Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

maximized information transmission

biblio

Visible to the public Security modalities on linear network code for randomized sources

Submitted by grigby1 on Mon, 06/11/2018 - 3:34pm
  • randomized sources
  • network coding
  • number random symbols
  • optimally secure information transmission
  • Peer-to-peer computing
  • pubcrawl
  • r-secure
  • random keys
  • random source symbols
  • randomized source messages
  • Metrics
  • resilience
  • Resiliency
  • Secure network code
  • security
  • security constraints
  • security modalities
  • telecommunication security
  • weakly secure
  • wiretapped network
  • information symbols
  • composability
  • computational security
  • Conferences
  • cryptographic measure
  • Cryptography
  • encoding
  • illegitimate users
  • imperfectly secure
  • information rate
  • adversaries
  • information theoretic approach
  • information theoretic security bounds
  • Knowledge engineering
  • linear codes
  • linear network code
  • linear network coding scheme
  • Mathematical model
  • maximized information transmission

Terms of Use  |  ©2023. CPS-VO