-
1
-
-
0034229404
-
Network information flow
-
July
-
R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, "Network information flow." IEEE Transactions on Information Theory, vol. 46, no. 4, pp. 1204-1216, July 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
2
-
-
0037323073
-
Linear network coding
-
S.-Y. R. Li, R. W. Yeung, and N. Cai, "Linear network coding," IEEE Transactions on Information Theory, vol. 49, no. 2, pp. 371-381, 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.-Y.R.1
Yeung, R.W.2
Cai, N.3
-
3
-
-
33745142955
-
Network coding: An instant prime
-
C. Fragouli, J.-Y. L. Boudec, and J.Widmer, "Network coding: an instant primer," SIGCOMM Comput. Commun. Rev., vol. 36, no. 1, pp. 63-68, 2006.
-
(2006)
SIGCOMM Comput. Commun. Rev.
, vol.36
, Issue.1
, pp. 63-68
-
-
Fragouli, C.1
Boudec, J.-Y.L.2
Widmer, J.3
-
4
-
-
45749150357
-
XORs in the air: Practical wireless network coding
-
S. Katti, H. Rahul, W. Hu, D. Katabi, M. Ḿedard, and J. Crowcroft, "XORs in the air: practical wireless network coding," IEEE/ACM Trans. Netw., vol. 216, no. 3, pp. 497-510, 2008.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.216
, Issue.3
, pp. 497-510
-
-
Katti, S.1
Rahul, H.2
Hu, W.3
Katabi, D.4
Ḿedard, M.5
Crowcroft, J.6
-
5
-
-
33744932422
-
Ubiquitous access to distributed data in large-scale sensor networks through decentralized erasure codes
-
Piscataway, NJ, USA: IEEE
-
A. G. Dimakis, V. Prabhakaran, and K. Ramchandran, "Ubiquitous access to distributed data in large-scale sensor networks through decentralized erasure codes," in Proceedings of the 4th international symposium on Information processing in sensor networks (IPSN). Piscataway, NJ, USA: IEEE, 2005, p. 15.
-
(2005)
Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN)
, pp. 15
-
-
Dimakis, A.G.1
Prabhakaran, V.2
Ramchandran, K.3
-
7
-
-
21644451147
-
Distributed data storage in sensor networks using decentralized erasure codes
-
Pacific Grove, CA, USA, November
-
A. G. Dimakis, V. Prabhakaran, and K. Ramchandran, "Distributed data storage in sensor networks using decentralized erasure codes," in Proceedings of the Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, November 2004.
-
(2004)
Proceedings of the Asilomar Conference on Signals, Systems, and Computers
-
-
Dimakis, A.G.1
Prabhakaran, V.2
Ramchandran, K.3
-
8
-
-
33947702121
-
Distributed foutain codes for networked storage
-
Toulouse, France
-
A. G. Dimakis, V. Prabhakaran, and K. Ramchandran, "Distributed foutain codes for networked storage," in Proceedings of the IEEE Conference on Acoustics, Speech and Signal Processing (ICASSP), Toulouse, France, 2006.
-
(2006)
Proceedings of the IEEE Conference on Acoustics, Speech and Signal Processing (ICASSP)
-
-
Dimakis, A.G.1
Prabhakaran, V.2
Ramchandran, K.3
-
9
-
-
33745180496
-
Decentralized erasure codes for distributed networked storage
-
DOI 10.1109/TIT.2006.874535
-
A. G. Dimakis, V. Prabhakaran, and K. Ramchandran, "Decentralized erasure codes for distributed networked storage," IEEE Transactions on Information Theory Netw., vol. 52, pp. 2809- 2816, Jun. 2006. (Pubitemid 43898929)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.6
, pp. 2809-2816
-
-
Dimakis, A.G.1
Prabhakaran, V.2
Ramchandran, K.3
-
10
-
-
36248991171
-
How good is random linear coding based distributed networked storage
-
S. Acedánski, S. Deb, M. Ḿedard, and R. K̈otter, "How good is random linear coding based distributed networked storage," in Proceedings of the Network Coding Workshop (NetCod), 2005.
