메뉴 건너뛰기




Volumn , Issue , 2009, Pages 593-599

Nonlinear network coding is necessary to combat General Byzantine attacks

Author keywords

[No Author keywords available]

Indexed keywords

LINEAR CODES; LINEAR CONSTRAINTS; NETWORK CODING; REAL ARITHMETIC; RELIABLE COMMUNICATION; UPPER BOUND;

EID: 77949601386     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ALLERTON.2009.5394912     Document Type: Conference Paper
Times cited : (47)

References (7)
  • 3
    • 0009768331 scopus 로고
    • The Byzantine generals strike again
    • D. Dolev, "The Byzantine generals strike again," Journal of Algorithms, vol. 3, no. 1, pp. 14-30, 1982.
    • (1982) Journal of Algorithms , vol.3 , Issue.1 , pp. 14-30
    • Dolev, D.1
  • 4
    • 38349097767 scopus 로고    scopus 로고
    • Network error correction, part I: Basic concepts and upper bounds
    • N. Cai and R. W. Yeung, "Network error correction, part I: Basic concepts and upper bounds," Comm. in Inf. and Syst., vol. 6, no. 1, pp 19-36, 2006.
    • (2006) Comm. in Inf. and Syst , vol.6 , Issue.1 , pp. 19-36
    • Cai, N.1    Yeung, R.W.2
  • 5
    • 38349083344 scopus 로고    scopus 로고
    • Network error correction, part II: Lower bounds
    • N. Cai and R. W. Yeung, "Network error correction, part II: Lower bounds," Comm. in Inf. and Syst., vol. 6, no. 1, pp 37-54, 2006.
    • (2006) Comm. in Inf. and Syst , vol.6 , Issue.1 , pp. 37-54
    • Cai, N.1    Yeung, R.W.2
  • 6
    • 34548349361 scopus 로고    scopus 로고
    • Resilient Network Coding in the Presence of Byzantine Adversaries
    • S. Jaggi, et al, "Resilient Network Coding in the Presence of Byzantine Adversaries," in Proc. INFOCOM, pp. 616-624, 2007.
    • (2007) Proc. INFOCOM , pp. 616-624
    • Jaggi, S.1
  • 7
    • 77949578432 scopus 로고    scopus 로고
    • When WatchDog Meets Coding,
    • Technical Report, May
    • G. Liang and N. H. Vaidya, "When WatchDog Meets Coding," Technical Report, May 2009.
    • (2009)
    • Liang, G.1    Vaidya, N.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.