Comp Shenzhen 518000 Peoples R China
In secure network coding, there is a possibility that the eavesdropper can improve her performance when she changes (contaminates) the information on the attacked edges (active attack) and chooses the attacked edges a... 详细信息
来源: 评论
Bounds on relative generalised Hamming weight
收藏 引用
IET COMMUNICATIONS 2020年 第11期14卷 1794-1804页
作者: Zhuang, Zhuojun Zhang, Keke Jing, Zhen Dai, Bin Huang, Jia Chinese Acad Sci Innovat Acad Microsatellites 99 Haike Rd Shanghai 201203 Peoples R China Southwest Jiaotong Univ Sch Informat Sci & Technol 111First SectNorth Second Ring Rd Chengdu 610031 Sichuan Peoples R China
The rth relative generalised Hamming weight (RGHW) of an [n, k] linear code C and an [n, k(1)] subcode C-1, a generalisation of generalised Hamming weight (GHW), characterises code performances of wiretap channel of t... 详细信息
来源: 评论
Distributed Group Key Management for Event Notification Confidentiality Among Sensors
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND secure COMPUTING 2020年 第3期17卷 566-580页
作者: Esposito, Christian Ficco, Massimo Castiglione, Aniello Palmieri, Francesco De Santis, Alfredo Univ Salerno Comp Sci Dept I-84084 Fisciano SA Italy Univ Campania Luigi Vanvitelli Dept Ind & Informat Engn I-81031 Aversa CE Italy
There is an increasing involvement of the Internet of Things (IoT) in many of our daily activities, with the aim of improving their efficiency and effectiveness. We are witnessing the advent of smart cities, in which ... 详细信息
来源: 评论
secure network coding and Non-Malleable Codes: Protection Against Linear Tampering
Secure Network Coding and Non-Malleable Codes: Protection Ag...
收藏 引用
IEEE International Symposium on Information Theory
作者: Chabanne, Herve Cohen, Gerard Patey, Alain Morpho Paris France Telecom ParisTech Paris France Morpho Ident & Secur Alliance Paris France Telecom ParisTech Ident & Secur Alliance Paris France
At ICS 2010, Dziembowski et al. introduced the notion of Non-Malleable Codes (NMC), adapting the cryptographic notion of non-malleability to the coding theory. Using NMC, if an attacker modifies a codeword, decoding t... 详细信息
来源: 评论
An efficient MAC scheme for secure network coding with probabilistic detection
收藏 引用
Frontiers of Computer Science 2012年 第4期6卷 429-441页
作者: Boyang WANG Hui LI Jin CAO State Key Laboratory of Integrated Services Networks Xidian UniversityXi'an 710071China
network coding is vulnerable to pollution at- tacks, which prevent receivers from recovering the source message correctly. Most existing schemes against pollution attacks either bring significant redundancy to the ori... 详细信息
来源: 评论
Refined secure network coding Scheme with no Restriction on coding Vectors
收藏 引用
IEEE COMMUNICATIONS LETTERS 2012年 第11期16卷 1907-1910页
作者: Kim, Young-Sik Chosun Univ Dept Informat & Commun Engn Kwangju South Korea
In this letter, we consider the secure network coding problem with no restriction on the network coding vectors. Adeli and Liu proposed a scheme achieving perfect security in a network with network coding. In order to... 详细信息
来源: 评论
secure Multi-Source Multicast
收藏 引用
IEEE TRANSACTIONS ON COMMUNICATIONS 2019年 第1期67卷 708-723页
作者: Cohen, Alejandro Cohen, Asaf Medard, Muriel Gurewitz, Omer Ben Gurion Univ Negev Dept Commun Syst Engn IL-84105 Beer Sheva Israel MIT Lab Informat & Decis Syst Cambridge MA 02139 USA
The principal mission of multi-source multicast (MSM) is to disseminate all messages from all sources in a network to all destinations. MSM is utilized in numerous applications. In many of them, securing the messages ... 详细信息
来源: 评论
Generalized Rank Weights of Reducible Codes, Optimal Cases, and Related Properties
收藏 引用
IEEE TRANSACTIONS ON INFORMATION THEORY 2018年 第1期64卷 192-204页
作者: Martinez-Penas, Umberto Aalborg Univ Dept Math Sci DK-9220 Aalborg Denmark
Reducible codes for the rank metric were introduced for cryptographic purposes. They have fast encoding and decoding algorithms, include maximum rank distance (MRD) codes, and can correct many rank errors beyond half ... 详细信息
来源: 评论
High-rate secret key generation aided by multiple relays for Internet of things
收藏 引用
ELECTRONICS LETTERS 2017年 第17期53卷 1198-1200页
作者: Xiao, Shuaifang Guo, Yunfei Huang, Kaizhi Jin, Liang Natl Digital Switching Syst Engn Technol & Res Ct Zhengzhou Henan Peoples R China
A multiple relays aided secret key generation algorithm is proposed to improve the generated secret key rate for Internet of things when the wireless channels change slowly. First, the two legitimate users and relays ... 详细信息
来源: 评论
secure network coding in the presence of eavesdroppers
收藏 引用
Science China(Information Sciences) 2010年 第3期53卷 648-658页
作者: LUO MingXing1,2,3, YANG YiXian1,2,3, WANG LiCheng1,2,3 & NIU XinXin1,2,3 1Information Security Center, State Key Laboratory of networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China 2Key Laboratory of network and Information Attack and Defence Technology of MOE, Beijing University of Posts and Telecommunications, Beijing 100876, China 3National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China 1. Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China2. Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China3. National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
Our concern, in the paper, is to construct information-theoretic secure network coding in the presence of eavesdroppers. Based on the generalized attack model and all-or-nothing transformation, the security of network... 详细信息
来源: 评论