메뉴 건너뛰기




Volumn 53, Issue 18, 2009, Pages 3089-3101

A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding

Author keywords

Entropy attacks; Linear dependency; Network coding; Packet filtering; Probabilistic

Indexed keywords

AVAILABLE BANDWIDTH; DEPENDENCY DETECTION; FALSE POSITIVE RATES; IN-NETWORK; LINEAR-DEPENDENCY; LOW LEVEL; NETWORK CODING; PACKET DETECTION; PACKET FILTERING; PERFORMANCE EVALUATION; PROBABILISTIC; SELF ADAPTIVE ALGORITHMS; SELF-ADAPTIVE; SYSTEM SECURITY;

EID: 70449529634     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2009.08.002     Document Type: Article
Times cited : (18)

References (26)
  • 1
    • 0742286696 scopus 로고    scopus 로고
    • Multicast with network coding in application-layer overlay networks
    • Zhu Y., Li B., and Guo J. Multicast with network coding in application-layer overlay networks. IEEE Journal on Selected Areas in Communications 22 1 (2004) 1-13
    • (2004) IEEE Journal on Selected Areas in Communications , vol.22 , Issue.1 , pp. 1-13
    • Zhu, Y.1    Li, B.2    Guo, J.3
  • 6
  • 11
    • 70349682315 scopus 로고    scopus 로고
    • An efficient privacy-preserving scheme against traffic analysis attacks in network coding
    • Y. Fan, Y. Jiang, H. Zhu, X. Shen, An efficient privacy-preserving scheme against traffic analysis attacks in network coding, in: Proceedings of IEEE INFOCOM, 2009.
    • (2009) Proceedings of IEEE INFOCOM
    • Fan, Y.1    Jiang, Y.2    Zhu, H.3    Shen, X.4
  • 12
    • 51349135448 scopus 로고    scopus 로고
    • Signature for network coding
    • MSR-TR-2005-159, Microsoft, 2005
    • D. Charles, K. Jian, K. Lauter, Signature for network coding, Technique Report MSR-TR-2005-159, Microsoft, 2005.
    • Technique Report
    • Charles, D.1    Jian, K.2    Lauter, K.3
  • 13
    • 51349130622 scopus 로고    scopus 로고
    • An efficient signature-based scheme for securing network coding against pollution attacks
    • Z. Yu, Y. Wei, B. Ramkumar, Y. Guan, An efficient signature-based scheme for securing network coding against pollution attacks, in: Proceedings of IEEE INFOCOM, 2008.
    • (2008) Proceedings of IEEE INFOCOM
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4
  • 16
    • 70449522631 scopus 로고    scopus 로고
    • A. Chou, Y. Wu, Network coding for the internet and wireless networks, MSR-TR-2007-70, Microsoft Research, 2007.
    • A. Chou, Y. Wu, Network coding for the internet and wireless networks, MSR-TR-2007-70, Microsoft Research, 2007.
  • 18
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • Boneh D., Lynn B., and Shacham H. Short signatures from the weil pairing. Journal of Cryptology 17 4 (2004) 297-319
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 19
    • 38049146172 scopus 로고    scopus 로고
    • Batch verification of short signatures
    • Proceedings of EUROCRYPT
    • J. Camenisch, S. Hohenberger, M. Pedersen, Batch verification of short signatures, in: Proceedings of EUROCRYPT, LNCS, vol. 4514, 2007.
    • (2007) LNCS , vol.4514
    • Camenisch, J.1    Hohenberger, S.2    Pedersen, M.3
  • 20
    • 67349168446 scopus 로고    scopus 로고
    • BAT: a robust signature scheme for vehicular communications using binary authentication tree
    • Jiang Y., Shi M., Shen X., and Lin C. BAT: a robust signature scheme for vehicular communications using binary authentication tree. IEEE Transactions on Wireless Communications 8 4 (2009) 1974-1983
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.4 , pp. 1974-1983
    • Jiang, Y.1    Shi, M.2    Shen, X.3    Lin, C.4
  • 24
    • 46149123879 scopus 로고    scopus 로고
    • On the practical and security issues of batch content distribution via network coding
    • Q. Li, D. Chiu, J. Lui, On the practical and security issues of batch content distribution via network coding, in: Proceedings of IEEE ICNP, 2006.
    • (2006) Proceedings of IEEE ICNP
    • Li, Q.1    Chiu, D.2    Lui, J.3
  • 25
    • 13944266651 scopus 로고    scopus 로고
    • A delay-tolerant network architecture for challenged internets
    • K. Fall, A delay-tolerant network architecture for challenged internets, in: Proceedings of ACM SIGCOMM, 2003.
    • (2003) Proceedings of ACM SIGCOMM
    • Fall, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.