-
1
-
-
0034229404
-
Network information flow
-
Ahlswede, R., Cai, N., Li, S., Yeung, R.: Network information flow. IEEE Transactions on Information Theory 46(4), 1204-1216 (2000)
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.3
Yeung, R.4
-
2
-
-
0242334165
-
An algebraic approach to network coding
-
Koetter, R.: An algebraic approach to network coding. IEEE/ACM Transactions on Networking 11, 782-795 (2003)
-
(2003)
IEEE/ACM Transactions on Networking
, vol.11
, pp. 782-795
-
-
Koetter, R.1
-
3
-
-
0037323073
-
Linear network coding
-
Li, S.Y.R., Yeung, R.W., Cai, N.: Linear network coding. IEEE Trans. Inform. Theory 49(2), 371-381 (2003)
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.Y.R.1
Yeung, R.W.2
Cai, N.3
-
4
-
-
68849117052
-
Signing a linear subspace: Signature schemes for network coding
-
Boneh, D., Freeman, D., Katz, J., Waters, B.: Signing a linear subspace: Signature schemes for network coding. In: Proc. of PKC 2009 (2009)
-
(2009)
Proc. of PKC
-
-
Boneh, D.1
Freeman, D.2
Katz, J.3
Waters, B.4
-
5
-
-
51649125221
-
Signatures for content distribution with network coding
-
ISIT
-
Zhao, F., Kalker, T., Médard, M., Han, K.: Signatures for content distribution with network coding. In: Proc. of International Symposium on Information Theory (ISIT) (2007)
-
(2007)
Proc. of International Symposium on Information Theory
-
-
Zhao, F.1
Kalker, T.2
Médard, M.3
Han, K.4
-
6
-
-
47949101718
-
On network coding for security
-
Milcom
-
Han, K., Ho, T., Koetter, R., Medard, M., Zhao, F.: On network coding for security. In: Military Communications Conference (Milcom) (2007)
-
(2007)
Military Communications Conference
-
-
Han, K.1
Ho, T.2
Koetter, R.3
Medard, M.4
Zhao, F.5
-
7
-
-
44049100993
-
Signatures for network coding
-
to appear in International Journal of Information and Coding Theory
-
Charles, D., Jain, K., Lauter, K.: Signatures for network coding. In: CISS 2006 (2006); to appear in International Journal of Information and Coding Theory
-
(2006)
CISS
-
-
Charles, D.1
Jain, K.2
Lauter, K.3
-
8
-
-
3543050732
-
On the-fly verification of rateless erasure codes for efficient content distribution
-
Krohn, M., Freedman, M., Mazieres, D.: On the-fly verification of rateless erasure codes for efficient content distribution. In: Proc. of IEEE Symposium on Security and Privacy, pp. 226-240 (2004)
-
(2004)
Proc. of IEEE Symposium on Security and Privacy
, pp. 226-240
-
-
Krohn, M.1
Freedman, M.2
Mazieres, D.3
-
9
-
-
25644448947
-
Network coding for large scale content distribution
-
Gkantsidis, C., Rodriguez, P.: Network coding for large scale content distribution. In: Proc. of IEEE INFOCOM 2005, pp. 2235-2245 (2005)
-
(2005)
Proc. of IEEE INFOCOM
, pp. 2235-2245
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
11
-
-
34547410740
-
Comprehensive view of a live network coding p2p system
-
Gkantsidis, C., Miller, J., Rodriguez, P.: Comprehensive view of a live network coding p2p system. In: Internet Measurement Conference, pp. 177-188 (2006)
-
(2006)
Internet Measurement Conference
, pp. 177-188
-
-
Gkantsidis, C.1
Miller, J.2
Rodriguez, P.3
-
13
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: Proc. of INFOCOM 1999, vol. 2, pp. 708-716 (1999)
-
(1999)
Proc. of INFOCOM
, vol.2
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
14
-
-
0033690336
-
Efficient authentication and signature of multicast streams over lossy channels
-
Perrig, A., Canetti, R., Tygar, D., Song, D.: Efficient authentication and signature of multicast streams over lossy channels. In: Proc. of 2000 IEEE Symposium on Security and Privacy (2000)
-
(2000)
Proc. of 2000 IEEE Symposium on Security and Privacy
-
-
Perrig, A.1
Canetti, R.2
Tygar, D.3
Song, D.4
-
15
-
-
58349118819
-
Compact proofs of retrievability
-
Pieprzyk, J, ed, Asiacrypt 2008, Springer, Heidelberg
-
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) Asiacrypt 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
17
-
-
84957057937
-
Coding constructions for blacklisting problems without computational assumptions
-
Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
-
Kumar, R., Rajagopalan, S., Sahai, A.: Coding constructions for blacklisting problems without computational assumptions. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 609-623. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 609-623
-
-
Kumar, R.1
Rajagopalan, S.2
Sahai, A.3
|