Journal of Terahertz Science and Electronic Information Technology , Volume. 21, Issue 3, 371(2023)

Multi-channel data fragmentation transmission security proofs

CHEN Shikang1, GUO Shuang1, TANG Jin1, YUAN Jian1, LIN Weitao2、*, and LIU Dan2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    References(11)

    [1] [1] KUPFERMAN Judy,ARNON Shlomi. Energy saving for data centers using spatial multichannel optical wireless communication[J]. Journal of Communication and Information Networks, 2017(4):88-99.

    [2] [2] HUANG Qingchao, LIU Dachang, CHEN Yinfang, et al. Secure free-space optical communication system based on data fragmentation multipath transmission technology[J]. Optics Express, 2018,26(10):13536-13542.

    [3] [3] O'HARA B,PETRICK A. IEEE 802.11 handbook: a designer's companion[M].Copy URL,USA:IEEE Standards Association, 2005.

    [4] [4] PURNIMA Murali Mohan,TENG Joon Lim,MOHAN Gurusamy. Fragmentation-based multipath routing for attack resilience in software defined networks[C]// IEEE 41st Conference on Local Computer Networks(LCN). Dubai,United Arab Emirates:IEEE, 2016:583-586. doi:10.1109/LCN.2016.98.

    [5] [5] HUDIC A,ISLAM S,KIESEBERG P,et al. Data confidentiality using fragmentation in cloud computing[J]. International Journal of Pervasive Computing and Communications, 2013,9(1):37-51.

    [7] [7] SHANNON C E. A mathematical theory of communication[J]. The Bell System Technical Journal, 1948,27(3):379-423.

    [8] [8] H.STAD J, IMPAGLIAZZO R, LEVIN L, et al. A pseudorandom generator from any one-way function[J]. SIAM Journal on Computing, 1999,28(4):1364-1396.

    [9] [9] YAO Andrew C. Theory and application of trapdoor functions[C]// 23rd Annual Symposium on Foundations of Computer Science (SFCS 1982). Chicago,IL,USA:[s.n.], 1982:80-91.

    [10] [10] BARMPALIAS G,LEWIS-PYE A. Chapter 3:limits of the ku.era-gács coding method[M]. Singapore:World Scientific, 2020: 87-109.

    [11] [11] AGGARWAL G,BAWA M,GANESAN P,et al. Two can keep a secret:a distributed architecture for secure database services[C]// 2nd Biennial Conference on Innovative Data Systems Research. Asilomar,CA,USA:[s.n.], 2005:186-199.

    [12] [12] CIRIANI Valentina,SABRINA De,CAPITANI Di,et al. Combining fragmentation and encryption to protect privacy in data storage[J]. ACM Transactions on Information and System Security(TISSEC), 2010,13(3):1-33.

    Tools

    Get Citation

    Copy Citation Text

    CHEN Shikang, GUO Shuang, TANG Jin, YUAN Jian, LIN Weitao, LIU Dan. Multi-channel data fragmentation transmission security proofs[J]. Journal of Terahertz Science and Electronic Information Technology , 2023, 21(3): 371

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Apr. 26, 2021

    Accepted: --

    Published Online: Apr. 12, 2023

    The Author Email: Weitao LIN (522138778@qq.com)

    DOI:10.11805/tkyda2021179

    Topics