[كتاب][B] Physical-layer security: from information theory to security engineering
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …
implementation, challenges and benefits of a groundbreaking new model for secure …
Instantly decodable network coding: From centralized to device-to-device communications
From its introduction to its quindecennial, network coding has built a strong reputation for
enhancing packet recovery and achieving maximum information flow in both wired and …
enhancing packet recovery and achieving maximum information flow in both wired and …
Secure network coding on a wiretap network
In the paradigm of network coding, the nodes in a network are allowed to encode the
information received from the input links. With network coding, the full capacity of the …
information received from the input links. With network coding, the full capacity of the …
Lightweight security for network coding
Under the emerging network coding paradigm, intermediate nodes in the network are
allowed not only to store and forward packets but also to process and mix different data …
allowed not only to store and forward packets but also to process and mix different data …
P-coding: secure network coding against eavesdrop** attacks
Though providing an intrinsic secrecy, network coding is still vulnerable to eavesdrop**
attacks, by which an adversary may compromise the confidentiality of message content …
attacks, by which an adversary may compromise the confidentiality of message content …
Security concerns and countermeasures in network coding based communication systems: A survey
This survey paper shows the state of the art in security mechanisms, where a deep review of
the current research and the status of this topic is carried out. We start by introducing …
the current research and the status of this topic is carried out. We start by introducing …
Theory of secure network coding
In this tutorial paper, we focus on the basic theory of linear secure network coding. Our goal
is to present fundamental results and provide preliminary knowledge for anyone interested …
is to present fundamental results and provide preliminary knowledge for anyone interested …
Relay selection for secure successive AF relaying networks with untrusted nodes
In this paper, the security aspect of an amplify-and-forward relaying network with untrusted
relay nodes is considered. The untrusted nodes can help to forward the received signal and …
relay nodes is considered. The untrusted nodes can help to forward the received signal and …
Softwarization and network coding in the mobile edge cloud for the tactile internet
Future communication systems, such as those enabling the Tactile Internet, will face
disruptive changes compared to the state-of-the-art systems, which are 1) highly dynamic …
disruptive changes compared to the state-of-the-art systems, which are 1) highly dynamic …
A lightweight encryption scheme for network-coded mobile ad hoc networks
Energy saving is an important issue in Mobile Ad Hoc Networks (MANETs). Recent studies
show that network coding can help reduce the energy consumption in MANETs by using …
show that network coding can help reduce the energy consumption in MANETs by using …