Schemes | Security | Topology | Method | Private Link |
[3] [12] [13] [14] | Perfect | Fixed | Precoding | Need |
[6] | Weak | Variable | Encryption | Need |
[7] | Weak | Variable | Hash function | Need |
[5] | Weak | Fixed | LNC algorithm | No need |
[8] | Weak | Variable | Permutation | Need |
[9] | Weak | Variable | Permutation | Need |
Subspace Code | Basic | Variable | None | No need |