-
1
-
-
0034229404
-
Network Information Flow
-
R. Ahlswede, N. Cai, S. Li, and R. Yeung, "Network Information Flow", IEEE Trans. Info. Theory, 46(4), pp. 1204-1216, 2000.
-
(2000)
IEEE Trans. Info. Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.3
Yeung, R.4
-
2
-
-
51349135448
-
Signature for Network Coding
-
MSR-TR-2005-159, Microsoft, 2005
-
D. Charles, K. Jian, and K. Lauter, "Signature for Network Coding", Technique Report MSR-TR-2005-159, Microsoft, 2005.
-
Technique Report
-
-
Charles, D.1
Jian, K.2
Lauter, K.3
-
4
-
-
0038341106
-
A Key-Management Scheme for Distributed Sensor Networks
-
L. Eschenauer and V. D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks", in ACM CCS, 2002.
-
(2002)
ACM CCS
-
-
Eschenauer, L.1
Gligor, V.D.2
-
5
-
-
25644448947
-
Network Coding for Large Scale File Distribution
-
C. Gkantsidis and P. Rodriguez, "Network Coding for Large Scale File Distribution", in IEEE INFOCOM, 2005.
-
(2005)
IEEE INFOCOM
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
6
-
-
39049090594
-
Cooperative Security for Network Coding File Distribution
-
C. Gkantsidis and P. Rodriguez, "Cooperative Security for Network Coding File Distribution", in IEEE INFOCOM, 2006.
-
(2006)
IEEE INFOCOM
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
7
-
-
5044242517
-
Byzantine Modification Detection in Multicast Networks Using Randomized Network Coding
-
T. Ho, B. Leong, R. Koetter, M. Méard, M. Effros, and D. Karger, "Byzantine Modification Detection in Multicast Networks Using Randomized Network Coding", in ISIT, 2004.
-
(2004)
ISIT
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Méard, M.4
Effros, M.5
Karger, D.6
-
8
-
-
34548349361
-
Resilient Network Coding in the Presence of Byzantine Adversaries
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, and M. Méard, "Resilient Network Coding in the Presence of Byzantine Adversaries", in IEEE INFOCOM, 2007.
-
(2007)
IEEE INFOCOM
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Méard, M.6
-
9
-
-
84962129309
-
The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments
-
S. Katti, D. Katabi, W. Hu, H. Rahul, and M. Médard, "The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments", in Allerton, 2005.
-
(2005)
Allerton
-
-
Katti, S.1
Katabi, D.2
Hu, W.3
Rahul, H.4
Médard, M.5
-
10
-
-
34548341142
-
XORs in The Air: Practical Wireless Network Coding
-
S. Katti, H. Rahul, W. Hu, D. Katabi, M. Médard, and J. Crowcroft, "XORs in The Air: Practical Wireless Network Coding", in ACM SIGCOMM, 2006.
-
(2006)
ACM SIGCOMM
-
-
Katti, S.1
Rahul, H.2
Hu, W.3
Katabi, D.4
Médard, M.5
Crowcroft, J.6
-
11
-
-
70349659607
-
On-the-Fly Verification of Rateless Erase Codes for Efficient Content Distribution
-
M. Krohn, M. Freeman, and D. Mazieres, "On-the-Fly Verification of Rateless Erase Codes for Efficient Content Distribution", in IEEE S&P, 2004.
-
(2004)
IEEE S&P
-
-
Krohn, M.1
Freeman, M.2
Mazieres, D.3
-
12
-
-
0037323073
-
Linear Network Coding
-
S. Li, R. Yeung, and N. Cai, "Linear Network Coding", in IEEE Trans. Info. Theory, 49(2), pp. 371-381, 2003.
-
(2003)
IEEE Trans. Info. Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.1
Yeung, R.2
Cai, N.3
-
13
-
-
0027662341
-
Reducing Elliptic Curve Logorithms to Logorithms in a Finite Field
-
A. Menezes, T. Okamoto, and S. Vanstone, "Reducing Elliptic Curve Logorithms to Logorithms in a Finite Field", in IEEE Trans. Info. Theory, 39(5), pp. 1639-1646, 1993.
-
(1993)
IEEE Trans. Info. Theory
, vol.39
, Issue.5
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
15
-
-
33745161352
-
Overcoming Untuned Radios in Wireless Networks with Network Coding
-
D. Petrovic, K. Ramchandran, and J. Rabaey, "Overcoming Untuned Radios in Wireless Networks with Network Coding", in IEEE Trans. Info. Theory, 52(6), pp. 2649-2657, 2006.
-
(2006)
IEEE Trans. Info. Theory
, vol.52
, Issue.6
, pp. 2649-2657
-
-
Petrovic, D.1
Ramchandran, K.2
Rabaey, J.3
-
16
-
-
70349705572
-
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks
-
Z. Yu and Y. Guan, "A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks", in IEEE/ACM IPSN, 2005.
-
(2005)
IEEE/ACM IPSN
-
-
Yu, Z.1
Guan, Y.2
-
17
-
-
38549177436
-
A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks
-
Z. Yu, and Y. Guan, "A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks", in IEEE INFOCOM, 2006.
-
(2006)
IEEE INFOCOM
-
-
Yu, Z.1
Guan, Y.2
-
18
-
-
51349130622
-
An Efficient Signature-based Scheme for Securing Network Coding against Pollution Attacks
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An Efficient Signature-based Scheme for Securing Network Coding against Pollution Attacks", in IEEE INFOCOM, 2008.
-
(2008)
IEEE INFOCOM
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
19
-
-
35348853638
-
Efficient Implementation of Public Key Cryptosystems on MicaZ and TelosB Motes
-
Technical Report WM-CS-2006, College of William and Mary
-
H. Wang and Q. Li, "Efficient Implementation of Public Key Cryptosystems on MicaZ and TelosB Motes", Technical Report WM-CS-2006, College of William and Mary, 2006.
-
(2006)
-
-
Wang, H.1
Li, Q.2
-
20
-
-
47849128835
-
Information Exchange in Wireless Networks with Network Coding and Physical Layer Broadcast
-
Y. Wu, P. Chou, and S. Kung, "Information Exchange in Wireless Networks with Network Coding and Physical Layer Broadcast", in CISS, 2005.
-
(2005)
CISS
-
-
Wu, Y.1
Chou, P.2
Kung, S.3
-
21
-
-
33751046114
-
Hot Topic: Physical-Layer Network Coding
-
S. Zhang, S. Liew, and P. Lam, "Hot Topic: Physical-Layer Network Coding", in ACM MobiCom, 2006.
-
(2006)
ACM MobiCom
-
-
Zhang, S.1
Liew, S.2
Lam, P.3
-
22
-
-
51649125221
-
Signatures for Content Distribution with Network Coding
-
F. Zhao, T. Kalker, M. Médard, and K. Han, "Signatures for Content Distribution with Network Coding", in ISIT, 2007.
-
(2007)
ISIT
-
-
Zhao, F.1
Kalker, T.2
Médard, M.3
Han, K.4
|