메뉴 건너뛰기




Volumn , Issue , 2010, Pages

P-Coding: Secure network coding against eavesdropping attacks

Author keywords

Eavesdropping attacks; Network coding; Permutation encryption

Indexed keywords

CODED SYSTEM; CODING SCHEME; CODING VECTORS; EAVESDROPPING ATTACKS; IN-NETWORK; NETWORK CODING; SECURE NETWORKS; SECURITY ANALYSIS; SECURITY SCHEME;

EID: 77953319343     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2010.5462050     Document Type: Conference Paper
Times cited : (76)

References (24)
  • 8
    • 52349119694 scopus 로고    scopus 로고
    • Security for wiretap networks via rank-metric codes
    • Jul
    • D. Silva and F. R, "Security for wiretap networks via rank-metric codes," Proc. of IEEE ISIT, pp. 176-180, Jul. 2008.
    • (2008) Proc. of IEEE ISIT , pp. 176-180
    • Silva, D.1    R, F.2
  • 10
    • 51249125036 scopus 로고    scopus 로고
    • Lightweight security for network coding
    • May
    • J. P. Vilela, L. Lima, J. Barros, "Lightweight security for network coding," Proc. of IEEE ICC'08, pp. 1750-1754, May. 2008.
    • (2008) Proc. of IEEE ICC'08 , pp. 1750-1754
    • Vilela, J.P.1    Lima, L.2    Barros, J.3
  • 11
    • 70349682315 scopus 로고    scopus 로고
    • An efficient privacy-preserving scheme against traffic analysis in network coding
    • Apr
    • Y. Fan, Y. Jiang, H. Zhu, and X. Shen "An efficient privacy-preserving scheme against traffic analysis in network coding," Proc. of IEEE INFOCOM'09, pp. 2213-2221, Apr. 2009.
    • (2009) Proc. of IEEE INFOCOM'09 , pp. 2213-2221
    • Fan, Y.1    Jiang, Y.2    Zhu, H.3    Shen, X.4
  • 12
    • 1842815876 scopus 로고    scopus 로고
    • Security based on network topology against the wiretapping attack
    • Feb
    • K. Jain, "Security based on network topology against the wiretapping attack," IEEE Wireless Communications, pp. 68-71, Feb. 2004.
    • (2004) IEEE Wireless Communications , pp. 68-71
    • Jain, K.1
  • 13
    • 51649118865 scopus 로고    scopus 로고
    • Random linear network coding: A free cypher?
    • Jun
    • L. Lima, M. Médard, and J. Barros, "Random linear network coding: A free cypher?" Proc. of IEEE ISIT, pp. 546-550, Jun. 2007.
    • (2007) Proc. of IEEE ISIT , pp. 546-550
    • Lima, L.1    Médard, M.2    Barros, J.3
  • 15
    • 28844481518 scopus 로고    scopus 로고
    • Minimum-energy multicast in mobile Ad hoc networks using network coding
    • Nov
    • Y. Wu, P. A. Chou, and S.-Y. Kung, "Minimum-energy multicast in mobile Ad hoc networks using network coding," IEEE Trans. on Communications, vol. 53, no. 11, pp. 1906-1918, Nov. 2005.
    • (2005) IEEE Trans. on Communications , vol.53 , Issue.11 , pp. 1906-1918
    • Wu, Y.1    Chou, P.A.2    Kung, S.-Y.3
  • 16
    • 33749431985 scopus 로고    scopus 로고
    • Further results on coding for reliable communication over packet networks
    • Sept
    • D. Lun, M. Médard, R. Koetter, and M. Effros, "Further results on coding for reliable communication over packet networks," Proc. of IEEE ISIT, pp. 1848-1852, Sept. 2005.
    • (2005) Proc. of IEEE ISIT , pp. 1848-1852
    • Lun, D.1    Médard, M.2    Koetter, R.3    Effros, M.4
  • 17
    • 25644448947 scopus 로고    scopus 로고
    • Network coding for large scale file distribution
    • Mar
    • C. Gkantsidis and P. Rodriguez, "Network coding for large scale file distribution," Proc. of IEEE INFOCOM'05, pp. 2235-2245, Mar. 2005.
    • (2005) Proc. of IEEE INFOCOM'05 , pp. 2235-2245
    • Gkantsidis, C.1    Rodriguez, P.2
  • 23
    • 26444479778 scopus 로고
    • Optimization by simulated annealing
    • S. Kirkpatrick, C. D. Gelatt, Jr., and M. P. Vecchi. "Optimization by simulated annealing," Science, vol. 220, no. 4598, pp. 671-680, 1983.
    • (1983) Science , vol.220 , Issue.4598 , pp. 671-680
    • Kirkpatrick, S.1    Gelatt Jr., C.D.2    Vecchi, M.P.3
  • 24
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Systems Technical Journal, vol. 28, pp. 656-715, Oct. 1949.
    • (1949) Bell Systems Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.