Secure Network Function Computation for Linear Functions - Part I: Source Security.
Xuan GuangYang BaiRaymond W. YeungPublished in: CoRR (2022)
Keyphrases
- linear functions
- security measures
- security issues
- security requirements
- security mechanisms
- security level
- upper bound
- security analysis
- information security
- security policies
- cryptographic protocols
- network structure
- key management
- wireless sensor networks
- smart card
- access control
- security protocols
- evolutionary algorithm
- knapsack problem
- reinforcement learning
- encryption scheme
- cost function