On security against pollution attacks in network coding enabled 5g networks
Future communication networks need to harness the available spectrum more efficiently to
cater the requirements of the ever-increasing digital devices. Higher data rate with low …
cater the requirements of the ever-increasing digital devices. Higher data rate with low …
[BOOK][B] Cyber-physical systems: from theory to practice
Although comprehensive knowledge of cyber-physical systems (CPS) is becoming a must
for researchers, practitioners, system designers, policy makers, system managers, and …
for researchers, practitioners, system designers, policy makers, system managers, and …
[HTML][HTML] Security engineering of patient-centered health care information systems in peer-to-peer environments: systematic review
Background Patient-centered health care information systems (PHSs) enable patients to
take control and become knowledgeable about their own health, preferably in a secure …
take control and become knowledgeable about their own health, preferably in a secure …
SECRET—Secure network coding for reduced energy next generation mobile small cells: A European Training Network in wireless communications and networking …
SECRET is a collaborative European Training Network (ETN) committed to create an
excellent educational training platform for Early Stage Researchers (ESRs) in the field of …
excellent educational training platform for Early Stage Researchers (ESRs) in the field of …
Cooperative defense against pollution attacks in network coding using spacemac
A Le, A Markopoulou - IEEE Journal on Selected Areas in …, 2012 - ieeexplore.ieee.org
Intra-session network coding is inherently vulnerable to pollution attacks. In this paper, first,
we introduce a novel homomorphic MAC scheme called SpaceMac, which allows an …
we introduce a novel homomorphic MAC scheme called SpaceMac, which allows an …
An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks
Recent research efforts have shown that wireless networks can benefit from network coding
(NC) technology in terms of bandwidth, robustness to packet losses, delay and energy …
(NC) technology in terms of bandwidth, robustness to packet losses, delay and energy …
IDLP: An efficient intrusion detection and location-aware prevention mechanism for network coding-enabled mobile small cells
Mobile small cell technology is considered as a 5G enabling technology for delivering
ubiquitous 5G services in a cost-effective and energy efficient manner. Moreover, Network …
ubiquitous 5G services in a cost-effective and energy efficient manner. Moreover, Network …
An efficient null space-based homomorphic MAC scheme against tag pollution attacks in RLNC
A Esfahani, G Mantas… - IEEE Communications …, 2016 - ieeexplore.ieee.org
This letter proposes an efficient null space-based homomorphic message authentication
code scheme providing resistance against tag pollution attacks in random linear network …
code scheme providing resistance against tag pollution attacks in random linear network …
Online decentralized multi-agents meta-learning with Byzantine resiliency
Meta-learning is a learning-to-learn paradigm that leverages past learning experiences for
quick adaptation to new learning tasks. It has a wide application, such as in few-shot …
quick adaptation to new learning tasks. It has a wide application, such as in few-shot …
An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification
Authentication schemes based on homomorphic message authentication codes (HMACs)
with or without a homomorphic cryptographic signature (HCS) have always played a vital …
with or without a homomorphic cryptographic signature (HCS) have always played a vital …