메뉴 건너뛰기




Volumn , Issue , 2010, Pages

MIS: Malicious nodes identification scheme in network-coding-based peer-to-peer streaming

Author keywords

[No Author keywords available]

Indexed keywords

DATA BLOCKS; DOWNSTREAM NODES; HASH COMPUTATION; HIGHER EFFICIENCY; IDENTIFICATION SCHEME; IN-NETWORK; LIVE STREAMING; MALICIOUS NODES; NETWORK CODING; PEER-TO-PEER STREAMING; POLLUTION ATTACK; SIMULATION RESULT; SPACE OVERHEAD;

EID: 77953307858     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2010.5462226     Document Type: Conference Paper
Times cited : (33)

References (16)
  • 1
    • 77953306121 scopus 로고    scopus 로고
    • Identifying Malicious Nodes in Network-Coding-Based Peer-to-Peer Streaming Networks
    • Qiyan Wang, Long, Vu, Klara Nahrstedt, and Himanshu Khurana, "Identifying Malicious Nodes in Network-Coding-Based Peer-to-Peer Streaming Networks, UIUC-TechReport-12-01-09, http://hdl.handle.net/2142/14413
    • UIUC-TechReport-12-01-09
    • Wang, Q.1    Vu, L.2    Nahrstedt, K.3    Khurana, H.4
  • 2
    • 21644459146 scopus 로고    scopus 로고
    • Data-driven Overlay Streaming: Design, Implementation, and Experience
    • X. Zhang, J. Liu, B. Li, and T.-S.P. Yum, "Data-driven Overlay Streaming: Design, Implementation, and Experience", in IEEE INFOCOM, 2005.
    • (2005) IEEE INFOCOM
    • Zhang, X.1    Liu, J.2    Li, B.3    Yum, T.-S.P.4
  • 3
    • 34447330332 scopus 로고    scopus 로고
    • Lava: A Reality Check of Network Coding in Peer-to- Peer Live Streaming
    • M. Wang, and B. Li, "Lava: A Reality Check of Network Coding in Peer-to- Peer Live Streaming", in Proc. of IEEE INFOCOM, 2007.
    • Proc. of IEEE INFOCOM, 2007
    • Wang, M.1    Li, B.2
  • 4
    • 70350662969 scopus 로고    scopus 로고
    • On Large-Scale Peer-to-Peer Streaming Systems with Network Coding
    • C. Feng, and B. Li, "On Large-Scale Peer-to-Peer Streaming Systems with Network Coding", in ACM Multimedia (MM'09), 2009.
    • (2009) ACM Multimedia (MM'09)
    • Feng, C.1    Li, B.2
  • 9
    • 70349664122 scopus 로고    scopus 로고
    • An Efficient Signature-based Scheme for Securing Network Coding against Pollution Attacks
    • Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An Efficient Signature-based Scheme for Securing Network Coding against Pollution Attacks", in Proc. IEEE INFOCOM, 2008.
    • Proc. IEEE INFOCOM, 2008
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4
  • 10
    • 70349653419 scopus 로고    scopus 로고
    • Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
    • E. Kehdi, and B. Li, "Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding", in Proc. of IEEE INFOCOM, 2009.
    • Proc. of IEEE INFOCOM, 2009
    • Kehdi, E.1    Li, B.2
  • 11
    • 70349664122 scopus 로고    scopus 로고
    • An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks
    • Z. Yu, Y. Wei, B. Ramkumar, Y. Guan, "An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks", IEEE INFOCOM, 2009.
    • (2009) IEEE INFOCOM
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4
  • 12
    • 5044242517 scopus 로고    scopus 로고
    • Byzantine Modification Detection in Multicast Networks using Randomized Network Coding
    • T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and D. R. Karger, "Byzantine Modification Detection in Multicast Networks using Randomized Network Coding", ISIT'04, 2004.
    • (2004) ISIT'04
    • Ho, T.1    Leong, B.2    Koetter, R.3    Medard, M.4    Effros, M.5    Karger, D.R.6
  • 14
    • 51649121337 scopus 로고    scopus 로고
    • Coding for Errors and Erasures in Random Network Coding
    • R. Kotter, and F. R. Kschischang, "Coding for Errors and Erasures in Random Network Coding", ISIT'07, 2007.
    • (2007) ISIT'07
    • Kotter, R.1    Kschischang, F.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.