-
1
-
-
0034229404
-
Network information flow
-
R. Ahlswede, N. Cai, S.Li, and R. W. Yeung, "Network information flow," IEEE Trans. Inf. Theory, vol. 46(4), pp. 1204-1216, 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.3
Yeung, R.W.4
-
2
-
-
0037323073
-
Linear Network Coding
-
S. Li, R. Yeung, and N. Cai, "Linear Network Coding", in IEEE Transactions on Information Theory, Vol. 49,No.2, pp. 37138,2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.2
, pp. 37138
-
-
Li, S.1
Yeung, R.2
Cai, N.3
-
3
-
-
0142008000
-
The benefits of coding over routing in a randomized setting
-
ISIT
-
T. Ho, R. Koetter, M. Ḿedard, D. R. Karger, and M. Effros, "The benefits of coding over routing in a randomized setting," in International Symposium on Information Theory (ISIT), 2003.
-
(2003)
International Symposium on Information Theory
-
-
Ho, T.1
Koetter, R.2
Ḿedard, M.3
Karger, D.R.4
Effros, M.5
-
4
-
-
18944396948
-
On randomized network coding
-
Oct
-
T. Ho, M. Ḿedard, J. Shi, M. Effros and D. R. Karger, "On randomized network coding," In proc. 41st Annual Allerton Conference on Communication Control and Computing, Oct. 2003.
-
(2003)
proc. 41st Annual Allerton Conference on Communication Control and Computing
-
-
Ho, T.1
Ḿedard, M.2
Shi, J.3
Effros, M.4
Karger, D.R.5
-
5
-
-
51349135448
-
Signature for Network Coding
-
MSR-TR-2005-159, Microsoft, 2005
-
D. Charles, K. Jian, and K. Lauter, "Signature for Network Coding", Technique Report MSR-TR-2005-159, Microsoft, 2005.
-
Technique Report
-
-
Charles, D.1
Jian, K.2
Lauter, K.3
-
6
-
-
39049090594
-
Cooperative Security for Network Coding File Distribution
-
C. Gkantsides and P. Rodriguez, "Cooperative Security for Network Coding File Distribution", in proc. IEEE INFOCOM, 2006.
-
(2006)
proc. IEEE INFOCOM
-
-
Gkantsides, C.1
Rodriguez, P.2
-
7
-
-
3543050732
-
On-the-fly verification of rateless era-sure codes for efficient content distribution
-
Oakland, CA, pp, May
-
M.N.Krohn, M.J.Freedman, and D.Mazíeres, "On-the-fly verification of rateless era-sure codes for efficient content distribution," IEEE Symp. Security and Privacy, Oakland, CA, pp. 226-240, May 2004.
-
(2004)
IEEE Symp. Security and Privacy
, pp. 226-240
-
-
Krohn, M.N.1
Freedman, M.J.2
Mazíeres, D.3
-
8
-
-
0027662341
-
Reducing Elliptic Curve Logorithms to Logorithms in a Finite Field
-
A. Menezes, T. Okamoto, and S. Vanstone, "Reducing Elliptic Curve Logorithms to Logorithms in a Finite Field", in IEEE Transactions on Information Theory, Vol. 39, No. 5, pp. 1639-1646, 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.5
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
9
-
-
0038763879
-
Short Programs for Functions over Curve
-
unpublished manuscript,crypto.stanford.edu/miller
-
V. Miller, "Short Programs for Functions over Curve", unpublished manuscript,crypto.stanford.edu/miller, 1986.
-
(1986)
-
-
Miller, V.1
-
10
-
-
51649125221
-
-
ISIT, Nice, France, June 24, June 29
-
Fang Zhao, Ton Kalker, M. Ḿedard, and Keesook J. Han, "Signatures for content distribution with network coding,"ISIT2007, Nice, France, June 24 - June 29, 2007
-
(2007)
Signatures for content distribution with network coding
-
-
Zhao, F.1
Ton Kalker, M.M.2
Han, K.J.3
-
11
-
-
77749238734
-
-
Jonathan Katz, Brent Waters, Compact signatures for network coding, eprint.iacr.org/2008/316, 2008.
-
Jonathan Katz, Brent Waters, Compact signatures for network coding, eprint.iacr.org/2008/316, 2008.
-
-
-
-
12
-
-
70349146976
-
Practical Defenses Against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks
-
Zurich, Switzerland, March
-
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru, "Practical Defenses Against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks", Proc. of The Second ACM Conference on Wireless Network Security(WiSec 2009), Zurich, Switzerland, March 2009.
-
(2009)
Proc. of The Second ACM Conference on Wireless Network Security(WiSec
-
-
Dong, J.1
Curtmola, R.2
Nita-Rotaru, C.3
-
13
-
-
24744468599
-
An efficient secure key issuing protocol in ID-based cryptosystems
-
IEEE Computer Society. pp
-
Gangishetti, R., M.C. Gorantla, M.L. Das, A. Saxena and V.P. Gulati (2005). An efficient secure key issuing protocol in ID-based cryptosystems. In Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2005), vol. 1. IEEE Computer Society. pp. 674-678.
-
(2005)
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC
, vol.1
, pp. 674-678
-
-
Gangishetti, R.1
Gorantla, M.C.2
Das, M.L.3
Saxena, A.4
Gulati, V.P.5
-
14
-
-
77749244924
-
-
M. Bellare, O. Coldreich, and S. Goldwasser, Incremental cryptography: The case of hashing and signing, CRYPTO, 1994.
-
M. Bellare, O. Coldreich, and S. Goldwasser, "Incremental cryptography: The case of hashing and signing", CRYPTO, 1994.
-
-
-
|