-
1
-
-
78249273398
-
Homomorphic MACs: MAC-based integrity for network coding
-
S. Agrawal and D. Boneh, "Homomorphic MACs: MAC-Based Integrity for Network Coding," in Proc. ACNS, 2009.
-
(2009)
Proc. ACNS
-
-
Agrawal, S.1
Boneh, D.2
-
2
-
-
68849117052
-
Signing a linear subspace: Signature schemes for network coding
-
D. Boneh, D. Freeman, J. Katz, and B. Waters, "Signing a Linear Subspace: Signature Schemes for Network Coding," in Proc. PKC, 2009.
-
(2009)
Proc. PKC
-
-
Boneh, D.1
Freeman, D.2
Katz, J.3
Waters, B.4
-
5
-
-
45249114824
-
Byzantine modification detection in multicast networks with randomized network coding
-
June
-
T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and D. R. Karger, "Byzantine modification detection in multicast networks with randomized network coding," IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, vol. 54, pp. 2798-2803, June 2008.
-
(2008)
IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security
, vol.54
, pp. 2798-2803
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Medard, M.4
Effros, M.5
Karger, D.R.6
-
8
-
-
34548349361
-
Resilient network coding in the presence of byzantine adversaries
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, and M. Medard, "Resilient Network Coding in the Presence of Byzantine Adversaries," in Proc. IEEE INFOCOM, 2007.
-
(2007)
Proc. IEEE INFOCOM
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Medard, M.6
-
10
-
-
70349653419
-
Null keys: Limiting malicious attacks via null space properties of network coding
-
E. Kehdi and B. Li, "Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding," in Proc. IEEE INFOCOM, 2009.
-
(2009)
Proc. IEEE INFOCOM
-
-
Kehdi, E.1
Li, B.2
-
11
-
-
51649121337
-
Coding for errors and erasures in random network coding
-
R. Koetter and F. R. Kschischang, "Coding for Errors and Erasures in Random Network Coding," in Proc. IEEE SIT, 2007.
-
(2007)
Proc. IEEE SIT
-
-
Koetter, R.1
Kschischang, F.R.2
-
13
-
-
77953301246
-
RIPPLE authentication for network coding
-
Y. Li, H. Yao, M. Chen, S. Jaggi, and A. Rosen, "RIPPLE Authentication for Network Coding," in Proc. IEEE INFOCOM, 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Li, Y.1
Yao, H.2
Chen, M.3
Jaggi, S.4
Rosen, A.5
-
15
-
-
36749056448
-
R2: Random push with random network coding in live peer-to-peer streaming
-
M. Wang and B. Li, "R2: Random push with random network coding in live peer-to-peer streaming," IEEE Journal on Selected Areas in Communications, vol. 25, pp. 1655-1666, 2007.
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, pp. 1655-1666
-
-
Wang, M.1
Li, B.2
-
16
-
-
77957830620
-
Identifying malicious nodes in network-coding-based peer-to-peer streaming networks
-
Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana, "Identifying Malicious Nodes in Network-Coding-Based Peer-to-Peer Streaming Networks," in Proc. IEEE INFOCOM, 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Wang, Q.1
Vu, L.2
Nahrstedt, K.3
Khurana, H.4
|