The problem of securing a network coding communication system against an
eavesdropper adversary is considered. The network implements linear network
Use your arXiv email address to see your arXiv papers in GroundAI.
By signing up you accept our content policy
Already have an account? Sign in
No a member yet? Create an account