-
1
-
-
0034229404
-
Network Information Flow
-
R. Ahlswede. N. Cai. S. Li, and R. Yeung. "Network Information Flow", in IEEE Transactions on Information Theory, Vol 46, No. 4, pp. 1204-1216, 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.3
Yeung, R.4
-
2
-
-
84937428623
-
Efficient Algorithms for Pairing-Based Cryptosystems
-
Proc. 22nd Annual International Cryptology Conference on Advances in Cryptology
-
P. Barreto, H. Kim, B. Lynn, and M. Scott, "Efficient Algorithms for Pairing-Based Cryptosystems", in Proc. 22nd Annual International Cryptology Conference on Advances in Cryptology, LNCS, Vol. 2442, pp. 354-368, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 354-368
-
-
Barreto, P.1
Kim, H.2
Lynn, B.3
Scott, M.4
-
3
-
-
50849114523
-
Fast Batch Verification for Modular Exponentiation and Digital Signatures
-
Proc. Advances in Cryptology EUROCRYPT'98
-
M. Bellare, J. Garay. and T. Rabin, "Fast Batch Verification for Modular Exponentiation and Digital Signatures", in Proc. Advances in Cryptology (EUROCRYPT'98), LNCS, Vol. 1403, pp. 236-250, 1998.
-
(1998)
LNCS
, vol.1403
, pp. 236-250
-
-
Bellare, M.1
Garay, J.2
Rabin, T.3
-
4
-
-
51349135448
-
Signature for Network Coding
-
MSR-TR-2005-159, Microsoft, 2005
-
D. Charles, K. Jian, and K. Lauter, "Signature for Network Coding". Technique Report MSR-TR-2005-159, Microsoft, 2005.
-
Technique Report
-
-
Charles, D.1
Jian, K.2
Lauter, K.3
-
5
-
-
20544449877
-
Practical Network Coding
-
P. Chou, Y. Wu, and K. Jain, "Practical Network Coding", in Proc. Allerton Conference on Communication, Control, and Computing, 2003.
-
(2003)
Proc. Allerton Conference on Communication, Control, and Computing
-
-
Chou, P.1
Wu, Y.2
Jain, K.3
-
6
-
-
33745142955
-
Network Coding: An Instant Primer
-
C. Fragouli, J. Boudec, and J. Widmer, "Network Coding: An Instant Primer", in ACM SIGCOMM Computer Communication Review, Vol. 36, No. 1, 2006.
-
(2006)
ACM SIGCOMM Computer Communication Review
, vol.36
, Issue.1
-
-
Fragouli, C.1
Boudec, J.2
Widmer, J.3
-
7
-
-
82955246861
-
Implementing the Tate Pairing
-
Proc. 5th Algorithmic Number Theory Symposium ANTS V
-
S. Galbraith. K. Harrison, and D. Soldera, "Implementing the Tate Pairing", in Proc. 5th Algorithmic Number Theory Symposium (ANTS V). LNCS, Vol. 2369, pp. 324-337, 2002.
-
(2002)
LNCS
, vol.2369
, pp. 324-337
-
-
Galbraith, S.1
Harrison, K.2
Soldera, D.3
-
9
-
-
39049090594
-
Cooperative Security for Network Coding File Distribution
-
C. Gkantsidis and P. Rodriguez. "Cooperative Security for Network Coding File Distribution", in Proc. IEEE INFOCOM, 2006.
-
(2006)
Proc. IEEE INFOCOM
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
10
-
-
27244436587
-
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. Shantz. "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs", in Proc. 2004 Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2004.
-
(2004)
Proc. 2004 Workshop on Cryptographic Hardware and Embedded Systems (CHES)
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.5
-
11
-
-
0142008000
-
The Benefits of Coding over Routing in a Randomized Setting
-
T. Ho, R. Koetter, M. Médard, R. Karger, and M. Effros, "The Benefits of Coding over Routing in a Randomized Setting" in Proc. International Symposium on Information Theory (ISIT), 2003.
