[كتاب][B] Physical-layer security: from information theory to security engineering

M Bloch, J Barros - 2011‏ - books.google.com
This complete guide to physical-layer security presents the theoretical foundations, practical
implementation, challenges and benefits of a groundbreaking new model for secure …

Instantly decodable network coding: From centralized to device-to-device communications

A Douik, S Sorour, TY Al-Naffouri… - … Surveys & Tutorials, 2017‏ - ieeexplore.ieee.org
From its introduction to its quindecennial, network coding has built a strong reputation for
enhancing packet recovery and achieving maximum information flow in both wired and …

Secure network coding on a wiretap network

N Cai, RW Yeung - IEEE Transactions on Information Theory, 2010‏ - ieeexplore.ieee.org
In the paradigm of network coding, the nodes in a network are allowed to encode the
information received from the input links. With network coding, the full capacity of the …

Lightweight security for network coding

JP Vilela, L Lima, J Barros - 2008 IEEE international …, 2008‏ - ieeexplore.ieee.org
Under the emerging network coding paradigm, intermediate nodes in the network are
allowed not only to store and forward packets but also to process and mix different data …

P-coding: secure network coding against eavesdrop** attacks

P Zhang, Y Jiang, C Lin, Y Fan… - 2010 Proceedings IEEE …, 2010‏ - ieeexplore.ieee.org
Though providing an intrinsic secrecy, network coding is still vulnerable to eavesdrop**
attacks, by which an adversary may compromise the confidentiality of message content …

Security concerns and countermeasures in network coding based communication systems: A survey

VN Talooki, R Bassoli, DE Lucani, J Rodriguez… - Computer Networks, 2015‏ - Elsevier
This survey paper shows the state of the art in security mechanisms, where a deep review of
the current research and the status of this topic is carried out. We start by introducing …

Theory of secure network coding

N Cai, T Chan - Proceedings of the IEEE, 2011‏ - ieeexplore.ieee.org
In this tutorial paper, we focus on the basic theory of linear secure network coding. Our goal
is to present fundamental results and provide preliminary knowledge for anyone interested …

Relay selection for secure successive AF relaying networks with untrusted nodes

W Wang, KC Teh, KH Li - IEEE Transactions on Information …, 2016‏ - ieeexplore.ieee.org
In this paper, the security aspect of an amplify-and-forward relaying network with untrusted
relay nodes is considered. The untrusted nodes can help to forward the received signal and …

Softwarization and network coding in the mobile edge cloud for the tactile internet

JA Cabrera, RS Schmoll, GT Nguyen… - Proceedings of the …, 2018‏ - ieeexplore.ieee.org
Future communication systems, such as those enabling the Tactile Internet, will face
disruptive changes compared to the state-of-the-art systems, which are 1) highly dynamic …

A lightweight encryption scheme for network-coded mobile ad hoc networks

P Zhang, C Lin, Y Jiang, Y Fan… - IEEE Transactions on …, 2013‏ - ieeexplore.ieee.org
Energy saving is an important issue in Mobile Ad Hoc Networks (MANETs). Recent studies
show that network coding can help reduce the energy consumption in MANETs by using …