A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
We design codes to transmit information over a network, some subset of which is controlled by a malicious adversary. The computationally unbounded, hidden adversary knows the message to be transmitted, and can observe and change information over the part of the network he controls. The network nodes do not share resources such as shared randomness or a private key. We first consider a unicast problem in a network with |E| parallel, unit-capacity, directed edges. The rate-region has two parts.doi:10.1109/isit.2005.1523584 dblp:conf/isit/JaggiLHE05 fatcat:fzvypstql5cblbnhbm6eflj7za