-
(2003)
Proc. International Symposium on Information Theory (ISIT)
-
-
Ho, T.1
Koetter, R.2
Médard, M.3
Karger, R.4
Effros, M.5
-
12
-
-
5044242517
-
Byzantine Modification Detection in Multicast Networks Using Randomized Network Coding
-
T. Ho, B. Leong, R. Koetter, M. Méard, M. Effros, and D. Karger, "Byzantine Modification Detection in Multicast Networks Using Randomized Network Coding", in Proc. 2004 IEEE International Symposium on Infoimation Theoiy (ISIT). 2004.
-
(2004)
Proc. 2004 IEEE International Symposium on Infoimation Theoiy (ISIT)
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Méard, M.4
Effros, M.5
Karger, D.6
-
13
-
-
34548349361
-
Resilient Network Coding in the Presence of Byzantine Adversaries
-
S. Jaggi, M. Langberg. S. Katti, T. Ho, D. Katabi, and M. Méard, "Resilient Network Coding in the Presence of Byzantine Adversaries", in Proc. IEEE INFOCOM, 2007.
-
(2007)
Proc. IEEE INFOCOM
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Méard, M.6
-
14
-
-
84958550160
-
The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems
-
Proc. 5th Algorithmic Number Theory Symposium ANTS V
-
A. Joux, "The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems". in Proc. 5th Algorithmic Number Theory Symposium (ANTS V), LNCS, Vol. 2369, pp. 20-32, 2002.
-
(2002)
LNCS
, vol.2369
, pp. 20-32
-
-
Joux, A.1
-
16
-
-
0037323073
-
Linear Network Coding
-
S. Li, R. Yeung, and N. Cai, "Linear Network Coding", in IEEE Transactions on Information Theory, Vol 49, No. 2. pp. 371381, 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.2
, pp. 371381
-
-
Li, S.1
Yeung, R.2
Cai, N.3
-
17
-
-
0027662341
-
Reducing Elliptic Curve Logorithms to Logorithms in a Finite Field
-
A. Menezes, T. Okamoto, and S. Vanstone, "Reducing Elliptic Curve Logorithms to Logorithms in a Finite Field", in IEEE Transactions on Information Theory, Vol 39, No. 5, pp. 1639-1646, 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.5
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
18
-
-
0038763879
-
Short Programs for Functions over Curve
-
unpublished manuscript
-
V. Miller, "Short Programs for Functions over Curve", unpublished manuscript, http://crypto.stanford.edu/miller/miller.pdf, 1986.
-
(1986)
-
-
Miller, V.1
-
20
-
-
33745161352
-
Overcoming Untuned Radios in Wireless Networks with Network Coding
-
D. Petrovic, K. Ramchandran. and J. Rabaey. "Overcoming Untuned Radios in Wireless Networks with Network Coding", in IEEE Transactions on Information Theory, Vol 52, No. 6, pp. 2649-2657. 2006.
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.6
, pp. 2649-2657
-
-
Petrovic, D.1
Ramchandran, K.2
Rabaey, J.3
-
21
-
-
0036983290
-
-
S. Ratnasamy, B. karp. L. Yin, F. Yu, D. Estrin, R. Govindan and S. Shenker. GHT: A Orographic Hash Table for Data-Centric Storage, in Proc. 1st ACM International Workshop on Wireless Sensor Networks and Applications, (WSNA '02). pp. 78-87, 2002.
-
S. Ratnasamy, B. karp. L. Yin, F. Yu, D. Estrin, R. Govindan and S. Shenker. "GHT: A Orographic Hash Table for Data-Centric Storage", in Proc. 1st ACM International Workshop on Wireless Sensor Networks and Applications, (WSNA '02). pp. 78-87, 2002.
-
-
-
-
22
-
-
51349118159
-
-
W. Stallings, Cryptography and Network Security: Principles and Practice, Second Edition, Prentice Hall
-
W. Stallings, Cryptography and Network Security: Principles and Practice, Second Edition, Prentice Hall.
-
-
-
-
24
-
-
35348853638
-
Efficient Implementation of Public Key Cryptosystems on MicaZ and TelosB Motes
-
Technical Report WM-CS-2006, College of William and Mary
-
H. Wang and Q. Li, "Efficient Implementation of Public Key Cryptosystems on MicaZ and TelosB Motes". Technical Report WM-CS-2006, College of William and Mary, 2006.
-
(2006)
-
-
Wang, H.1
Li, Q.2
|