2018 26th Telecommunications Forum (TELFOR) 2018
DOI: 10.1109/telfor.2018.8611961
|View full text |Cite
|
Sign up to set email alerts
|

Finding Disjoint Paths in Boolean-Valued Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(11 citation statements)
references
References 9 publications
0
10
0
1
Order By: Relevance
“…According to the derivation of the above formula, we can draw a conclusion: if there is no extra path to choose, the paths can overlap, It is say the more the number of paths finally selected by the route, the higher the data security. This is different from the References 15‐21 that the paths must be disjoint. Therefore, in this transmission model, the security of FMPST algorithm is higher than traditional schemes.…”
Section: Fmpst Algorithmmentioning
confidence: 77%
See 3 more Smart Citations
“…According to the derivation of the above formula, we can draw a conclusion: if there is no extra path to choose, the paths can overlap, It is say the more the number of paths finally selected by the route, the higher the data security. This is different from the References 15‐21 that the paths must be disjoint. Therefore, in this transmission model, the security of FMPST algorithm is higher than traditional schemes.…”
Section: Fmpst Algorithmmentioning
confidence: 77%
“…The scheme in References 13,14 can find multiple paths, when the link fails, the standby paths can be turned on, but they can not reduce the data eavesdropping rate. Most of the multi‐path routing are improved on the basis of Dijkstra algorithm to find multiple disjoint paths such as References 15‐21. Disjoint multipath routing has additional advantages in data reliability and security, but which has obvious shortcomings.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Временная сложность алгоритма O(Kn 3 ) определяется сложностью поиска одного пути с максимальной по мощности репутацией. В качестве альтернативного способа поиска множества безопас-ных путей для многопутевого расширения протокола маршрутизации OLSR можно также использовать модифицированный алгоритм Бандари с сопоставимой сложностью [9], который позволяет найти K вершинно непересекающихся путей с максимальной совокупной репутацией, вычисляемой как пересечение глобальной репутации всех путей, входящих в искомое множество.…”
Section: алгоритм поиска множества безопасных маршрутовunclassified