Device-to-Device Secure Coded Caching
暂无分享,去创建一个
[1] Urs Niesen,et al. Coded Caching With Nonuniform Demands , 2017, IEEE Transactions on Information Theory.
[2] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[3] Aylin Yener,et al. Optimization of heterogeneous caching systems with rate limited links , 2017, 2017 IEEE International Conference on Communications (ICC).
[4] Urs Niesen,et al. Coding for caching: fundamental limits and practical challenges , 2016, IEEE Communications Magazine.
[5] Chi Wan Sung,et al. Coded caching in partially cooperative D2D communication networks , 2017, 2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).
[6] Lawrence W. Dowdy,et al. Comparative Models of the File Assignment Problem , 1982, CSUR.
[7] Hirosuke Yamamoto,et al. Secret sharing system using (k, L, n) threshold scheme , 1986 .
[8] Hui Liu,et al. A New Order-Optimal Decentralized Coded Caching Scheme With Good Performance in the Finite File Size Regime , 2016, IEEE Transactions on Communications.
[9] Giuseppe Caire,et al. Wireless Device-to-Device Caching Networks: Basic Principles and System Performance , 2013, IEEE Journal on Selected Areas in Communications.
[10] Qing Wang,et al. A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.
[11] Vinod M. Prabhakaran,et al. Private Coded Caching , 2016, IEEE Transactions on Information Forensics and Security.
[12] Hui Liu,et al. Order-Optimal Decentralized Coded Caching Schemes with Good Performance in Finite File Size Regime , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[13] Ivan Damgård,et al. Secure Multiparty Computation and Secret Sharing , 2015 .
[14] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .
[15] Kefei Chen,et al. Optimal assignment schemes for general access structures based on linear programming , 2013, Designs, Codes and Cryptography.
[16] Ravi Tandon,et al. Beyond cut-set bounds - the approximate capacity of D2D networks , 2015, 2015 Information Theory and Applications Workshop (ITA).
[17] Seyed Pooya Shariatpanahi,et al. Multi-Server Coded Caching , 2015, IEEE Transactions on Information Theory.
[18] Halim Yanikomeroglu,et al. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions , 2014, IEEE Communications Magazine.
[19] Aylin Yener,et al. Coded caching for resolvable networks with security requirements , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[20] Giuseppe Caire,et al. Fundamental Limits of Caching in Wireless D2D Networks , 2014, IEEE Transactions on Information Theory.
[21] T. Charles Clancy,et al. Fundamental Limits of Caching With Secure Delivery , 2013, IEEE Transactions on Information Forensics and Security.
[22] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[23] Aylin Yener,et al. Benefits of cache assignment on degraded broadcast channels , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[24] Urs Niesen,et al. Decentralized coded caching attains order-optimal memory-rate tradeoff , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[25] Rudolf Mathar,et al. Bounds on Caching D2D Networks With Secure Delivery , 2018, 2018 15th International Symposium on Wireless Communication Systems (ISWCS).
[26] Aylin Yener,et al. Centralized Coded Caching with Heterogeneous Cache Sizes , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).
[27] Catherine A. Meadows,et al. Security of Ramp Schemes , 1985, CRYPTO.
[28] Aylin Yener,et al. Fundamental limits of secure device-to-device coded caching , 2016, 2016 50th Asilomar Conference on Signals, Systems and Computers.
[29] Aydin Sezgin,et al. Fundamental limits of caching in D2D networks with secure delivery , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[30] Deniz Gündüz,et al. Coded Caching and Content Delivery With Heterogeneous Distortion Requirements , 2016, IEEE Transactions on Information Theory.
[31] Urs Niesen,et al. Fundamental limits of caching , 2012, 2013 IEEE International Symposium on Information Theory.
[32] Adi Shamir,et al. How to share a secret , 1979, CACM.
[33] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[34] Giuseppe Caire,et al. Fundamental limits of distributed caching in multihop D2D wireless networks , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[35] Kevin C. Almeroth,et al. The Use of Multicast Delivery to Provide a Scalable and Interactive Video-on-Demand Service , 1996, IEEE J. Sel. Areas Commun..
[36] Seyed Pooya Shariatpanahi,et al. Mobility increases throughput of wireless device-to-device networks with coded caching , 2016, 2016 IEEE International Conference on Communications (ICC).
[37] Aylin Yener,et al. Combination Networks With or Without Secrecy Constraints: The Impact of Caching Relays , 2017, IEEE Journal on Selected Areas in Communications.