-
2
-
-
34548342249
-
Xors in the air: Practical wireless network coding
-
S. Katti, H. Rahul, D. Katabi, M'edard, J. Crowcroft. Xors in the air: practical wireless network coding, in: Proceedings of ACM SIGCOMM, 2006.
-
(2006)
Proceedings of ACM SIGCOMM
-
-
Katti, S.1
Rahul, H.2
Katabi, D.3
M'edard4
Crowcroft, J.5
-
8
-
-
0034229404
-
Network information flow
-
Ahlswede R., Cai N., Li S., and Yeung R. Network information flow. IEEE Transaction on Information Theory 46 4 (2000) 1204-1216
-
(2000)
IEEE Transaction on Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.3
Yeung, R.4
-
10
-
-
33244466453
-
Network coding: The case of multiple unicast sessions
-
Z. Li, B. Li, Network coding: the case of multiple unicast sessions, in: Proceedings of 42th Annual Allerton Conference on Communication, Control, and Computing, 2004.
-
(2004)
Proceedings of 42th Annual Allerton Conference on Communication, Control, and Computing
-
-
Li, Z.1
Li, B.2
-
11
-
-
70349682315
-
An efficient privacy-preserving scheme against traffic analysis attacks in network coding
-
Y. Fan, Y. Jiang, H. Zhu, X. Shen, An efficient privacy-preserving scheme against traffic analysis attacks in network coding, in: Proceedings of IEEE INFOCOM, 2009.
-
(2009)
Proceedings of IEEE INFOCOM
-
-
Fan, Y.1
Jiang, Y.2
Zhu, H.3
Shen, X.4
-
12
-
-
51349135448
-
Signature for network coding
-
MSR-TR-2005-159, Microsoft, 2005
-
D. Charles, K. Jian, K. Lauter, Signature for network coding, Technique Report MSR-TR-2005-159, Microsoft, 2005.
-
Technique Report
-
-
Charles, D.1
Jian, K.2
Lauter, K.3
-
13
-
-
51349130622
-
An efficient signature-based scheme for securing network coding against pollution attacks
-
Z. Yu, Y. Wei, B. Ramkumar, Y. Guan, An efficient signature-based scheme for securing network coding against pollution attacks, in: Proceedings of IEEE INFOCOM, 2008.
-
(2008)
Proceedings of IEEE INFOCOM
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
14
-
-
5044242517
-
Byzantine modification detection in multicast networks using randomized network coding
-
T. Ho, B. Leong, R. Koetter, M. M'eard, M. Effros, D. Karger, Byzantine modification detection in multicast networks using randomized network coding, in: Proceedings of IEEE ISIT, 2004.
-
(2004)
Proceedings of IEEE ISIT
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
M'eard, M.4
Effros, M.5
Karger, D.6
-
15
-
-
34548349361
-
Resilient network coding in the presence of byzantine adversaries
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, M. M'eard, Resilient network coding in the presence of byzantine adversaries, in: Proceedings of IEEE INFOCOM, 2007.
-
(2007)
Proceedings of IEEE INFOCOM
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
M'eard, M.6
-
16
-
-
70449522631
-
-
A. Chou, Y. Wu, Network coding for the internet and wireless networks, MSR-TR-2007-70, Microsoft Research, 2007.
-
A. Chou, Y. Wu, Network coding for the internet and wireless networks, MSR-TR-2007-70, Microsoft Research, 2007.
-
-
-
-
17
-
-
33947399169
-
A random linear network coding approach to multicast
-
Ho T., Médard M., Koetter R., Karger D.R., Effros M., Shi J., and Leong B. A random linear network coding approach to multicast. IEEE Transactions Information Theory 52 10 (2006) 4413-4430
-
(2006)
IEEE Transactions Information Theory
, vol.52
, Issue.10
, pp. 4413-4430
-
-
Ho, T.1
Médard, M.2
Koetter, R.3
Karger, D.R.4
Effros, M.5
Shi, J.6
Leong, B.7
-
18
-
-
23044435711
-
Short signatures from the weil pairing
-
Boneh D., Lynn B., and Shacham H. Short signatures from the weil pairing. Journal of Cryptology 17 4 (2004) 297-319
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
19
-
-
38049146172
-
Batch verification of short signatures
-
Proceedings of EUROCRYPT
-
J. Camenisch, S. Hohenberger, M. Pedersen, Batch verification of short signatures, in: Proceedings of EUROCRYPT, LNCS, vol. 4514, 2007.
-
(2007)
LNCS
, vol.4514
-
-
Camenisch, J.1
Hohenberger, S.2
Pedersen, M.3
-
20
-
-
67349168446
-
BAT: a robust signature scheme for vehicular communications using binary authentication tree
-
Jiang Y., Shi M., Shen X., and Lin C. BAT: a robust signature scheme for vehicular communications using binary authentication tree. IEEE Transactions on Wireless Communications 8 4 (2009) 1974-1983
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.4
, pp. 1974-1983
-
-
Jiang, Y.1
Shi, M.2
Shen, X.3
Lin, C.4
-
21
-
-
84940671821
-
Constricting the adversary: A broadcast transformation for network
-
D. Wang, D. Silva, F.R. Kschischang, Constricting the adversary: a broadcast transformation for network, in: Proceedings of 45th Annual Allerton Conference on Communication, Control and Computing, 2007.
-
(2007)
Proceedings of 45th Annual Allerton Conference on Communication, Control and Computing
-
-
Wang, D.1
Silva, D.2
Kschischang, F.R.3
-
23
-
-
45249114824
-
Byzantine modification detection in multicast networks with random network coding
-
Ho T., Leong B., Koetter R., Medard M., Effros M., and Karger D.R. Byzantine modification detection in multicast networks with random network coding. IEEE Transactions on Information Theory 54 6 (2008)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Medard, M.4
Effros, M.5
Karger, D.R.6
-
24
-
-
46149123879
-
On the practical and security issues of batch content distribution via network coding
-
Q. Li, D. Chiu, J. Lui, On the practical and security issues of batch content distribution via network coding, in: Proceedings of IEEE ICNP, 2006.
-
(2006)
Proceedings of IEEE ICNP
-
-
Li, Q.1
Chiu, D.2
Lui, J.3
-
25
-
-
13944266651
-
A delay-tolerant network architecture for challenged internets
-
K. Fall, A delay-tolerant network architecture for challenged internets, in: Proceedings of ACM SIGCOMM, 2003.
-
(2003)
Proceedings of ACM SIGCOMM
-
-
Fall, K.1
-
26
-
-
39049118503
-
MaxProp: Routing for vehicle-based disruption-tolerant networks
-
J. Burgess, B. Gallagher, D. Jensen, B. Levine, MaxProp: routing for vehicle-based disruption-tolerant networks, in: Proceedings of IEEE INFOCOM, 2006.
-
(2006)
Proceedings of IEEE INFOCOM
-
-
Burgess, J.1
Gallagher, B.2
Jensen, D.3
Levine, B.4
|