Journal of Terahertz Science and Electronic Information Technology , Volume. 21, Issue 3, 371(2023)
Multi-channel data fragmentation transmission security proofs
[1] [1] KUPFERMAN Judy,ARNON Shlomi. Energy saving for data centers using spatial multichannel optical wireless communication[J]. Journal of Communication and Information Networks, 2017(4):88-99.
[2] [2] HUANG Qingchao, LIU Dachang, CHEN Yinfang, et al. Secure free-space optical communication system based on data fragmentation multipath transmission technology[J]. Optics Express, 2018,26(10):13536-13542.
[3] [3] O'HARA B,PETRICK A. IEEE 802.11 handbook: a designer's companion[M].Copy URL,USA:IEEE Standards Association, 2005.
[4] [4] PURNIMA Murali Mohan,TENG Joon Lim,MOHAN Gurusamy. Fragmentation-based multipath routing for attack resilience in software defined networks[C]// IEEE 41st Conference on Local Computer Networks(LCN). Dubai,United Arab Emirates:IEEE, 2016:583-586. doi:10.1109/LCN.2016.98.
[5] [5] HUDIC A,ISLAM S,KIESEBERG P,et al. Data confidentiality using fragmentation in cloud computing[J]. International Journal of Pervasive Computing and Communications, 2013,9(1):37-51.
[7] [7] SHANNON C E. A mathematical theory of communication[J]. The Bell System Technical Journal, 1948,27(3):379-423.
[8] [8] H.STAD J, IMPAGLIAZZO R, LEVIN L, et al. A pseudorandom generator from any one-way function[J]. SIAM Journal on Computing, 1999,28(4):1364-1396.
[9] [9] YAO Andrew C. Theory and application of trapdoor functions[C]// 23rd Annual Symposium on Foundations of Computer Science (SFCS 1982). Chicago,IL,USA:[s.n.], 1982:80-91.
[10] [10] BARMPALIAS G,LEWIS-PYE A. Chapter 3:limits of the ku.era-gács coding method[M]. Singapore:World Scientific, 2020: 87-109.
[11] [11] AGGARWAL G,BAWA M,GANESAN P,et al. Two can keep a secret:a distributed architecture for secure database services[C]// 2nd Biennial Conference on Innovative Data Systems Research. Asilomar,CA,USA:[s.n.], 2005:186-199.
[12] [12] CIRIANI Valentina,SABRINA De,CAPITANI Di,et al. Combining fragmentation and encryption to protect privacy in data storage[J]. ACM Transactions on Information and System Security(TISSEC), 2010,13(3):1-33.
Get Citation
Copy Citation Text
CHEN Shikang, GUO Shuang, TANG Jin, YUAN Jian, LIN Weitao, LIU Dan. Multi-channel data fragmentation transmission security proofs[J]. Journal of Terahertz Science and Electronic Information Technology , 2023, 21(3): 371
Category:
Received: Apr. 26, 2021
Accepted: --
Published Online: Apr. 12, 2023
The Author Email: Weitao LIN (522138778@qq.com)