supported by the National Natural Science Foundation of China(No.61372069,No.61271174,No.61301178);the Specific Scientific Research Plan Project of Shaanxi Education Department(No.15JK2150);the Science and Technology Innovation Foundation of Xi’an(No.2016CXWL11,No.CXY1352WL28,No.CXY1531WL11)
Network coding is promising to improve the throughput and robustness of video transmission over wireless networks. To address the security issue of network coding based Priority encoding transmission(PET), a special c...
Supported by the National Natural Science Foundation of China(61271174,61301178);the Specific Scientific Research Plan Project of Shaanxi Education Department(15JK2150);the Science and Technology Innovation Foundation of Xi’an(CXY1352WL28,CXY1531WL38)
A tag encoding authentication scheme for network coding proposed by Wu et al was claimed to defend pollution attacks efficiently. However, we find that the scheme easily incurs multi-generation pollution attacks, wher...
Supported by the National Natural Science Foundation of China(61271174,61301178)
We study the construction of minimum bandwidth regenerating code with combinatorial design. At first, a method of constructing minimum storage regenerating (MBR) codes is presented, which can tolerate only one-node ...
Supported by the National Natural Science Foundation of China(61271174,61372076,61301178)
We describe a mathematical structure which corresponds to the eigenstates of a density operator. For an unknown density operator, we propose an estimating procedure which uses successive "yes/no" measurements to sca...
Supported by the National Natural Science Foundation of China(61271174,61301178);the Science and Technology Innovation Foundation of Xi’an(CXY1352WL28)
Combinatorial networks are widely applied in many practical scenarios. In this paper, we compute the closed-form probability expressions of successful decoding at a sink and at all sinks in the multicast scenario, in ...
supported by the National Natural Science Foundation of China(Grant No.11371290,No.61271174,No. 61301178);the Science and Technology Innovation Foundation of Xi'an(Grant No. CXY1352WL28)
Existing solutions against wiretapping attacks for network coding either bring significant bandwidth overhead or incur a high computational complexity.In order to reduce the security overhead of the existing solutions...
Supported by the National Natural Science Foundation of China(61271174,61301178)
We investigate the error detection ability of intermedi- ate nodes of zig-zag network with small downstream link. We show that the error detection capability of zig-zag networks in the presence of z malicious edges an...
Supported by the National Natural Science Foundation of China(61271174,61301178)
We consider the problem of characterizing network capacity in the presence of adversarial errors on network links,focusing in particular on the effect of small downstream links,where the downstream link is the directe...
Supported by the National Natural Science Foundation of China(11371290,61301178);the Science and Technology Innovation Foundation of Xi'an(CXY1352WL28,CXY1352WL27)
Existing works for securing network coding against wiretapping either incur high coding complexity or bring large bandwidth overhead. For exploiting the lightweight security mechanism for resource-constrained networks...