-
1
-
-
68849097857
-
Homomorphic MACs: MAC-based integrity for network coding
-
Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.). Springer, Heidelberg
-
Agrawal, S., Boneh, D.: Homomorphic MACs: MAC-based integrity for network coding. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536. Springer, Heidelberg (2009)
-
(2009)
ACNS 2009. LNCS
, vol.5536
-
-
Agrawal, S.1
Boneh, D.2
-
2
-
-
0034229404
-
Network information flow
-
Ahlswede, R., Cai, N., Li, S., Yeung, R.: Network information flow. IEEE Transactions on Information Theory 46(4), 1204-1216 (2000)
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.3
Yeung, R.4
-
3
-
-
74049102823
-
Provable data possession at untrusted stores
-
Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp. 598-609 (2007)
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.C.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.N.J.6
Song, D.X.7
-
4
-
-
72449185582
-
Proofs of storage from homomorphic identification protocols
-
Matsui, M. (ed.). Springer, Heidelberg
-
Ateniese, G., Kamara, S., Katz, J.: Proofs of storage from homomorphic identification protocols. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 319-333. Springer, Heidelberg (2009)
-
(2009)
ASIACRYPT 2009. LNCS
, vol.5912
, pp. 319-333
-
-
Ateniese, G.1
Kamara, S.2
Katz, J.3
-
5
-
-
50849114523
-
Fast batch verification for modular exponentiation and digital signatures
-
Advances in Cryptology - EUROCRYPT '98
-
Bellare, M., Garay, J., Rabin, T.: Fast batch verification for modular exponentiation and digital signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 236-250. Springer, Heidelberg (1998) (Pubitemid 128081489)
-
(1998)
Lecture Notes in Computer Science
, Issue.1403
, pp. 236-250
-
-
Bellare, M.1
Garay, J.A.2
Rabin, T.3
-
6
-
-
67049095592
-
Signing a linear subspace: Signature schemes for network coding
-
Jarecki, S., Tsudik, G. (eds.). Springer, Heidelberg
-
Boneh, D., Freeman, D., Katz, J., Waters, B.: Signing a linear subspace: Signature schemes for network coding. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 68-87. Springer, Heidelberg (2009)
-
(2009)
PKC 2009. LNCS
, vol.5443
, pp. 68-87
-
-
Boneh, D.1
Freeman, D.2
Katz, J.3
Waters, B.4
-
7
-
-
44049100993
-
Signatures for network coding
-
40th Annual Conference on Information Sciences and Systems, CISS 2006, To appear in
-
Charles, D., Jain, K., Lauter, K.: Signatures for network coding. In: 40th Annual Conference on Information Sciences and Systems, CISS 2006 (2006); To appear in International Journal of Information and Coding Theory
-
(2006)
International Journal of Information and Coding Theory
-
-
Charles, D.1
Jain, K.2
Lauter, K.3
-
8
-
-
20544449877
-
Practical network coding
-
Chou, P.A., Wu, Y., Jain, K.: Practical network coding. In: 41st Allerton Conference on Communication, Control, and Computing (2003)
-
(2003)
41st Allerton Conference on Communication, Control, and Computing
-
-
Chou, P.A.1
Wu, Y.2
Jain, K.3
-
9
-
-
39049090594
-
Cooperative security for network coding file distribution
-
Gkantsidis, C., Rodriguez, P.: Cooperative security for network coding file distribution. In: Proc. of IEEE INFOCOM 2006, pp. 1-13 (2006)
-
(2006)
Proc. of IEEE INFOCOM 2006
, pp. 1-13
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
10
-
-
0142008000
-
The benefits of coding over routing in a randomized setting
-
Ho, T., Koetter, R., Médard, M., Karger, D., Effros, M.: The benefits of coding over routing in a randomized setting. In: Proc. of International Symposium on Information Theory, ISIT (2003)
