Embed presentation
Download to read offline

The document discusses the security challenges and efficiency issues associated with content distribution using network coding, particularly highlighting the vulnerability to data corruption by attackers. It critiques the limitations of traditional verification methods and introduces a new verification technique, while also addressing its high overhead. Additionally, it proposes methods to reduce both computational and communication costs while ensuring security.
