基于网络编码的抵抗被动攻击的安全单播策略的分析-analysis of secure unicast strategy against passive attack based on network coding.docx

基于网络编码的抵抗被动攻击的安全单播策略的分析-analysis of secure unicast strategy against passive attack based on network coding.docx

基于网络编码的抵抗被动攻击的安全单播策略的分析-analysis of secure unicast strategy against passive attack based on network coding

Abstractrequirements and prove that it is equivalent to a constrained network flow problem. Based on this fact, we then develop efficient algorithm that can find the unicast topology to fulfill the constraints. Based on the transmission topology, we then design a deterministic LNC which satisfies the aforementioned objectives and provide a constructive upper bound of the size of the finite field. Finally, in addition, we also study the potential of random LNC and derive the low bound of the probability that a random LNC satisfies different secure requirements.For anonymity, we consider anonymo

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档