Security

Secure Multiplex Network Coding

Free registration required

Executive Summary

Network coding attracts much attention recently because it can offer improvements in some metrics, such as throughput and energy consumption. On the other hand, the information theoretic security also attracts much attention because it offers security that does not depend on a conjectured difficulty of some computational problem. A juncture of the network coding and the information theoretic security is the secure network coding, which prevents an eavesdropper, called Eve, from knowing the message from the legitimate sender, called Alice, to the legitimate receivers by eavesdropping intermediate links up to a specified number in a network.

  • Format: PDF
  • Size: 98.84 KB