The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Generation-based network coding is an important realization of network coding in practical networks. Due to the special data processing of generations, it is not only faced with intra-generation pollution attacks, but also is vulnerable to inter-generation pollution attacks. To solve this problem, we propose new homomorphic signature schemes for generationbased network coding. By means of the lattice...
It seems impossible to endow opportunistic characteristic to quantum network on the basis that quantum channel cannot be overheard without disturbance. We propose an opportunistic quantum network coding scheme by taking full advantage of channel characteristic of quantum teleportation. On one hand, it utilizes quantum channel for the secure transmission of quantum states and can detect eavesdroppers...
Considering the problem of how to efficiently transmit unknown quantum states in multi-unicast networks, we propose a nonlinear quantum network coding scheme with classical communication resource. On the conditions of free classical communication between adjacent nodes in a network, as well as unlimited capacities of classical channels, perfect quantum network coding is available. By means of local...
Wireless inter-flow network coding can improve the performance of multi-source unicast communication in multihop wireless networks. However, it encounters with serious security threat of pollution attack. In this paper, by combining signature and arbitration in wireless inter-flow network coding, we propose a deep detection scheme to locate malicious nodes after detecting pollution attacks. Firstly,...
This paper addresses the issue of throughput-delay of one-to-many wireless multi-hop flows based on random linear network coding (RLNC). Existing research results have been focusing on the single-hop model which is not suitable for wireless multi-hop networks. In addition, the conditions of related system model are too idealistic. To address these limitations, we herein investigate the performance...
Distributed storage is a scheme to store data in networked storage services, which is the basis of popular cloud storage solutions. Although this scheme has huge benefits in reducing maintenance and operation cost, it has several security concerns. Among them, malicious file deletion by the storage providers is a top concern. In this paper, we develop a novel error-tolerant solution, ET-DME, to effectively...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.