-
(2005)
Proceedings of the Network Coding Workshop (NetCod)
-
-
Acedánski, S.1
Deb, S.2
Ḿedard, M.3
K̈otter, R.4
-
11
-
-
70349146976
-
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
-
New York, NY, USA: ACM
-
J. Dong, R. Curtmola, and C. Nita-Rotaru, "Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks," in WiSec'09: Proceedings of the second ACM conference on Wireless network security. New York, NY, USA: ACM, 2009, pp. 111-122.
-
(2009)
WiSec'09: Proceedings of the Second ACM Conference on Wireless Network Security
, pp. 111-122
-
-
Dong, J.1
Curtmola, R.2
Nita-Rotaru, C.3
-
13
-
-
67650661023
-
Securing coding based distributed storage in wireless sensor networks
-
Atlanta, USA
-
L. Buttýan, L. Czap, and I. Vajda, "Securing coding based distributed storage in wireless sensor networks," in Proceedings of the IEEE Workshop on Wireless and Sensor Network Security (WSNS), Atlanta, USA, 2008.
-
(2008)
Proceedings of the IEEE Workshop on Wireless and Sensor Network Security (WSNS)
-
-
Buttýan, L.1
Czap, L.2
Vajda, I.3
-
14
-
-
0142008000
-
The benefits of coding over routing in a randomized setting
-
June
-
T. Ho, R. K̈otter, M. Ḿedard, D. R. Karger, and M. Effros, "The benefits of coding over routing in a randomized setting," in Proceedings of the IEEE Information Theory Symposium (ISIT), June 2003.
-
(2003)
Proceedings of the IEEE Information Theory Symposium (ISIT)
-
-
Ho, T.1
K̈otter, R.2
Ḿedard, M.3
Karger, D.R.4
Effros, M.5
-
15
-
-
0034387168
-
On the rank of random matrices
-
C. Cooper, "On the rank of random matrices," Random Structures and Algorithms, vol. 16, p. 2000, 2000.
-
(2000)
Random Structures and Algorithms
, vol.16
, pp. 2000
-
-
Cooper, C.1
-
16
-
-
84943817322
-
Error detecting and error correcting codes
-
Apr.
-
R. W. Hamming, "Error detecting and error correcting codes," The Bell System Technical Journal, vol. 26, no. 2, pp. 147-161, Apr. 1950.
-
(1950)
The Bell System Technical Journal
, vol.26
, Issue.2
, pp. 147-161
-
-
Hamming, R.W.1
-
17
-
-
0017973512
-
On the inherent intractability of certain coding problems
-
May
-
E. Berlekamp, R. McEliece, and H. van Tilborg, "On the inherent intractability of certain coding problems," IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 384-386, May 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.3
, pp. 384-386
-
-
Berlekamp, E.1
Mceliece, R.2
Van Tilborg, H.3
-
18
-
-
0031275868
-
The intractability of computing the minimum distance of a code
-
Nov.
-
A. Vardy, "The intractability of computing the minimum distance of a code," IEEE Transactions on Information Theory, vol. 43, no. 6, pp. 1757-1766, Nov. 1997.
-
(1997)
IEEE Transactions on Information Theory
, vol.43
, Issue.6
, pp. 1757-1766
-
-
Vardy, A.1
-
19
-
-
84946828059
-
Efficient zero-knowledge authentication based on a linear algebra problem minrank
-
N. Courtois, "Efficient zero-knowledge authentication based on a linear algebra problem minrank," in Proceedings of ASIACRYPT, 2001, pp. 402-421.
-
(2001)
Proceedings of ASIACRYPT
, pp. 402-421
-
-
Courtois, N.1
-
20
-
-
77949587644
-
-
L. Lima, J. Vilela, P. Oliveira, J. Barros, I. Filiz, X. Guo, J. Morton, B. Sturmfels, M. Mungan, J. Ramasco et al., "Network Coding Security: Attacks and Countermeasures," 2008.
