Abstract: This paper investigates coded distributed matrix-vector multiplications in the context of eavesdropping, denial-of-service attacks, and computational accuracy. It is demonstrated that the ...