Abstract—We consider the problem of communicating infor-mation over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious errors. We provide polynomial-time distributed network codes that are information-theoretically rate-optimal for this scenario, improving on the rates achievable in prior work by Ngai et al. Our main contribution shows that as long as the sum of the number of links the adversary can jam (denoted by ZO) and the number of links he can eavesdrop on (denoted by ZI) is less than the network capacity (denoted by C), (i.e., ZO + ZI < C), our codes can communicate (with vanishingly small error probability) a single bit correctly and without leaking any information to the ...
This work considers the multiple-access multicast error-correction scenario over a packetized networ...
Abstract — Recent results have shown that structured codes can be used to construct good channel cod...
Abstract—In this paper, we investigate how constraints on the randomization in the encoding process ...
Abstract—We consider the problem of communicating infor-mation over a network secretly and reliably ...
We consider the problem of communicating information over a network secretly and reliably in the pre...
We consider the problem of communicating information over a network secretly and reliably in the pre...
Abstract — Network coding substantially increases net-work throughput. But since it involves mixing ...
Abstract—1 We consider the problem of secure unicast trans-mission between two nodes in a directed g...
Abstract—1 We consider the problem of secure unicast trans-mission between two nodes in a directed g...
Network coding substantially increases network throughput. But since it involves mixing of informati...
Network coding substantially increases network throughput. But since it involves mixing of informati...
Abstract—We study the wireless secrecy capacity scaling prob-lem where the question of interest is h...
Abstract—Consider a communication network represented by a directed graph G = (V, E), where V is the...
In the model that has become known as 'Perfectly Secure Message Transmission' (PSMT), a sender Alice...
In the model that has become known as 'Perfectly Secure Message Transmission' (PSMT), a sender Alice...
This work considers the multiple-access multicast error-correction scenario over a packetized networ...
Abstract — Recent results have shown that structured codes can be used to construct good channel cod...
Abstract—In this paper, we investigate how constraints on the randomization in the encoding process ...
Abstract—We consider the problem of communicating infor-mation over a network secretly and reliably ...
We consider the problem of communicating information over a network secretly and reliably in the pre...
We consider the problem of communicating information over a network secretly and reliably in the pre...
Abstract — Network coding substantially increases net-work throughput. But since it involves mixing ...
Abstract—1 We consider the problem of secure unicast trans-mission between two nodes in a directed g...
Abstract—1 We consider the problem of secure unicast trans-mission between two nodes in a directed g...
Network coding substantially increases network throughput. But since it involves mixing of informati...
Network coding substantially increases network throughput. But since it involves mixing of informati...
Abstract—We study the wireless secrecy capacity scaling prob-lem where the question of interest is h...
Abstract—Consider a communication network represented by a directed graph G = (V, E), where V is the...
In the model that has become known as 'Perfectly Secure Message Transmission' (PSMT), a sender Alice...
In the model that has become known as 'Perfectly Secure Message Transmission' (PSMT), a sender Alice...
This work considers the multiple-access multicast error-correction scenario over a packetized networ...
Abstract — Recent results have shown that structured codes can be used to construct good channel cod...
Abstract—In this paper, we investigate how constraints on the randomization in the encoding process ...