-
(2008)
Network Coding Security: Attacks and Countermeasures
-
-
Lima, L.1
Vilela, J.2
Oliveira, P.3
Barros, J.4
Filiz, I.5
Guo, X.6
Morton, J.7
Sturmfels, B.8
Mungan, M.9
Ramasco, J.10
-
21
-
-
34548349361
-
Resilient network coding in the presence of byzantine adversaries
-
Anchorage, Alaska, USA
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, and M. Ḿedard, "Resilient network coding in the presence of byzantine adversaries," in Proceedings of the Conference of the IEEE Computer and Commu- nications Societies (INFOCOM), Anchorage, Alaska, USA, 2007, pp. 616-624.
-
(2007)
Proceedings of the Conference of the IEEE Computer and Communications Societies (INFOCOM)
, pp. 616-624
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Ḿedard, M.6
-
22
-
-
33749439326
-
Correction of adversarial errors in networks
-
S. Jaggi, M. Langberg, T. Ho, and M. Effros, "Correction of adversarial errors in networks," in Proceedings of International Symposium on Information Theory (ISIT), 2005, pp. 1455-1459.
-
(2005)
Proceedings of International Symposium on Information Theory (ISIT)
, pp. 1455-1459
-
-
Jaggi, S.1
Langberg, M.2
Ho, T.3
Effros, M.4
-
23
-
-
5044242517
-
Byzantine modification detection in multicast networks using randomized network coding
-
Jun.
-
T. Ho, B. Leong, R. K̈otter, M. Ḿedard, M. Effros, and D. R. Karger, "Byzantine modification detection in multicast networks using randomized network coding," in Proceedings of the 2004 IEEE International Symposium on Information Theory (ISIT), Jun. 2004.
-
(2004)
Proceedings of the 2004 IEEE International Symposium on Information Theory (ISIT)
-
-
Ho, T.1
Leong, B.2
K̈otter, R.3
Ḿedard, M.4
Effros, M.5
Karger, D.R.6
-
24
-
-
3543050732
-
On-the-fly verification of rateless erasure codes for efficient content distribution
-
M. N. Krohn, M. J. Freedman, and D. Mazieres, "On-the-fly verification of rateless erasure codes for efficient content distribution," in Proceedings of 2004 IEEE Symposium on Security and Privacy, 2004, pp. 226-240.
-
(2004)
Proceedings of 2004 IEEE Symposium on Security and Privacy
, pp. 226-240
-
-
Krohn, M.N.1
Freedman, M.J.2
Mazieres, D.3
-
27
-
-
51349130622
-
An efficient signature-based scheme for securing network coding against pollution attacks
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient signature-based scheme for securing network coding against pollution attacks," in Proceedings of the Conference of the IEEE Computer and Communications Societies (INFOCOM), 2008.
-
(2008)
Proceedings of the Conference of the IEEE Computer and Communications Societies (INFOCOM)
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
28
-
-
51649125221
-
Signatures for content distribution with network coding
-
Jun.
-
F. Zhao, T. Kalker, M. Ḿedard, and K. J. Han, "Signatures for content distribution with network coding," in Proceedings of 2007 IEEE International Symposium on Information Theory (ISIT'07), Jun. 2007.
-
(2007)
Proceedings of 2007 IEEE International Symposium on Information Theory (ISIT'07)
-
-
Zhao, F.1
Kalker, T.2
Ḿedard, M.3
Han, K.J.4
-
29
-
-
67049095592
-
-
Springer, Mar. 2009
-
D. Boneh, D. Freeman, J. Katz, and B. Waters, Signing a Linear Subspace: Signature Schemes for Network Coding. Springer, Mar. 2009, vol. 5443/2009, pp. 68-87.
-
(2009)
Signing a Linear Subspace: Signature Schemes for Network Coding
, vol.5443
, pp. 68-87
-
-
Boneh, D.1
Freeman, D.2
Katz, J.3
Waters, B.4
-
30
-
-
70349664122
-
An efficient signaturebased scheme for securing XOR network coding against pollution attacks
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient signaturebased scheme for securing XOR network coding against pollution attacks," in Proceedings of the Conference of the IEEE Computer and Communications Societies (INFOCOM), 2009.
-
(2009)
Proceedings of the Conference of the IEEE Computer and Communications Societies (INFOCOM)
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
|