Theory of secure network coding
| dc.contributor.author | Cai, N. | |
| dc.contributor.author | Chan, T. | |
| dc.date.issued | 2011 | |
| dc.description.abstract | In this tutorial paper, we focus on the basic theory of linear secure network coding. Our goal is to present fundamental results and provide preliminary knowledge for anyone interested in the area. We first present a model for secure network coding and then a necessary and sufficient condition for a linear network code to be secure. Optimal methods to construct linear secure network codes are also provided. For further investigation of the secure properties of linear network codes, we illuminate different secure criteria and requirements, with a few alternative models. | |
| dc.identifier.citation | Proceedings of the IEEE, 2011; 99(3):421-437 | |
| dc.identifier.doi | 10.1109/JPROC.2010.2094592 | |
| dc.identifier.issn | 0018-9219 | |
| dc.identifier.issn | 1558-2256 | |
| dc.identifier.uri | https://hdl.handle.net/1959.8/118957 | |
| dc.language.iso | en | |
| dc.publisher | IEEE | |
| dc.relation.grant | http://purl.org/au-research/grants/arc/DP1094571 | |
| dc.rights | Copyright 2011 IEEE | |
| dc.source.uri | https://doi.org/10.1109/JPROC.2010.2094592 | |
| dc.subject | entropy | |
| dc.subject | linear subspace | |
| dc.subject | linear transformation | |
| dc.subject | network coding | |
| dc.subject | security | |
| dc.subject | wiretap channels | |
| dc.title | Theory of secure network coding | |
| dc.type | Journal article | |
| pubs.publication-status | Published | |
| ror.mmsid | 9915909359301831 |