On security against pollution attacks in network coding enabled 5g networks

VA Vasudevan, C Tselios, I Politis - IEEE Access, 2020 - ieeexplore.ieee.org
Future communication networks need to harness the available spectrum more efficiently to
cater the requirements of the ever-increasing digital devices. Higher data rate with low …

Reliable and secure multishot network coding using linearized Reed-Solomon codes

U Martínez-Peñas… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Multishot network coding is considered in a worst-case adversarial setting in which an
omniscient adversary with unbounded computational resources may inject erroneous …

Network coding-based post-quantum cryptography

A Cohen, RGL D'Oliveira, S Salamatian… - IEEE journal on …, 2021 - ieeexplore.ieee.org
We propose a novel hybrid universal network-coding cryptosystem (HUNCC) to obtain
secure post-quantum cryptography at high communication rates. The secure network-coding …

Coding for large-scale distributed machine learning

M **ao, M Skoglund - Entropy, 2022 - mdpi.com
This article aims to give a comprehensive and rigorous review of the principles and recent
development of coding for large-scale distributed machine learning (DML). With increasing …

Fundamentals of index coding

F Arbabjolfaei, YH Kim - Foundations and Trends® in …, 2018 - nowpublishers.com
Index coding is a canonical problem in network information theory that studies the
fundamental limit and optimal coding schemes for broadcasting multiple messages to …

Theory of secure network coding

N Cai, T Chan - Proceedings of the IEEE, 2011 - ieeexplore.ieee.org
In this tutorial paper, we focus on the basic theory of linear secure network coding. Our goal
is to present fundamental results and provide preliminary knowledge for anyone interested …

Private coded caching

V Ravindrakumar, P Panda… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Recent work by Maddah-Ali and Niesen (2014) introduced coded caching which
demonstrated the benefits of joint design of storage and transmission policies in content …

Private and rateless adaptive coded matrix-vector multiplication

R Bitar, Y **ng, Y Keshtkarjahromi, V Dasari… - EURASIP Journal on …, 2021 - Springer
Edge computing is emerging as a new paradigm to allow processing data near the edge of
the network, where the data is typically generated and collected. This enables critical …

Staircase codes for secret sharing with optimal communication and read overheads

R Bitar, S El Rouayheb - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
We study the communication efficient secret sharing (CESS) problem. A classical threshold
secret sharing scheme encodes a secret into n shares given to n parties, such that any set of …

Critical security issues in cloud computing: a survey

X Sun - 2018 IEEE 4th International Conference on Big Data …, 2018 - ieeexplore.ieee.org
An exponential growth of cloud computing is dramatically changing contemporary network
service manners. A large scope of cloud-based service offerings, X-as-a-Service (XaaS), are …