Secure Network Coding in the Setting in Which a Non-Source Node May Generate Random Keys.
Debaditya ChaudhuriMichael LangbergMichelle EffrosPublished in: ISIT (2019)
Keyphrases
- network coding
- source node
- intermediate nodes
- wireless networks
- routing algorithm
- network bandwidth
- network topology
- network layer
- directed graph
- shortest path
- routing protocol
- wireless sensor networks
- data transmission
- multiple description coding
- wireless ad hoc networks
- multicast tree
- quality assessment
- key management
- wireless communication
- end to end
- response time