Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Network Coding via Filtered Secret Sharing∗

We study the problem of using a multicast network code to transmit information securely in the presence of a “wire-tap” adversary who can eavesdrop on a bounded number of network edges. We establish a close connection between secure linear network coding and a new variant of the secret sharing problem, which we call filtered secret sharing. Using this connection, we establish new trade-offs bet...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

Performance Analysis of Device to Device Communications Overlaying/Underlaying Cellular Network

Minimizing the outage probability and maximizing throughput are two important aspects in device to device (D2D) communications, which are greatly related to each other. In this paper, first, the exact formulas of the outage probability for D2D communications underlaying or overlaying cellular network are derived which jointly experience Additive White Gaussian Noise (AWGN) and Rayleigh multipat...

متن کامل

All-Optical Cryptographic Device for Secure Communication

An all-optical cryptographic device for secure communication, based on the properties of soliton beams, is presented. It can encode a given bit stream of optical pulses, changing their phase and their amplitude as a function of an encryption serial key that merge with the data stream, generating a ciphered stream. The greatest advantage of the device is real-time encrypting – data can be transm...

متن کامل

Resource Allocation and Power Control Scheme for Cellular Network Based D2D (Device-to-Device) Communication

Tae-Sub Kim, Suk-Ho Yoon, Seungwan Ryu, Choong-Ho Cho 1, First Department of Computer and Information Science, Korea University, Korea, [email protected] Department of Computer and Information Science, Korea University, Korea, [email protected] Department of Information Systems, Chung-Aug University, Korea, [email protected] *4,Corresponding Department of Computer and Information Science, Kor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Electrical and Computer Engineering

سال: 2017

ISSN: 2090-0147,2090-0155

DOI: 10.1155/2017/4758471