This paper introduces the notion of #cache-#tapping into the #information #theoretic models of #coded #caching. The wiretap channel II in the presence of multiple receivers equipped with fixed-size cache memories, and an adversary which selects symbols to tap into from cache placement and/or delivery is introduced. The legitimate terminals know neither whether placement, delivery, or both are tapped, nor the positions in which they are tapped. Only the size of the overall tapped set is known. For two receivers and two files, the strong secrecy capacity- the maximum achievable file rate while keeping the overall library strongly secure- is identified. Lower and upper bounds on the strong secrecy file rate are derived when the library has more than two files. Achievability relies on a code design which combines wiretap coding, security embedding codes, one-time pad keys, and coded caching. A genie-aided upper bound, in which the transmitter is provided with user demands before placement, establishes the converse for the two-files case. For more than two files, the upper bound is constructed by three successive channel transformations. ---- Mohamed Nafea, Aylin Yener More details can be found at this link: https://lnkd.in/eCCYDbkb
Shannon Wireless’ Post
More Relevant Posts
-
This paper present a novel #caching and #coded #delivery scheme for a #multi-#access #network where multiple users can have access to the same cache (shared cache) and multiple caches can be accessed by the same user. This scheme is obtained from resolvable designs satisfying certain conditions which the authors call cross resolvable designs. To be able to compare different multi-access coded schemes with different number of users they normalize the rate of the schemes by the number of users served. Based on this per-user-rate they show that their scheme performs better than the well known #Maddah-#Ali - #Niesen (#MaN) scheme and the recently proposed (“Multi-access coded caching: gains beyond cache-redundancy” by Serbetci, Parrinello and Elia) SPE scheme. ---- Digvijay Katyal, Pooja Nayak Muralidhar, B.Sundar Rajan More details can be found at this link: https://lnkd.in/e_px3Y64
Multi-Access Coded Caching Schemes From Cross Resolvable Designs
ieeexplore.ieee.org
To view or add a comment, sign in
-
This letter proposes an environment-aware codebook design by employing the statistical #channel #state #information (CSI) for #reconfigurable #intelligent #surface (#RIS)-assisted #multiple-#input #single-#output (#MISO) systems. Specifically, first of all, the authors generate multiple virtual channels offline by utilizing the location information and designing an environment-aware reflection coefficient codebook. ----Jiancheng An, Chau Yuen More details can be found at this link: https://lnkd.in/g5ru27S5
Environment-Aware Codebook for Reconfigurable Intelligent Surface-Aided MISO Communications
ieeexplore.ieee.org
To view or add a comment, sign in
-
Hey everyone! I recently explored reflective DLL injection, and it was an interesting experience! I was inspired by Mr. Roziul Hasan Khan Shifat, whose insights helped guide my approach. I started by identifying the target process and getting a handle with OpenProcess. After that, I used VirtualAllocEx to allocate memory in the target’s address space and wrote the DLL path using WriteProcessMemory. A crucial step was using CreateRemoteThread to run LoadLibraryA for loading the DLL. The cool part? The DLL has a reflective loader that allows it to load itself. It adjusts its relocation table and calls DllMain without needing standard library functions, which makes it stealthier and harder to detect. Next up, I plan to create a reverse TCP shell DLL and see how these concepts apply in real network operations. I’ll share the source code soon, so stay tuned ;)
To view or add a comment, sign in
-
#Reconfigurable #intelligent #surface (#RIS) is a revolutionary technology that can customize the wireless channel and improve the energy efficiency of next-generation cellular networks. This letter proposes an #environment-#aware #codebook design by employing the statistical #channel #state #information (#CSI) for RIS-assisted #multiple-#input #single-#output (#MISO) systems. Specifically, first of all, the authors generate multiple virtual channels offline by utilizing the location information and design an environment-aware reflection coefficient codebook. Thus, they only need to estimate the composite channel and optimize the active transmit beamforming for each reflection coefficient in the pre-designed codebook, while simplifying the reflection optimization substantially. Moreover, they analyze the theoretical performance of the proposed scheme. ---- Xing Jia, Jiancheng An, 刘昊, Hongshu Liao, Lu Gan, Chau Yuen More details can be found at this link: https://lnkd.in/eH7mN4Tb
Environment-Aware Codebook for Reconfigurable Intelligent Surface-Aided MISO Communications
ieeexplore.ieee.org
To view or add a comment, sign in
-
This work studies the #coded #caching problem in a setting where users can access a #private #cache of their own along with a shared cache. The setting consists of a server connected to a set of users, assisted by a smaller number of #helper #nodes that are equipped with their own storage. In addition to the #helper #caches, each user possesses a dedicated cache which is also used to prefetch file contents. Each helper cache can serve an arbitrary number of users, but each user gets served by only one helper cache. The authors consider two scenarios: (a) the server has #no #prior #information about the user-to-helper cache association, and (b) the server knows the #user-#to-#helper cache association at the placement phase itself.----Elizabath Peter, Krishnan Namboodiri K K, B.Sundar Rajan More details can be found at this link: https://lnkd.in/gde932Ks
Coded Caching with Shared Caches and Private Caches
ieeexplore.ieee.org
To view or add a comment, sign in
-
How do we retry on failures? In distributed systems and networked applications, retry strategies are crucial for handling transient errors and network instability effectively. The diagram shows 4 common retry strategies. (via @alexxubyte)
https://buff.ly/3VrrNMV
twitter.com
To view or add a comment, sign in
-
In 1987 Jeffrey Mogul published a paper on implementing a "packet filter" as a way to demultiplex protocols to enable efficient user space implementations of a protocol. This work was supplanted by Steven McCanne & Van Jacobson's Berkeley Packet Filter (BPF) which is ubiquitous in network troubleshooting when using tools like tcpdump and Wireshark. We've also come full circle with upsurge of user space implementations of networking stacks in recent years thanks to the likes of XDP, DPDK, QUIC, and VPP. A must read classic.
The Packet Filter: An Efficient Mechanism for User-Level Network Code
citeseerx.ist.psu.edu
To view or add a comment, sign in
-
completed NPTEL course on Design and Analysis of Algorithms
NPTEL23CS96S3474102810115594.pdf
archive.nptel.ac.in
To view or add a comment, sign in
-
NEW BLOG POST > Authentication Using Symmetric Key Encryption This post explains Symmetric Authentication between a host and a device and points you to a lab and video developed by @MicrochipTech showing how this is accomplished using @DatakeyMemory #CryptoAuthentication memory tokens. If you need to add authentication to an #embedded design, this blog 👉 https://lnkd.in/gfDz4EQq 👈 explains the basic terms (like nonce, digest, hash, etc.) and uses a real-world example to teach symmetric authentication.
To view or add a comment, sign in
-
Spicy, A new adopted Framework for Protocol Parser, pioneered by Corelight, in companion with Academia and Industry peers. The idea is to avoid intractable C++ flavoured scripts for protocol parsers, thus decreasing the LOC's (line of Codes) in a secure and intact way. This should result in decreasing the effort to build a protocol parser (specially the custom/ proprietary OT protocols) in a human-perceptive way. Check out this Corelight specialized recorded webinar which gives you the way of adoption and shade a clear light on practical use cases https://lnkd.in/ds6MHd62
To view or add a comment, sign in
5,017 followers
Endowed Chaired Professor | Board Member | Innovator | Equality Advocate
6moThank you for highlighting our work.