Skip to main content

Table 1 Performance comparison of coding design strategies and topology design strategies

From: Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation

 

Encoding and decoding cost

Security

Success rate

Coding design strategies

o(h2) - o(h3)

Shannon or weakly

≈1

Topology design strategies (ISNS)

o(h)

Weakly

Wiretappers' rate less than 0.1

Wiretappers' rate less than 0.2, more than 0.1

   

≈1

>0.9