FOCS '02 Proceedings of the 43rd Symposium on Foundations of Computer Science
E.cient Aggregation of encrypted data in Wireless Sensor Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
Practical attacks against WEP and WPA
Proceedings of the second ACM conference on Wireless network security
A Survey on the Encryption of Convergecast Traffic with In-Network Processing
IEEE Transactions on Dependable and Secure Computing
Byzantine Modification Detection in Multicast Networks With Random Network Coding
IEEE Transactions on Information Theory
Symmetric quantum fully homomorphic encryption with perfect security
Quantum Information Processing
Hi-index | 0.24 |
Network coding techniques such as fountain codes are a promising way to disseminate large bulks of data in a multicast manner over an unreliable medium. In this work we investigate how to conceal such an encoded data stream on its way to numerous receivers with a minimum investment. Compared to conventional 'encrypt - encode/decode - decrypt' approaches, our solution is preferable for two reasons: First, it causes less CPU investment for encryption and decryption proportional to the ratio of the payload length to the signaling data length. Second, besides obfuscating the payload data from an eavesdropper, we hide the coding information from an eavesdropper. We evaluate the approach with respect to its application to various data types like MPEG-2 video streams and Java bytecode.