-
1
-
-
0034229404
-
Network information flow
-
Jul
-
R. Ahlswede, N. Caj, S. R. Li, and R. W. Yeung, "Network information flow," IEEE Trans. Inf. Theory, vol. 46, no. 5, pp. 1204-1216, Jul. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.5
, pp. 1204-1216
-
-
Ahlswede, R.1
Caj, N.2
Li, S.R.3
Yeung, R.W.4
-
2
-
-
0036353798
-
Secure network coding
-
Lausanne, Switzerland, Jun./Jul
-
N. Cai and R. W. Yeung, "Secure network coding," in Proc. IEEE Int. Symp. Information Theory, Lausanne, Switzerland, Jun./Jul. 2002, p. 323.
-
(2002)
Proc. IEEE Int. Symp. Information Theory
, pp. 323
-
-
Cai, N.1
Yeung, R.W.2
-
3
-
-
38349083344
-
Network error correction, Part 2: Lower bounds
-
Jan
-
N. Cai and R. W. Yeung, "Network error correction, Part 2: Lower bounds," Commun. Inf. and Syst., vol. 6, no. 1, pp. 37-54, Jan. 2006.
-
(2006)
Commun. Inf. and Syst
, vol.6
, Issue.1
, pp. 37-54
-
-
Cai, N.1
Yeung, R.W.2
-
4
-
-
44049100993
-
Signatures for network coding
-
Princeton, NJ, Mar
-
D. Charles, K. Jain, and K. Lauter, "Signatures for network coding," in Proc. 40th Annu. Conf. Information Science and Systems, Princeton, NJ, Mar. 2006.
-
(2006)
Proc. 40th Annu. Conf. Information Science and Systems
-
-
Charles, D.1
Jain, K.2
Lauter, K.3
-
5
-
-
0027341860
-
Perfectly secure message transmission
-
Jan
-
D. Dolev, C. Dwork, O. Waarts, and M. Yung, "Perfectly secure message transmission," J. Assoc. Comput. Mach., vol. 40, no. 1, pp. 17-47, Jan. 1993.
-
(1993)
J. Assoc. Comput. Mach
, vol.40
, Issue.1
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
6
-
-
33750025166
-
On the capacity of secure network coding
-
Monticello, IL, Sep
-
J. Feldman, T. Malkin, C. Stein, and R. A. Servedio, "On the capacity of secure network coding," in Proc. 42nd Annu. Allerton Conf. Communication, Control, and Computing, Monticello, IL, Sep. 2004.
-
(2004)
Proc. 42nd Annu. Allerton Conf. Communication, Control, and Computing
-
-
Feldman, J.1
Malkin, T.2
Stein, C.3
Servedio, R.A.4
-
10
-
-
0142008000
-
The benefits of coding over routing in a randomized setting
-
Yokohama, Japan, Jun./Jul
-
T. Ho, R. Koetter, M. Médard, D. Karger, and M. Effros, "The benefits of coding over routing in a randomized setting," in Proc. IEEE Int. Symp. Information Theory, Yokohama, Japan, Jun./Jul. 2003, p. 442.
-
(2003)
Proc. IEEE Int. Symp. Information Theory
, pp. 442
-
-
Ho, T.1
Koetter, R.2
Médard, M.3
Karger, D.4
Effros, M.5
-
11
-
-
25844519184
-
On randomized network coding
-
Monticello, IL, Oct
-
T. Ho, M. Médard, J. Shi, M. Effros, and D. Karger, "On randomized network coding," in Proc. 41st Annu. Allerton Conf. Communication, Control, and Computing, Monticello, IL, Oct. 2003.
-
(2003)
Proc. 41st Annu. Allerton Conf. Communication, Control, and Computing
-
-
Ho, T.1
Médard, M.2
Shi, J.3
Effros, M.4
Karger, D.5
-
12
-
-
5044242517
-
Byzantine modification detection in multicast networks using randomized network coding
-
Chicago, IL, Jun
-
T. C. Ho, B. Leong, R. Koetter, M. Médard, M. Effros, and D. R. Karger, "Byzantine modification detection in multicast networks using randomized network coding," in Proc. IEEE Int. Symp. Information Theory, Chicago, IL, Jun. 2004, p. 144.
