Secure Information Flow for IoT Applications
DOI: http://dx.doi.org/10.30630/joiv.3.2.231
Abstract
Keywords
Full Text:
PDFReferences
K. A. S. Abdel-Ghaffar and J. H. Weber, “Separating erasures from errors for decodingâ€, Proceedings of the IEEE International Symposium on Information Theory, Toronto, Canada, pp. 215-219, July 6-11, 2008.
J. H. Weber, Lecture Notes: Error-Correcting Codes, Delft University of Technology, 2007.
J. H. Dinitz, D.R. Stinson, Contemporary Design Theory, A Collection of Surveys, A Wiley-Inter-Science Publication, 1992.
C. Di, D. Proietti, I.E. Telatar, T. J. Richardson, and R. L. Urbanke, “Finite-length analysis of low-density parity-check codes on the binary erasure channelâ€, IEEE Trans. Inform. Theory, vol. 48, no. 6, pp. 1570-1579, June 2002.
T. M. Ngo, M. Huisman, “Complexity and information flow analysis for multi-threaded programsâ€, Eur. Phys. J. Spec. Top. 226 (10), 2375–2392 (2017)
H. D. L. Hollmann and L. M. G. M. Tolhuizen, “On parity check collections for iterative erasure decoding that correct all correctable erasure patterns of a given size,†IEEE Trans. Inform. Theory, vol. 53, no. 2, pp. 823-828, February 2007.
La Jolla Covering Repository, http://www.ccrwest.org/cover.html.
R. M. Roth, Introduction to Coding Theory. Cambridge, UK: Cambridge University Press, 2006.
M. Schwartz and A. Vardy, “On the stopping distance and the stopping redundancy of codes,†IEEE Trans. Inform. Theory, vol. 52, no. 3, pp. 922-932, March 2006.
J. H. Weber and K. A. S. Abdel-Ghaffar, “Results on parity-check matrices with optimal stopping and/or dead-end set enumerators,†IEEE Trans. Inform. Theory, vol. 54, no. 3, pp. 1368-1374, March 2008.
S. Lin and D. J. Costello, Jr., Error Control Coding, Pearson Education International, 2004.
F. J. Mac Williams and N. J. A. Sloane, The Theory of Error-Correcting Codes, North-Holland Publishing Company, 1977.
S. A. Vanstone and P. C. van Oorschot, An Introduction to Error-Correcting Codes with Applications, Norwell, MA: Kluwer, 1989.
J. A. Goguen, J. Meseguer, “Security policies and security modelsâ€. IEEE Symposium on Security and Privacy, pp. 11–20 (1982).