-
1
-
-
0034229404
-
Network information flow
-
July
-
R. Ahlswede, N. Cai, S.-Y.R. Li, and R.W. Yeung, "Network Information Flow," IEEE Trans. Information Theory, vol.46, no.4, pp. 1204-1216, July 2000.
-
(2000)
IEEE Trans. Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
2
-
-
0037323073
-
Linear network coding
-
S.-Y.R. Li, R.W. Yeung, and N. Cai, "Linear Network Coding," IEEE Trans. on Information Theory, vol.49, no.2, pp. 371-381, 2003.
-
(2003)
IEEE Trans. on Information Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.-Y.R.1
Yeung, R.W.2
Cai, N.3
-
3
-
-
0142008000
-
The benefits of coding over routing in a randomized setting
-
T. Ho, R. Koetter, M. Médard, D.R. Karger, and M. Effros, "The Benefits of Coding over Routing in a Randomized Setting," Proc. of IEEE Int'l Symp. on Information Theory, p. 442, 2003.
-
(2003)
Proc. of IEEE Int'l Symp. on Information Theory
, pp. 442
-
-
Ho, T.1
Koetter, R.2
Médard, M.3
Karger, D.R.4
Effros, M.5
-
4
-
-
68849117052
-
Signing a linear subspace: Signature schemes for network coding
-
D. Boneh, D. Freeman, J. Katz, and B. Waters, "Signing a Linear Subspace: Signature Schemes for Network Coding," Proc. 12th Int'l Conf. Practice and Theory in Public Key Cryptography (PKC), http://eprint.iacr.org/ 2008/316, 2009.
-
(2009)
Proc. 12th Int'l Conf. Practice and Theory in Public Key Cryptography (PKC)
-
-
Boneh, D.1
Freeman, D.2
Katz, J.3
Waters, B.4
-
5
-
-
51349130622
-
An efficient signature-based scheme for securing network coding against pollution attacks
-
Apr.
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks," Proc. IEEE 27th Conf. Computer Communications (INFOCOM), pp. 1409-1417, Apr. 2008.
-
(2008)
Proc. IEEE 27th Conf. Computer Communications (INFOCOM)
, pp. 1409-1417
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
6
-
-
44049100993
-
Signatures for network coding
-
Mar.
-
D. Charles, K. Jain, and K. Lauter, "Signatures for Network Coding," Proc. 40th Ann. Conf. Information Sciences and Systems (CISS), pp. 857-863, Mar. 2006.
-
(2006)
Proc. 40th Ann. Conf. Information Sciences and Systems (CISS)
, pp. 857-863
-
-
Charles, D.1
Jain, K.2
Lauter, K.3
-
7
-
-
3543050732
-
On-the-fly verification of rateless erasure codes for efficient content distribution
-
M.N. Krohn, M.J. Freedman, and D. Mazières, "On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution," IEEE Symp. Security and Privacy, pp. 226-240, 2004.
-
(2004)
IEEE Symp. Security and Privacy
, pp. 226-240
-
-
Krohn, M.N.1
Freedman, M.J.2
Mazières, D.3
-
9
-
-
23044435711
-
Short signatures from the weil pairing
-
Sept.
-
D. Boneh, B. Lynn, and H. Shacham, "Short Signatures from the Weil Pairing," J. Cryptology, vol.17, no.4, pp. 297-319, Sept. 2004.
-
(2004)
J. Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
|