-
(2003)
Proc. of International Symposium on Information Theory, ISIT
-
-
Ho, T.1
Koetter, R.2
Médard, M.3
Karger, D.4
Effros, M.5
-
11
-
-
5044242517
-
Byzantine modification detection in multicast networks using randomized network coding
-
Ho, T., Leong, B., Koetter, R., Médard, M., Effros, M., Karger, D.: Byzantine modification detection in multicast networks using randomized network coding. In: Proc. Intl. Symposium on Information Theory (ISIT), pp. 144-152 (2004)
-
(2004)
Proc. Intl. Symposium on Information Theory (ISIT)
, pp. 144-152
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Médard, M.4
Effros, M.5
Karger, D.6
-
13
-
-
33947399169
-
A random linear network coding approach to multicast
-
DOI 10.1109/TIT.2006.881746
-
Ho, T., Médard, M., Koetter, R., Karger, D.R., Effros, M., Shi, J., Leong, B.: A random linear network coding approach to multicast. IEEE Trans. Inform. Theory 52(10), 4413-4430 (2006) (Pubitemid 46445282)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.10
, pp. 4413-4430
-
-
Ho, T.1
Medard, M.2
Koetter, R.3
Karger, D.R.4
Effros, M.5
Shi, J.6
Leong, B.7
-
15
-
-
45249101743
-
Resilient network coding in the presence of Byzantine adversaries
-
Jaggi, S., Langberg, M., Katti, S., Ho, T., Katabi, D., Médard, M., Effros, M.: Resilient network coding in the presence of Byzantine adversaries. IEEE Trans. On Information Theory 54(6), 2596-2603 (2008)
-
(2008)
IEEE Trans. on Information Theory
, vol.54
, Issue.6
, pp. 2596-2603
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Médard, M.6
Effros, M.7
-
16
-
-
84944905011
-
Homomorphic signature schemes
-
Preneel, B. (ed.). Springer, Heidelberg
-
Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244-262. Springer, Heidelberg (2002)
-
(2002)
CT-RSA 2002. LNCS
, vol.2271
, pp. 244-262
-
-
Johnson, R.1
Molnar, D.2
Song, D.3
Wagner, D.4
-
17
-
-
3543050732
-
On the-fly verification of rateless erasure codes for efficient content distribution
-
Krohn, M., Freedman, M., Mazieres, D.: On the-fly verification of rateless erasure codes for efficient content distribution. In: Proc. IEEE Symposium on Security & Privacy, pp. 226-240 (2004)
-
(2004)
Proc. IEEE Symposium on Security & Privacy
, pp. 226-240
-
-
Krohn, M.1
Freedman, M.2
Mazieres, D.3
-
18
-
-
0037323073
-
Linear network coding
-
Li, S.-Y.R., Yeung, R.W., Cai, N.: Linear network coding. IEEE Trans. Inform. Theory 49(2), 371-381 (2003)
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.-Y.R.1
Yeung, R.W.2
Cai, N.3
-
19
-
-
58349118819
-
Compact proofs of retrievability
-
Pieprzyk, J. (ed.). Springer, Heidelberg
-
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008)
-
(2008)
ASIACRYPT 2008. LNCS
, vol.5350
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
20
-
-
51349130622
-
An efficient signature-based scheme for securing network coding against pollution attacks
-
Yu, Z., Wei, Y., Ramkumar, B., Guan, Y.: An efficient signature-based scheme for securing network coding against pollution attacks. In: INFOCOM (2008)
-
(2008)
INFOCOM
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
21
-
-
51649125221
-
Signatures for content distribution with network coding
-
Zhao, F., Kalker, T., Médard, M., Han, K.: Signatures for content distribution with network coding. In: Proc. Intl. Symp. on Information Theory ISIT (2007)
-
(2007)
Proc. Intl. Symp. on Information Theory ISIT
-
-
Zhao, F.1
Kalker, T.2
Médard, M.3
Han, K.4
|