메뉴 건너뛰기




Volumn , Issue , 2007, Pages 551-555

On Wiretap networks II

Author keywords

[No Author keywords available]

Indexed keywords

INTERNATIONAL SYMPOSIUM; NETWORK CODING;

EID: 51649109673     PISSN: 21578101     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2007.4557098     Document Type: Conference Paper
Times cited : (113)

References (17)
  • 5
    • 1842815876 scopus 로고    scopus 로고
    • Security based on network topology against the wiretapping attack
    • Feb
    • K. Jain, "Security based on network topology against the wiretapping attack," IEEE Wireless Communications, pp. 68-71, Feb. 2004.
    • (2004) IEEE Wireless Communications , pp. 68-71
    • Jain, K.1
  • 12
    • 33947377921 scopus 로고    scopus 로고
    • Information flow decomposition for network coding
    • Mar
    • C. Fragouli and E. Soljanin, "Information flow decomposition for network coding," IEEE Trans. Inform. Theory, pp. 829-848, Mar. 2006.
    • (2006) IEEE Trans. Inform. Theory , pp. 829-848
    • Fragouli, C.1    Soljanin, E.2
  • 14
    • 44949263457 scopus 로고    scopus 로고
    • The encoding complexity of network coding
    • submitted for publication
    • _, "The encoding complexity of network coding," submitted for publication.
    • Langberg, M.1    Sprintson, A.2    Bruck, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.