-
3
-
-
34548342249
-
Xors in the air: Practical wireless network coding
-
S. Katti, H. Rahul, D. Katabi, W.H.M. M'edard, J. Crowcroft, Xors in the air: practical wireless network coding, in: Proceedings of ACM SIGCOMM, 2006.
-
(2006)
Proceedings of ACM SIGCOMM
-
-
Katti, S.1
Rahul, H.2
Katabi, D.3
M'edard, W.H.M.4
Crowcroft, J.5
-
8
-
-
0034229404
-
Network information flow
-
Ahlswede R., Cai N., Li S., and Yeung R. Network information flow. IEEE Transactions on Information Theory 46 4 (2000) 1204-1216
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.3
Yeung, R.4
-
10
-
-
33244466453
-
Network coding: The case of multiple unicast sessions
-
Z. Li, B. Li, Network coding: the case of multiple unicast sessions, in: Proceedings of 42th annual allerton conference on communication, control, and computing, 2004.
-
(2004)
Proceedings of 42th annual allerton conference on communication, control, and computing
-
-
Li, Z.1
Li, B.2
-
11
-
-
33845571437
-
Network coding for efficient wireless unicast
-
Zurich, Switzerland
-
D.S. Lun, M. M'edard, R. Koetter, Network coding for efficient wireless unicast, in: Proceedings of 2006 International Zurich Seminar on Communications (IZS'06), Zurich, Switzerland, 2006.
-
(2006)
Proceedings of 2006 International Zurich Seminar on Communications (IZS'06)
-
-
Lun, D.S.1
M'edard, M.2
Koetter, R.3
-
12
-
-
51349135448
-
Signature for Network Coding
-
MSR-TR-2005-159, Microsoft, 2005
-
D. Charles, K. Jian, K. Lauter, Signature for Network Coding, Technique Report MSR-TR-2005-159, Microsoft, 2005.
-
Technique Report
-
-
Charles, D.1
Jian, K.2
Lauter, K.3
-
13
-
-
51349130622
-
An efficient signature-based scheme for securing network coding against pollution attacks
-
Z. Yu, Y. Wei, B. Ramkumar, Y. Guan, An efficient signature-based scheme for securing network coding against pollution attacks, in: Proceedings of IEEE INFOCOM, 2008.
-
(2008)
Proceedings of IEEE INFOCOM
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
14
-
-
5044242517
-
Byzantine modification detection in multicast networks using randomized network coding
-
ISIT
-
T. Ho, B. Leong, R. Koetter, M. M'eard, M. Effros, D. Karger, Byzantine modification detection in multicast networks using randomized network coding, in: Proceedings of 2004 IEEE International Symposium on Information Theory (ISIT), 2004.
-
(2004)
Proceedings of 2004 IEEE International Symposium on Information Theory
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
M'eard, M.4
Effros, M.5
Karger, D.6
-
15
-
-
34548349361
-
Resilient network coding in the presence of byzantine adversaries
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, M. M'eard, Resilient network coding in the presence of byzantine adversaries, in: Proceedings of IEEE INFOCOM, 2007.
-
(2007)
