| Schemes | Security | Topology | Method | Private Link |
| [3] [12] [13] [14] | Perfect | Fixed | Precoding | Need |
| [6] | Weak | Variable | Encryption | Need |
| [7] | Weak | Variable | Hash function | Need |
| [5] | Weak | Fixed | LNC algorithm | No need |
| [8] | Weak | Variable | Permutation | Need |
| [9] | Weak | Variable | Permutation | Need |
| Subspace Code | Basic | Variable | None | No need |