Fragouli et al., 2007 - Google Patents
Network coding fundamentalsFragouli et al., 2007
View PDF- Document ID
- 10166143172760940504
- Author
- Fragouli C
- Soljanin E
- et al.
- Publication year
- Publication venue
- Foundations and Trends® in Networking
External Links
Snippet
Network coding is an elegant and novel technique introduced at the turn of the millennium to improve network throughput and performance. It is expected to be a critical technology for networks of the future. This tutorial addresses the first most natural questions one would ask …
- 238000000034 method 0 abstract 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations contains provisionally no documents
- H04L12/18—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/56—Packet switching systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/06—Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television, VOD [Video On Demand]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Fragouli et al. | Network coding fundamentals | |
| Yeung et al. | Network coding theory part I: Single source | |
| Fragouli et al. | Network coding applications | |
| Fragouli et al. | Network coding: an instant primer | |
| Matsuda et al. | Survey of network coding and its applications | |
| Albakri et al. | Hierarchical key management scheme with probabilistic security in a wireless sensor network (WSN) | |
| Ding et al. | A survey on future Internet security architectures | |
| Vasudevan et al. | On security against pollution attacks in network coding enabled 5g networks | |
| Zhang et al. | Ad hoc network routing and security: A review | |
| Milosavljevic et al. | Efficient algorithms for the data exchange problem | |
| Hachem et al. | A layered caching architecture for the interference channel | |
| Mohammad et al. | Cluster based mutual authenticated key agreement based on chaotic maps for mobile ad hoc networks | |
| Ellinidou et al. | SSPSoC: A Secure SDN‐Based Protocol over MPSoC | |
| Bienstock et al. | Asmesh: Anonymous and secure messaging in mesh networks using stronger, anonymous double ratchet | |
| Lucani et al. | Coping with the upcoming heterogeneity in 5G communications and storage using Fulcrum network codes | |
| Chen et al. | A complete hierarchical key management scheme for heterogeneous wireless sensor networks | |
| Bhutta et al. | An efficient, scalable key transport scheme (eskts) for delay/disruption tolerant networks | |
| Parsamehr et al. | Security threats in network coding-enabled mobile small cells | |
| Wang et al. | On the optimal linear network coding design for information theoretically secure unicast streaming | |
| Esfahani et al. | Towards secure network coding-enabled wireless sensor networks in cyber-physical systems | |
| Sampradeepraj et al. | Secure multicasting in wireless sensor networks using identity based cryptography | |
| Monteiro et al. | Special issue on network coding | |
| Jain et al. | QVP‐based relay selection to improve secrecy for rateless‐codes in delay‐constrained systems | |
| Deng et al. | Authenticated key distribution and secure broadcast using no conventional encryption: A unified approach based on block codes | |
| Fiza et al. | Bundle protocol implementation for satellite applications |