Abstract: In this paper, we consider code construction for the model of secure network function computation, where in a directed acyclic network, a sink node is required to correctly compute a linear ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results