Abstract | ||
---|---|---|
In this paper, we put forward the model of secure network function computation. In this model, a target function, of which the inputs are generated at multiple source nodes, is required to be computed with zero error at a sink node over a network while being protected from a wiretapper who can access any one but not more than one wiretap set in a given collection of wiretap sets. The secure comput... |
Year | DOI | Venue |
---|---|---|
2021 | 10.1109/ISIT45174.2021.9518256 | 2021 IEEE International Symposium on Information Theory (ISIT) |
Keywords | DocType | ISBN |
Upper bound,Network topology,Computational modeling,Network coding,Security | Conference | 978-1-5386-8209-8 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Xuan Guang | 1 | 0 | 2.70 |
Yang Bai | 2 | 68 | 24.51 |
Raymond W. Yeung | 3 | 0 | 0.34 |