We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious errors. We provide polynomial-time distributed network codes that are information-theoretically rate-optimal for this scenario, improving on the rates achievable in prior work by Ngai et al. Our main contribution shows that as long as the sum of the number of links the adversary can jam (denoted by Z_O) and the number of links he can eavesdrop on (denoted by Z_I) is less than the network capacity (denoted by C) (i.e., Z(O) + Z_I < C), our codes can communicate (with vanishingly small error probability) a single bit correctly and without leaking any information to the adversary...
This work considers the multiple-access multicast error-correction scenario over a packetized networ...
This article resolves an extreme case in physical layer security: an eavesdropper, located near to a...
In this work, we consider the possibility and the effectiveness of implementing secure network codin...
We consider the problem of communicating information over a network secretly and reliably in the pre...
Abstract—We consider the problem of communicating infor-mation over a network secretly and reliably ...
Abstract—We consider the problem of communicating infor-mation over a network secretly and reliably ...
Network coding substantially increases network throughput. But since it involves mixing of informati...
Abstract — Network coding substantially increases net-work throughput. But since it involves mixing ...
Network coding substantially increases network throughput. But since it involves mixing of informati...
Abstract—1 We consider the problem of secure unicast trans-mission between two nodes in a directed g...
Abstract—1 We consider the problem of secure unicast trans-mission between two nodes in a directed g...
This paper considers a network comprising a transmitter, which employs random linear network coding ...
PosterThis work focuses on interference networks with secrecy constraints. For the two user channel,...
The network communication scenario where one or more receivers request all the information transmitt...
The network communication scenario where one or more receivers request all the information transmitt...
This work considers the multiple-access multicast error-correction scenario over a packetized networ...
This article resolves an extreme case in physical layer security: an eavesdropper, located near to a...
In this work, we consider the possibility and the effectiveness of implementing secure network codin...
We consider the problem of communicating information over a network secretly and reliably in the pre...
Abstract—We consider the problem of communicating infor-mation over a network secretly and reliably ...
Abstract—We consider the problem of communicating infor-mation over a network secretly and reliably ...
Network coding substantially increases network throughput. But since it involves mixing of informati...
Abstract — Network coding substantially increases net-work throughput. But since it involves mixing ...
Network coding substantially increases network throughput. But since it involves mixing of informati...
Abstract—1 We consider the problem of secure unicast trans-mission between two nodes in a directed g...
Abstract—1 We consider the problem of secure unicast trans-mission between two nodes in a directed g...
This paper considers a network comprising a transmitter, which employs random linear network coding ...
PosterThis work focuses on interference networks with secrecy constraints. For the two user channel,...
The network communication scenario where one or more receivers request all the information transmitt...
The network communication scenario where one or more receivers request all the information transmitt...
This work considers the multiple-access multicast error-correction scenario over a packetized networ...
This article resolves an extreme case in physical layer security: an eavesdropper, located near to a...
In this work, we consider the possibility and the effectiveness of implementing secure network codin...