This paper studies secure unicast communication over a network with uniform wiretap sets and shows that, when network nodes can independently generate randomness, determining the secrecy capacity is at least as difficult as the k-unicast network coding problem. In particular, we show that a general k-unicast problem can be reduced to the problem of finding the secrecy capacity of a corresponding single unicast network with uniform link capacities and any one wiretap link. We propose a low-complexity linear optimization-based achievable strategy involving global random keys that can be generated anywhere in the network, and an efficient greedy algorithm that further improves achievable rate by exploiting local random keys
In this paper, we study the optimal design of linear network coding (LNC) for secure unicast against...
Abstract—We study the wireless secrecy capacity scaling prob-lem where the question of interest is h...
This paper reduces multiple-unicast network coding to single-unicast secure network coding and singl...
This paper studies secure unicast communication over a network with uniform wiretap sets and shows t...
The secrecy capacity of a network, for a given collection of permissible wiretap sets, is the maximu...
The secrecy capacity of a network, for a given collection of permissible wiretap sets, is the maximu...
The secrecy capacity of a network, for a given collection of permissible wiretap sets, is the maximu...
Abstract—Consider a communication network represented by a directed graph G = (V, E), where V is the...
This paper considers a special class of wiretap networks with a single source node and K sink nodes....
This paper considers a special class of wiretap networks with a single source node and K sink nodes....
International audienceWe study the problem of achieving strong secrecy over wiretap channels at negl...
It is common in the study of secure multicast network coding in the presence of an eavesdropper that...
Abstract—In this paper, we investigate how constraints on the randomization in the encoding process ...
It is common in the study of secure multicast network coding in the presence of an eavesdropper that...
In this paper, we will address the modeling and optimal design of linear network coding (LNC) for se...
In this paper, we study the optimal design of linear network coding (LNC) for secure unicast against...
Abstract—We study the wireless secrecy capacity scaling prob-lem where the question of interest is h...
This paper reduces multiple-unicast network coding to single-unicast secure network coding and singl...
This paper studies secure unicast communication over a network with uniform wiretap sets and shows t...
The secrecy capacity of a network, for a given collection of permissible wiretap sets, is the maximu...
The secrecy capacity of a network, for a given collection of permissible wiretap sets, is the maximu...
The secrecy capacity of a network, for a given collection of permissible wiretap sets, is the maximu...
Abstract—Consider a communication network represented by a directed graph G = (V, E), where V is the...
This paper considers a special class of wiretap networks with a single source node and K sink nodes....
This paper considers a special class of wiretap networks with a single source node and K sink nodes....
International audienceWe study the problem of achieving strong secrecy over wiretap channels at negl...
It is common in the study of secure multicast network coding in the presence of an eavesdropper that...
Abstract—In this paper, we investigate how constraints on the randomization in the encoding process ...
It is common in the study of secure multicast network coding in the presence of an eavesdropper that...
In this paper, we will address the modeling and optimal design of linear network coding (LNC) for se...
In this paper, we study the optimal design of linear network coding (LNC) for secure unicast against...
Abstract—We study the wireless secrecy capacity scaling prob-lem where the question of interest is h...
This paper reduces multiple-unicast network coding to single-unicast secure network coding and singl...