Secure Network Function Computation for Linear Functions - Part I: Source Security.
Xuan GuangYang BaiRaymond W. YeungPublished in: IEEE Trans. Inf. Theory (2024)
Keyphrases
- linear functions
- security measures
- security requirements
- security issues
- security mechanisms
- security level
- network structure
- key management
- security policies
- upper bound
- security analysis
- information security
- knapsack problem
- security protocols
- access control
- boolean functions
- authentication protocol
- target function
- intrusion detection
- cost function
- sensitive data
- cryptographic protocols
- supervised learning