메뉴 건너뛰기




Volumn 3, Issue 3, 2008, Pages 404-413

Network security for client-server architecture using wiretap codes

Author keywords

Client server architecture; Network security; Secrecy capacity; Wiretap channel

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); CONTROL THEORY; INFORMATION THEORY; INTERNET;

EID: 49549124036     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2008.927688     Document Type: Article
Times cited : (7)

References (15)
  • 1
    • 85084161486 scopus 로고    scopus 로고
    • Inferring internet denial-of-service activity
    • Washigton, D.C, Aug
    • D. Moore, G. Voelker, and S. Savage, "Inferring internet denial-of-service activity," in Proc. USENIX Security Symp., Washigton, D.C., Aug. 2001, pp. 9-22.
    • (2001) Proc. USENIX Security Symp , pp. 9-22
    • Moore, D.1    Voelker, G.2    Savage, S.3
  • 4
    • 33646114745 scopus 로고    scopus 로고
    • A survivable dos-resistant overlay network
    • Jun
    • T. Bu, S. Norden, and T. Woo, "A survivable dos-resistant overlay network," Comput. Netw., vol. 50, no. 9, pp. 1281-1301, Jun. 2006.
    • (2006) Comput. Netw , vol.50 , Issue.9 , pp. 1281-1301
    • Bu, T.1    Norden, S.2    Woo, T.3
  • 5
    • 17744379978 scopus 로고    scopus 로고
    • Trading resiliency for security: Model and algorithms
    • Berlin, Germany
    • T. Bu, S. Norden, and T. Woo, "Trading resiliency for security: Model and algorithms," in Proc. 12th IEEE Int. Conf. Network Protocols, Berlin, Germany, 2004, pp. 218-227.
    • (2004) Proc. 12th IEEE Int. Conf. Network Protocols , pp. 218-227
    • Bu, T.1    Norden, S.2    Woo, T.3
  • 6
    • 49549086941 scopus 로고    scopus 로고
    • Topological malware propagation on networks: Spatial dependence and its significance
    • submitted for publication
    • R. Narasimha, Z. Chen, and C. Ji, "Topological malware propagation on networks: Spatial dependence and its significance," IEEE Trans. Secute Dependable Comput., 2007, submitted for publication.
    • (2007) IEEE Trans. Secute Dependable Comput
    • Narasimha, R.1    Chen, Z.2    Ji, C.3
  • 7
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1948.
    • (1948) Bell Syst. Tech. J , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 8
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1367, Oct. 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , Issue.8 , pp. 1355-1367
    • Wyner, A.D.1
  • 10
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 15
    • 0031103783 scopus 로고    scopus 로고
    • On a special class of broadcast channels with confidential messages
    • Mar
    • M. van Dijk, "On a special class of broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 43, no. 2, pp. 712-714, Mar. 1997.
    • (1997) IEEE Trans. Inf. Theory , vol.43 , Issue.2 , pp. 712-714
    • van Dijk, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.