메뉴 건너뛰기




Volumn , Issue , 2010, Pages 19-24

Locating Byzantine attackers in intra-session network coding using SpaceMac

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION OVERHEADS; DATA BLOCKS; DOWNSTREAM NODES; MALICIOUS NODES; NETWORK CODING; SIMULATION RESULT; SUBSPACE PROPERTIES;

EID: 77957826130     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NETCOD.2010.5487673     Document Type: Conference Paper
Times cited : (26)

References (16)
  • 1
    • 78249273398 scopus 로고    scopus 로고
    • Homomorphic MACs: MAC-based integrity for network coding
    • S. Agrawal and D. Boneh, "Homomorphic MACs: MAC-Based Integrity for Network Coding," in Proc. ACNS, 2009.
    • (2009) Proc. ACNS
    • Agrawal, S.1    Boneh, D.2
  • 2
    • 68849117052 scopus 로고    scopus 로고
    • Signing a linear subspace: Signature schemes for network coding
    • D. Boneh, D. Freeman, J. Katz, and B. Waters, "Signing a Linear Subspace: Signature Schemes for Network Coding," in Proc. PKC, 2009.
    • (2009) Proc. PKC
    • Boneh, D.1    Freeman, D.2    Katz, J.3    Waters, B.4
  • 3
  • 10
    • 70349653419 scopus 로고    scopus 로고
    • Null keys: Limiting malicious attacks via null space properties of network coding
    • E. Kehdi and B. Li, "Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding," in Proc. IEEE INFOCOM, 2009.
    • (2009) Proc. IEEE INFOCOM
    • Kehdi, E.1    Li, B.2
  • 11
    • 51649121337 scopus 로고    scopus 로고
    • Coding for errors and erasures in random network coding
    • R. Koetter and F. R. Kschischang, "Coding for Errors and Erasures in Random Network Coding," in Proc. IEEE SIT, 2007.
    • (2007) Proc. IEEE SIT
    • Koetter, R.1    Kschischang, F.R.2
  • 15
    • 36749056448 scopus 로고    scopus 로고
    • R2: Random push with random network coding in live peer-to-peer streaming
    • M. Wang and B. Li, "R2: Random push with random network coding in live peer-to-peer streaming," IEEE Journal on Selected Areas in Communications, vol. 25, pp. 1655-1666, 2007.
    • (2007) IEEE Journal on Selected Areas in Communications , vol.25 , pp. 1655-1666
    • Wang, M.1    Li, B.2
  • 16
    • 77957830620 scopus 로고    scopus 로고
    • Identifying malicious nodes in network-coding-based peer-to-peer streaming networks
    • Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana, "Identifying Malicious Nodes in Network-Coding-Based Peer-to-Peer Streaming Networks," in Proc. IEEE INFOCOM, 2010.
    • (2010) Proc. IEEE INFOCOM
    • Wang, Q.1    Vu, L.2    Nahrstedt, K.3    Khurana, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.