Proceedings of IEEE INFOCOM
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
M'eard, M.6
-
16
-
-
73449101877
-
-
A. Chou, Y. Wu, Network coding for the internet and wireless networks, MSR-TR-2007-70, Microsoft Research, 2007.
-
A. Chou, Y. Wu, Network coding for the internet and wireless networks, MSR-TR-2007-70, Microsoft Research, 2007.
-
-
-
-
17
-
-
33947399169
-
A random linear network coding approach to multicast
-
Ho T., Médard M., Koetter R., Karger D.R., Effros M., Shi J., and Leong B. A random linear network coding approach to multicast. IEEE Transactions on Information Theory 52 October (2006)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.October
-
-
Ho, T.1
Médard, M.2
Koetter, R.3
Karger, D.R.4
Effros, M.5
Shi, J.6
Leong, B.7
-
19
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Boneh D., and Franklin M. Identity-based encryption from the weil pairing. Proceedings of Crypto, LNCS 2139 (2001) 213-229
-
(2001)
Proceedings of Crypto, LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
21
-
-
23044435711
-
Short Signatures from the Weil pairing
-
Boneh D., Lynn B., and Shacham H. Short Signatures from the Weil pairing. Journal of Cryptology 17 4 (2004) 297-319
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
23
-
-
84957804123
-
Identification of bad signatures in batches
-
Pastuszak J., Michatek D., Pieprzyk J., and Seberry J. Identification of bad signatures in batches. Proceedings of PKC'00, LNCS 3958 (2000) 28-45
-
(2000)
Proceedings of PKC'00, LNCS
, vol.3958
, pp. 28-45
-
-
Pastuszak, J.1
Michatek, D.2
Pieprzyk, J.3
Seberry, J.4
-
25
-
-
0348155942
-
Efficient verifiably encrypted signature and partially blind signature from bilinear pairings
-
Zhang F., Safavi-Naini R., and Susilo W. Efficient verifiably encrypted signature and partially blind signature from bilinear pairings. Proceedings of Indocrypt, LNCS 2904 (2003) 191-204
-
(2003)
Proceedings of Indocrypt, LNCS
, vol.2904
, pp. 191-204
-
-
Zhang, F.1
Safavi-Naini, R.2
Susilo, W.3
-
28
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Camenisch J., and Lysyanskaya A. Signature schemes and anonymous credentials from bilinear maps. Proceedings of CRYPTO, LNCS 3152 (2004) 56-72
-
(2004)
Proceedings of CRYPTO, LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
29
-
-
67349168446
-
BAT: a robust signature scheme for vehicular communications using binary authentication tree
-
Jiang Y., Shi M., Shen X., and Lin C. BAT: a robust signature scheme for vehicular communications using binary authentication tree. IEEE Transactions on Wireless Communications 8 4 (2009) 1974-1983
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.4
, pp. 1974-1983
-
-
Jiang, Y.1
Shi, M.2
Shen, X.3
Lin, C.4
-
30
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Barreto P., Kim H., Lynn B., and Scott M. Efficient algorithms for pairing-based cryptosystems. Proceedings of CRYPTO'02, LNCS 2442 (2002) 354-368
-
(2002)
Proceedings of CRYPTO'02, LNCS
, vol.2442
, pp. 354-368
-
-
Barreto, P.1
Kim, H.2
Lynn, B.3
Scott, M.4
-
31
-
-
73449084856
-
-
IEEE Standard 1609.2, IEEE Trial-Use Standard for Wireless Access in Vehicular Environments, Security Services for Applications and Management Messages, July, 2006.
-
IEEE Standard 1609.2, IEEE Trial-Use Standard for Wireless Access in Vehicular Environments, Security Services for Applications and Management Messages, July, 2006.
-
-
-
-
32
-
-
0041291986
-
-
IETF RFC 3280, April
-
R. Housley, W. Polk, W. Ford, D. Solo, Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, IETF RFC 3280, April 2002.
-
(2002)
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
33
-
-
84940671821
-
Constricting the adversary: A broadcast transformation for network
-
D. Wang, D. Silva, F.R. Kschischang, Constricting the adversary: a broadcast transformation for network, in: Proceedings of 45th Annual Allerton Conference on Communication, Control and Computing, 2007.
-
(2007)
Proceedings of 45th Annual Allerton Conference on Communication, Control and Computing
-
-
Wang, D.1
Silva, D.2
Kschischang, F.R.3
-
35
-
-
20544449877
-
Practical network coding
-
P. Chou, Y. Wu, K. Jain, Practical network coding, in: Proceedings of Allerton Conference on Communication, Control, and Computing, 2003.
-
(2003)
Proceedings of Allerton Conference on Communication, Control, and Computing
-
-
Chou, P.1
Wu, Y.2
Jain, K.3
-
36
-
-
70449529634
-
-
Elsevier
-
Y. Jiang, Y. Fan, X. Shen, C. Lin, A self-adaptive probabilistic packet filter scheme against entropy attacks in network coding, Computer Networks, Elsevier, 2009.
-
(2009)
A self-adaptive probabilistic packet filter scheme against entropy attacks in network coding, Computer Networks
-
-
Jiang, Y.1
Fan, Y.2
Shen, X.3
Lin, C.4
-
38
-
-
84944905011
-
Homomorphic signature schemes
-
Johnson R., Molnar D., Song D., and Wagner D. Homomorphic signature schemes. Proceedings of RSA, Cryptographer's Track. LNCS 2271 (2002)
-
(2002)
Proceedings of RSA, Cryptographer's Track. LNCS
, vol.2271
-
-
Johnson, R.1
Molnar, D.2
Song, D.3
Wagner, D.4
-
39
-
-
51649125221
-
Signatures for content distribution with network coding
-
F. Zhao, T. Kalker, M. Medard, K.J. Han, Signatures for content distribution with network coding, in: Proceedings of IEEE ISIT, 2007.
-
(2007)
Proceedings of IEEE ISIT
-
-
Zhao, F.1
Kalker, T.2
Medard, M.3
Han, K.J.4
-
40
-
-
70349682315
-
An efficient privacy-preserving scheme against traffic analysis attacks in network coding
-
Y. Fan, Y. Jiang, H. Zhu, X. Shen, An efficient privacy-preserving scheme against traffic analysis attacks in network coding, in: Proceedings of IEEE INFOCOM, 2009.
-
(2009)
Proceedings of IEEE INFOCOM
-
-
Fan, Y.1
Jiang, Y.2
Zhu, H.3
Shen, X.4
|