-
1
-
-
0034229404
-
Network information flow
-
Jul
-
R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, "Network information flow," IEEE Trans. on Information Theory, vol. 46, no. 4, pp. 1204-1216, Jul. 2000.
-
(2000)
IEEE Trans. on Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
2
-
-
0037323073
-
Linear network coding
-
Feb
-
S.-Y. R. Li, R. W. Yeung, and N. Cai, "Linear network coding," IEEE Trans. on Information Theory, vol. 49, no. 2, pp. 371-381, Feb. 2003.
-
(2003)
IEEE Trans. on Information Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.-Y.R.1
Yeung, R.W.2
Cai, N.3
-
3
-
-
33947399169
-
A random linear network coding approach to multicast
-
Oct
-
T. Ho, M. Médard, R. Koetter, D. R. Karger, M. Effros, J. Shi, and B. Leong, "A random linear network coding approach to multicast," IEEE Trans. on Information Theory, vol. 52, no. 10, pp. 4413-4430, Oct. 2006.
-
(2006)
IEEE Trans. on Information Theory
, vol.52
, Issue.10
, pp. 4413-4430
-
-
Ho, T.1
Médard, M.2
Koetter, R.3
Karger, D.R.4
Effros, M.5
Shi, J.6
Leong, B.7
-
4
-
-
20544449877
-
Practical network coding
-
P. A. Chou, Y. Wu, and K. Jain, "Practical network coding," Proc. of 41st Allerton Conference on Communication, Control and Computing, 2003.
-
Proc. of 41st Allerton Conference on Communication, Control and Computing, 2003
-
-
Chou, P.A.1
Wu, Y.2
Jain, K.3
-
6
-
-
33750025166
-
On the capacity of secure network coding
-
Sept
-
J. Feldman, T. Malkin, C. Stein, and R. A Servedio, "On the capacity of secure network coding," Proc. of the 42nd Annual Allerton Conference on Communication, Control, and Computing, pp. 30-39, Sept. 2004.
-
(2004)
Proc. of the 42nd Annual Allerton Conference on Communication, Control, and Computing
, pp. 30-39
-
-
Feldman, J.1
Malkin, T.2
Stein, C.3
Servedio, R.A.4
-
8
-
-
52349119694
-
Security for wiretap networks via rank-metric codes
-
Jul
-
D. Silva and F. R, "Security for wiretap networks via rank-metric codes," Proc. of IEEE ISIT, pp. 176-180, Jul. 2008.
-
(2008)
Proc. of IEEE ISIT
, pp. 176-180
-
-
Silva, D.1
R, F.2
-
9
-
-
69849097856
-
Weakly secure network coding
-
K. Bhattad and K. R. Narayanan, "Weakly secure network coding," Proc. of the First Workshop on Network Coding, Theory, & Applications, 2005.
-
Proc. of the First Workshop on Network Coding, Theory, & Applications, 2005
-
-
Bhattad, K.1
Narayanan, K.R.2
-
10
-
-
51249125036
-
Lightweight security for network coding
-
May
-
J. P. Vilela, L. Lima, J. Barros, "Lightweight security for network coding," Proc. of IEEE ICC'08, pp. 1750-1754, May. 2008.
-
(2008)
Proc. of IEEE ICC'08
, pp. 1750-1754
-
-
Vilela, J.P.1
Lima, L.2
Barros, J.3
-
11
-
-
70349682315
-
An efficient privacy-preserving scheme against traffic analysis in network coding
-
Apr
-
Y. Fan, Y. Jiang, H. Zhu, and X. Shen "An efficient privacy-preserving scheme against traffic analysis in network coding," Proc. of IEEE INFOCOM'09, pp. 2213-2221, Apr. 2009.
-
(2009)
Proc. of IEEE INFOCOM'09
, pp. 2213-2221
-
-
Fan, Y.1
Jiang, Y.2
Zhu, H.3
Shen, X.4
-
12
-
-
1842815876
-
Security based on network topology against the wiretapping attack
-
Feb
-
K. Jain, "Security based on network topology against the wiretapping attack," IEEE Wireless Communications, pp. 68-71, Feb. 2004.
-
(2004)
IEEE Wireless Communications
, pp. 68-71
-
-
Jain, K.1
-
13
-
-
51649118865
-
Random linear network coding: A free cypher?
-
Jun
-
L. Lima, M. Médard, and J. Barros, "Random linear network coding: A free cypher?" Proc. of IEEE ISIT, pp. 546-550, Jun. 2007.
-
(2007)
Proc. of IEEE ISIT
, pp. 546-550
-
-
Lima, L.1
Médard, M.2
Barros, J.3
-
15
-
-
28844481518
-
Minimum-energy multicast in mobile Ad hoc networks using network coding
-
Nov
-
Y. Wu, P. A. Chou, and S.-Y. Kung, "Minimum-energy multicast in mobile Ad hoc networks using network coding," IEEE Trans. on Communications, vol. 53, no. 11, pp. 1906-1918, Nov. 2005.
-
(2005)
IEEE Trans. on Communications
, vol.53
, Issue.11
, pp. 1906-1918
-
-
Wu, Y.1
Chou, P.A.2
Kung, S.-Y.3
-
16
-
-
33749431985
-
Further results on coding for reliable communication over packet networks
-
Sept
-
D. Lun, M. Médard, R. Koetter, and M. Effros, "Further results on coding for reliable communication over packet networks," Proc. of IEEE ISIT, pp. 1848-1852, Sept. 2005.
-
(2005)
Proc. of IEEE ISIT
, pp. 1848-1852
-
-
Lun, D.1
Médard, M.2
Koetter, R.3
Effros, M.4
-
17
-
-
25644448947
-
Network coding for large scale file distribution
-
Mar
-
C. Gkantsidis and P. Rodriguez, "Network coding for large scale file distribution," Proc. of IEEE INFOCOM'05, pp. 2235-2245, Mar. 2005.
-
(2005)
Proc. of IEEE INFOCOM'05
, pp. 2235-2245
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
18
-
-
45749150357
-
Xors in the air: Practical wireless network coding
-
Jun
-
S. Katti, H. Rahul, D. Katabi, W. Hu, M. Médard, and J. Crowcroft. "Xors in the air: practical wireless network coding," IEEE/ACM Trans. on Networking, vol. 16, no. 3, pp. 497-510, Jun. 2008.
-
(2008)
IEEE/ACM Trans. on Networking
, vol.16
, Issue.3
, pp. 497-510
-
-
Katti, S.1
Rahul, H.2
Katabi, D.3
Hu, W.4
Médard, M.5
Crowcroft, J.6
-
23
-
-
26444479778
-
Optimization by simulated annealing
-
S. Kirkpatrick, C. D. Gelatt, Jr., and M. P. Vecchi. "Optimization by simulated annealing," Science, vol. 220, no. 4598, pp. 671-680, 1983.
-
(1983)
Science
, vol.220
, Issue.4598
, pp. 671-680
-
-
Kirkpatrick, S.1
Gelatt Jr., C.D.2
Vecchi, M.P.3
-
24
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Systems Technical Journal, vol. 28, pp. 656-715, Oct. 1949.
-
(1949)
Bell Systems Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
|