Secrecy and Robustness for Active Attack in Secure Network Coding.
Masahito HayashiMasaki OwariGo KatoNing CaiPublished in: CoRR (2017)
Keyphrases
- network coding
- key management
- key distribution
- wireless networks
- security analysis
- authentication protocol
- routing algorithm
- secret key
- security properties
- network bandwidth
- mutual authentication
- network topology
- wireless sensor networks
- resource constrained
- security protocols
- packet size
- smart card
- end to end
- response time