-
(2004)
Proc. IEEE Int. Symp. Information Theory
, pp. 144
-
-
Ho, T.C.1
Leong, B.2
Koetter, R.3
Médard, M.4
Effros, M.5
Karger, D.R.6
-
13
-
-
45249094253
-
Resilient network coding in the presence of eavesdropping byzantine adversaries
-
Nice, France, Jun
-
S. Jaggi and M. Langberg, "Resilient network coding in the presence of eavesdropping byzantine adversaries," in Proc. IEEE Int. Symp. Information Theory, Nice, France, Jun. 2007, pp. 541-545.
-
(2007)
Proc. IEEE Int. Symp. Information Theory
, pp. 541-545
-
-
Jaggi, S.1
Langberg, M.2
-
14
-
-
33749439326
-
Correction of adversarial errors in networks
-
Adelaide, Australia, Sep
-
S. Jaggi, M. Langberg, T. Ho, and M. Effros, "Correction of adversarial errors in networks," in Proc. IEEE Int. Symp. Information Theory, Adelaide, Australia, Sep. 2005, pp. 1455-1459.
-
(2005)
Proc. IEEE Int. Symp. Information Theory
, pp. 1455-1459
-
-
Jaggi, S.1
Langberg, M.2
Ho, T.3
Effros, M.4
-
15
-
-
20544473127
-
Polynomial time algorithms for multicast network code construction
-
Jun
-
S. Jaggi, P. Sanders, P. A. Chou, M. Effros, S. Egner, K. Jain, and L. Tollmizen, "Polynomial time algorithms for multicast network code construction," IEEE Trans. Inf. Theory, vol. 51, no. 6, pp. 1973-1982, Jun. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.6
, pp. 1973-1982
-
-
Jaggi, S.1
Sanders, P.2
Chou, P.A.3
Effros, M.4
Egner, S.5
Jain, K.6
Tollmizen, L.7
-
16
-
-
39049116048
-
Network coding for joint storage and transmission with minimum cost
-
Seattle, WA, Jul
-
A. Jiang, "Network coding for joint storage and transmission with minimum cost," in Proc. IEEE Int. Symp. Information Theory, Seattle, WA, Jul. 2006, pp. 1359-1363.
-
(2006)
Proc. IEEE Int. Symp. Information Theory
, pp. 1359-1363
-
-
Jiang, A.1
-
17
-
-
84962129309
-
The importance of being opportunistic: Practical network coding for wireless environments
-
Monticello, IL, Sep
-
S. Katti, D. Katabi, W. Hu, H. S. Rahul, and M. Médard, "The importance of being opportunistic: Practical network coding for wireless environments," in Proc. 43rd Annu. Allerton Conf. Communication, Control, and Computing, Monticello, IL, Sep. 2005.
-
(2005)
Proc. 43rd Annu. Allerton Conf. Communication, Control, and Computing
-
-
Katti, S.1
Katabi, D.2
Hu, W.3
Rahul, H.S.4
Médard, M.5
-
18
-
-
34548342249
-
XORs in the air: Practical wireless network coding
-
Pisa, Italy, Sep
-
S. Katti, H. Rahul, D. Katabi, W. H. M. Médard, and J. Crowcroft, "XORs in the air: Practical wireless network coding," in Proc. ACM SIGCOMM, Pisa, Italy, Sep. 2006.
-
(2006)
Proc. ACM SIGCOMM
-
-
Katti, S.1
Rahul, H.2
Katabi, D.3
Médard, W.H.M.4
Crowcroft, J.5
-
19
-
-
51649121337
-
Coding for errors and erasures in random network coding
-
Nice, France, June
-
R. Koetter and F. Kschischang, "Coding for errors and erasures in random network coding," in Proc. IEEE Int. Symp. Information Theory Nice, France, June 2007, pp. 791-795.
-
(2007)
Proc. IEEE Int. Symp. Information Theory
, pp. 791-795
-
-
Koetter, R.1
Kschischang, F.2
-
21
-
-
0242334165
-
An algebraic approach to network coding
-
Oct
-
R. Koetter and M. Médard, "An algebraic approach to network coding," IEEE/ACM Trans. Netw., vol. 11, no. 5, pp. 782-795, Oct. 2003.
-
(2003)
IEEE/ACM Trans. Netw
, vol.11
, Issue.5
, pp. 782-795
-
-
Koetter, R.1
Médard, M.2
-
22
-
-
3543050732
-
On-the-fly verification of rateless erasure codes for efficient content distribution
-
Oakland, CA, May
-
M. N. Krohn, M. J. Freedman, and D. Mazires, "On-the-fly verification of rateless erasure codes for efficient content distribution," in Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 2004.
