-
1
-
-
0034229404
-
Network information flow
-
R. Ahlswede, N. Cai, S.Y.R. Li, and RW Yeung, "Network information flow," IEEE Transactions on Information Theory, vol. 46, no. 4, pp. 1204-1216, 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.Y.R.3
Yeung, R.W.4
-
2
-
-
0242334165
-
An algebraic approach to network coding
-
R. Koetter and M. Medard, "An algebraic approach to network coding," IEEE/ACM Transactions on Networking, vol. 11, no. 5, pp. 782-795, 2003.
-
(2003)
IEEE/ACM Transactions on Networking
, vol.11
, Issue.5
, pp. 782-795
-
-
Koetter, R.1
Medard, M.2
-
4
-
-
33750025166
-
On the capacity of secure network coding
-
J. Feldman, T. Malkin, C. Stein, and RA Servedio, "On the capacity of secure network coding," Proc. of the 42nd Annual Allerton Conference on Communication, Control, and Computing, 2004.
-
(2004)
Proc. of the 42nd Annual Allerton Conference on Communication, Control, and Computing
-
-
Feldman, J.1
Malkin, T.2
Stein, C.3
Servedio, R.A.4
-
5
-
-
39349110413
-
Weakly secure network coding
-
Riva del Garda, Italy
-
K. Bhattad and K.R. Narayanan, "Weakly secure network coding," Proc. of the First Workshop on Network Coding, Theory, and Applications (NetCod), Riva del Garda, Italy, 2005.
-
(2005)
Proc. of the First Workshop on Network Coding, Theory, and Applications (NetCod)
-
-
Bhattad, K.1
Narayanan, K.R.2
-
6
-
-
1842815876
-
Security based on network topology against the wiretapping attack
-
K. Jain, "Security based on network topology against the wiretapping attack," IEEE Wireless Communications, vol. 11, no. 1, pp. 68-71, 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 68-71
-
-
Jain, K.1
-
7
-
-
0142008000
-
The benefits of coding over routing in a randomized setting
-
Yokohama, Japan, June/July
-
T. Ho, R. Koetter, M. Medard, D.R. Karger, and M. Effros, 'The benefits of coding over routing in a randomized setting," Proc. of the IEEE International Symposium on Information Theory (ISIT), Yokohama, Japan, June/July 2003.
-
(2003)
Proc. of the IEEE International Symposium on Information Theory (ISIT)
-
-
Ho, T.1
Koetter, R.2
Medard, M.3
Karger, D.R.4
Effros, M.5
-
8
-
-
25844519184
-
On randomized network coding
-
T. Ho, M. Medard, J. Shi, M. Effros, and D.R. Karger, "On randomized network coding," Proceedings of the 41st Annual Allerton Conference on Communication, Control, and Computing, 2003.
-
(2003)
Proceedings of the 41st Annual Allerton Conference on Communication, Control, and Computing
-
-
Ho, T.1
Medard, M.2
Shi, J.3
Effros, M.4
Karger, D.R.5
-
9
-
-
84888037945
-
On Coding for Reliable Communication over Packet Networks
-
D.S. Lun, M. Medard, R. Koetter, and M. Effros, "On Coding for Reliable Communication over Packet Networks," Arxiv preprint cs. IT/0510070, 2005.
-
(2005)
Arxiv preprint cs. IT/0510070
-
-
Lun, D.S.1
Medard, M.2
Koetter, R.3
Effros, M.4
-
10
-
-
51649084252
-
Byzantine modification detection in multicast networks using randomized network coding
-
Yokohama, Japan, June/July
-
T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and DR Karger, "Byzantine modification detection in multicast networks using randomized network coding," Proceedings of the International Symposium on Information Theory, Yokohama, Japan, June/July 2003.
-
(2003)
Proceedings of the International Symposium on Information Theory
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Medard, M.4
Effros, M.5
Karger, D.R.6
-
11
-
-
33749439326
-
Correction of adversarial errors in networks
-
Adelaide, Australia, September
-
S. Jaggi, M. Langberg, T. Ho, and M. Effros, "Correction of adversarial errors in networks," Proceedings of the International Symposium on Information Theory, Adelaide, Australia, September 2005.
-
(2005)
Proceedings of the International Symposium on Information Theory
-
-
Jaggi, S.1
Langberg, M.2
Ho, T.3
Effros, M.4
-
12
-
-
84888032644
-
Resilient Network Coding In the Presence of Byzantine Adversaries
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, and M. Medard, "Resilient Network Coding In the Presence of Byzantine Adversaries," IEEE Infocom, 2006.
-
(2006)
IEEE Infocom
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Medard, M.6
-
14
-
-
84886464203
-
Secure Network Coding with a Cost Criterion
-
Boston MA, April
-
J. Tan and M. Medard, "Secure Network Coding with a Cost Criterion," Proc. 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt'06), Boston MA, April, 2006.
-
(2006)
Proc. 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt'06)
-
-
Tan, J.1
Medard, M.2
-
15
-
-
84890522850
-
Communication Theory of Secrecy Systems
-
October
-
C.E. Shannon, Communication Theory of Secrecy Systems, Bell Systems Technical Journal, Vol. 28, pp. 656-715, October 1949.
-
(1949)
Bell Systems Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
|