2010 IEEE International Symposium on Network Coding (NetCod) 2010
DOI: 10.1109/netcod.2010.5487671
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Weakly-Secure Network Coding Schemes against Wiretapping Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 24 publications
0
15
0
Order By: Relevance
“…Two important issues in secure network co mmunicat ion are secrecy and authenticity. In the network coding context, the problem of ensuring secrecy in the presence of a wire tap adversary has been considered in [10] and [11]. The problem of correct ing adversarial errors to build authenticated channels has been studied in [12] and [13].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Two important issues in secure network co mmunicat ion are secrecy and authenticity. In the network coding context, the problem of ensuring secrecy in the presence of a wire tap adversary has been considered in [10] and [11]. The problem of correct ing adversarial errors to build authenticated channels has been studied in [12] and [13].…”
Section: Background and Related Workmentioning
confidence: 99%
“…The work in [14] looks at security for network coded sensor networks with keys distributed by a mobile agent that visits the nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Wei et al [14] studied two efficient LNC schemes providing weak security by using random symbol and permutation function. Silva and Kschischang [15] showed more efficient weakly secure LNC scheme which does not need to enlarge the size of finite field.…”
Section: Related Workmentioning
confidence: 99%