-
1
-
-
0034229404
-
Network information flow
-
R. Ahlswede, N. Cai, S. Li, and R. Yeung, "Network information flow," IEEE Transactions on Information Theory, vol. 46, no. 4, pp. 1204-1216, 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.3
Yeung, R.4
-
2
-
-
0037323073
-
Linear network coding
-
S. Li, R. Yeung, and N. Cai, "Linear network coding," IEEE Transactions on Information Theory, vol. 49, no. 2, pp. 371-381, 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.1
Yeung, R.2
Cai, N.3
-
3
-
-
5044242517
-
Byzantine modification detection in multicast networks using randomized network coding
-
T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and D. Karger, "Byzantine modification detection in multicast networks using randomized network coding," in Proceedings of IEEE International Symposium on Information Theory (ISIT) 2004, 2004, p. 144.
-
Proceedings of IEEE International Symposium on Information Theory (ISIT) 2004, 2004
, pp. 144
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Medard, M.4
Effros, M.5
Karger, D.6
-
4
-
-
3543050732
-
On-the-fly verification of rateless erasure codes for efficient content distribution
-
M. Krohn, M. Freedman, and D. Mazieres, "On-the-fly verification of rateless erasure codes for efficient content distribution," in Proceedings of IEEE Symposium on Security and Privacy 2004, 2004, pp. 226-240.
-
Proceedings of IEEE Symposium on Security and Privacy 2004, 2004
, pp. 226-240
-
-
Krohn, M.1
Freedman, M.2
Mazieres, D.3
-
5
-
-
39049090594
-
Cooperative security for network coding file distribution
-
C. Gkantsidis and P. R. Rodriguez, "Cooperative security for network coding file distribution," in Proceedings of INFOCOM 2006, the 25th IEEE International Conference on Computer Communications, 2006, pp. 1-13.
-
Proceedings of INFOCOM 2006, the 25th IEEE International Conference on Computer Communications, 2006
, pp. 1-13
-
-
Gkantsidis, C.1
Rodriguez, P.R.2
-
6
-
-
34548349361
-
Resilient network coding in the presence of byzantine adversaries
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, and M. Medard, "Resilient network coding in the presence of byzantine adversaries," in Proceedings of IEEE INFOCOM 2007, the 26th Conference on Computer Communications, 2007, pp. 616-624.
-
Proceedings of IEEE INFOCOM 2007, the 26th Conference on Computer Communications, 2007
, pp. 616-624
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Medard, M.6
-
7
-
-
51349130622
-
An efficient Signature-Based scheme for securing network coding against pollution attacks
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient Signature-Based scheme for securing network coding against pollution attacks," in Proceedings of IEEE INFOCOM 2008, the 27th Conference on Computer Communications, 2008, pp. 1409-1417.
-
Proceedings of IEEE INFOCOM 2008, the 27th Conference on Computer Communications, 2008
, pp. 1409-1417
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
9
-
-
33750025166
-
On the capacity of secure network coding
-
J. Feldman, T. Malkin, C. Stein, and R. A. Servedio, "On the capacity of secure network coding," in Proceedings of the 42nd Annual Allerton Conference on Communication, Control, and Computing, 2004.
-
Proceedings of the 42nd Annual Allerton Conference on Communication, Control, and Computing, 2004
-
-
Feldman, J.1
Malkin, T.2
Stein, C.3
Servedio, R.A.4
-
10
-
-
69849097856
-
Weakly secure network coding
-
K. Bhattad and K. R. Narayanan, "Weakly secure network coding," in Proceedings of the First Workshop on Network Coding, Theory, and Applications(NetCod), Riva del Garda, Italy, 2005.
-
Proceedings of the First Workshop on Network Coding, Theory, and Applications(NetCod), Riva del Garda, Italy, 2005
-
-
Bhattad, K.1
Narayanan, K.R.2
-
11
-
-
51649118865
-
Random linear network coding: A free cipher?
-
L. Lima, M. Medard, and J. ao Barros, "Random linear network coding: A free cipher?" in Proceedings of IEEE International Symposium on Information Theory (ISIT) 2007, 2007, pp. 546-550.
-
Proceedings of IEEE International Symposium on Information Theory (ISIT) 2007, 2007
, pp. 546-550
-
-
Lima, L.1
Medard, M.2
Ao Barros, J.3
-
12
-
-
0003515463
-
-
Prentice Hall, Feb.
-
R. K. Ahuja, T. L. Magnanti, and J. B. Orlin, Network Flows: Theory, Algorithms, and Applications. Prentice Hall, Feb. 1993.
-
(1993)
Network Flows: Theory, Algorithms, and Applications
-
-
Ahuja, R.K.1
Magnanti, T.L.2
Orlin, J.B.3
-
13
-
-
0142008000
-
The benefits of coding over routing in a randomized setting
-
T. Ho, R. Koetter, M. Medard, D. Karger, and M. Effros, "The benefits of coding over routing in a randomized setting," in Proceedings of IEEE International Symposium on Information Theory (ISIT) 2003, 2003, p. 442.
-
Proceedings of IEEE International Symposium on Information Theory (ISIT) 2003, 2003
, pp. 442
-
-
Ho, T.1
Koetter, R.2
Medard, M.3
Karger, D.4
Effros, M.5
-
14
-
-
25844519184
-
On randomized network coding
-
The University
-
T. Ho, M. Medard, J. Shi, M. Effros, and D. R. Karger, "On randomized network coding," in Proceedings of the 41st Annual Allerton Conference on Communication Control and Computing, vol. 41. The University; 1998, 2003, pp. 11-20.
-
(1998)
Proceedings of the 41st Annual Allerton Conference on Communication Control and Computing
, vol.41
, pp. 11-20
-
-
Ho, T.1
Medard, M.2
Shi, J.3
Effros, M.4
Karger, D.R.5
-
15
-
-
1842815876
-
Security based on network topology against the wiretapping attack
-
K. Jain, "Security based on network topology against the wiretapping attack," IEEE Wireless Communications, vol. 11, no. 1, pp. 68-71, 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 68-71
-
-
Jain, K.1
-
16
-
-
0141973572
-
Low complexity algebraic multicast network codes
-
S. Jaggi, P. Chou, and K. Jain, "Low complexity algebraic multicast network codes," in Proceedings of IEEE International Symposium on Information Theory (ISIT) 2003, 2003, p. 368.
-
Proceedings of IEEE International Symposium on Information Theory (ISIT) 2003, 2003
, pp. 368
-
-
Jaggi, S.1
Chou, P.2
Jain, K.3
|