Schemes

Security

Topology

Method

Private Link

[3] [12] [13] [14]

Perfect

Fixed

Precoding

Need

[6]

Weak

Variable

Encryption

Need

[7]

Weak

Variable

Hash function

Need

[5]

Weak

Fixed

LNC algorithm

No need

[8]

Weak

Variable

Permutation

Need

[9]

Weak

Variable

Permutation

Need

Subspace Code

Basic

Variable

None

No need