Login / Signup
Reduction Theorem for Secrecy over Linear Network Code for Active Attacks.
Masahito Hayashi
Masaki Owari
Go Kato
Ning Cai
Published in:
CoRR (2020)
Keyphrases
</>
traffic analysis
complex networks
data flow
network structure
security threats
network intrusion
network traffic
network attacks
source code
cyber attacks
buffer overflow
data corruption
black hole
malicious code
network security
computer networks
peer to peer