-
(2004)
Proc. IEEE Symp. Security and Privacy
-
-
Krohn, M.N.1
Freedman, M.J.2
Mazires, D.3
-
23
-
-
0037323073
-
Linear network coding
-
Feb
-
S.-Y. R. Li, R. W. Yeung, and N. Cai, "Linear network coding," IEEE Trans. Inf. Theory, vol. 49, no. 2, pp. 371-381, Feb. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.-Y.R.1
Yeung, R.W.2
Cai, N.3
-
24
-
-
19544380335
-
On network coding with a cost criterion
-
Parma, Italy, Oct
-
D. Lun, M. Médard, T. Ho, and R. Koetter, "On network coding with a cost criterion," in Proc. IEEE Int. Symp. Information Theory and Its Applications, Parma, Italy, Oct. 2004.
-
(2004)
Proc. IEEE Int. Symp. Information Theory and Its Applications
-
-
Lun, D.1
Médard, M.2
Ho, T.3
Koetter, R.4
-
25
-
-
33745124066
-
Efficient operation of wireless packet networks using network coding
-
Oulu, Finland, Jun
-
D. S. Lun, M. Médard, and R. Koetter, "Efficient operation of wireless packet networks using network coding," in Proc. Int. Workshop on Convergent Technologies (IWCT), Oulu, Finland, Jun. 2005.
-
(2005)
Proc. Int. Workshop on Convergent Technologies (IWCT)
-
-
Lun, D.S.1
Médard, M.2
Koetter, R.3
-
26
-
-
10444286785
-
Broadcasting with locally bounded byzantine faults
-
Feb
-
A. Pelc and D. Peleg, "Broadcasting with locally bounded byzantine faults," Inf. Process. Lett., vol. 93, no. 3, pp. 109-115, Feb. 2005.
-
(2005)
Inf. Process. Lett
, vol.93
, Issue.3
, pp. 109-115
-
-
Pelc, A.1
Peleg, D.2
-
27
-
-
34548334202
-
Decentralized Security Mechanisms for Routing Protocols,
-
Ph.D. dissertation, Univ. Calif. Berkeley, Computer Science Division, Berkeley, CA
-
L. Subramanian, "Decentralized Security Mechanisms for Routing Protocols," Ph.D. dissertation, Univ. Calif. Berkeley, Computer Science Division, Berkeley, CA, 2005.
-
(2005)
-
-
Subramanian, L.1
-
28
-
-
0033894011
-
On the construction of energy-efficient broadcast and multicast trees in wireless networks
-
J. E. Wieselthier, G. D. Nguyen, and A. Ephremides, "On the construction of energy-efficient broadcast and multicast trees in wireless networks," in Proc. IEEE Infocom, 2000, vol. 2, pp. 585-594.
-
(2000)
Proc. IEEE Infocom
, vol.2
, pp. 585-594
-
-
Wieselthier, J.E.1
Nguyen, G.D.2
Ephremides, A.3
-
29
-
-
38349097767
-
Network error correction, part 1: Basic concepts and upper bounds
-
Jan
-
R. W. Yeung and N. Cai, "Network error correction, part 1: Basic concepts and upper bounds," Commun. Inf. and Syst., vol. 6, no. 1, pp. 19-36, Jan. 2006.
-
(2006)
Commun. Inf. and Syst
, vol.6
, Issue.1
, pp. 19-36
-
-
Yeung, R.W.1
Cai, N.2
-
30
-
-
45249115212
-
-
R. W. Yeung, S. Li, N. Cal, and Z. Zhang, Network Coding Theory. Amsterdam, The Netherlands: Now, 2006.
-
R. W. Yeung, S. Li, N. Cal, and Z. Zhang, Network Coding Theory. Amsterdam, The Netherlands: Now, 2006.
-
-
-
-
31
-
-
38349140937
-
Linear network error correction codes in packet networks
-
Jan
-
Z. Zhang, "Linear network error correction codes in packet networks," IEEE Trans. Inf. Theory, vol. 54, no. 1, pp. 209-218, Jan. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.1
, pp. 209-218
-
-
Zhang, Z.1
-
32
-
-
51649125221
-
Signatures for content distribution with network coding
-
Nice, France, Jun
-
F. Zhao, T. Kalker, M. Médard, and K. J. Han, "Signatures for content distribution with network coding," in Proc. IEEE Int. Symp. Information Theory, Nice, France, Jun. 2007, pp. 556-560.
-
(2007)
Proc. IEEE Int. Symp. Information Theory
, pp. 556-560
-
-
Zhao, F.1
Kalker, T.2
Médard, M.3
Han, K.J.4
|