How to make a linear network code (strongly) secure
نویسندگان
چکیده
منابع مشابه
Strongly Secure Linear Network Coding
In a network with capacity h for multicast, information Xh = (X1, X2, · · · , Xh) can be transmitted from a source node to sink nodes without error by a linear network code. Furthermore, secret information S r = (S 1, S 2, · · · , S r) can be transmitted securely against wiretappers by k-secure network coding for k ≤ h−r. In this case, no information of the secret leaks out even if an adversary...
متن کاملHow to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories for the data are physically distributed. Nevertheless, distribution makes security more difficult, since it may be difficult to ensure that each repository is physically secure, particularly if the number of repositori...
متن کاملHow to Make a Semantic Network Probabilistic
Words and phrases associate with each other to form a semantic network. Characterizing such associations is a first step toward understanding natural languages for machines. Psychologists and linguists have used concepts such as typicality and basic level conceptualization to characterize such associations. However, how to quantify such concepts is an open problem. Recently, much work has focus...
متن کاملHow to Make Personalized Web Browsing Simple Secure and Anonymous
An increasing number of web sites require users to establish an account before they can access the information stored on that site personalized web browsing Typically the user is required to provide at least a unique username a secret password and an e mail address Establishing accounts at multiple web sites is a tedious task A security and privacy aware user may have to invent a distinct usern...
متن کاملHow to Make the Hidden Visible – Code Clone Presentation Revisited
Nowadays, a slew of clone detection approaches exists, producing a lot of clone data. This data needs to be analyzed, either manually or automatically. However, even after analysis, it is still not trivial to derive conclusions or actions from the analyzed data. In particular, we argue that it is often unclear how the cloning information should be presented to the user. We present our idea of t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Designs, Codes and Cryptography
سال: 2016
ISSN: 0925-1022,1573-7586
DOI: 10.1007/s10623-016-0180-0