-
1
-
-
0034229404
-
Network information flow
-
R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, "Network information flow," IEEE Trans. Inf. Theory, vol. IT-46, pp. 1204-1216, 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.IT-46
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
3
-
-
85062838317
-
Safeguarding cryptographic keys
-
G. R. Blakley, "Safeguarding cryptographic keys," in Proc. Nat. Comput. Conf., 1979, vol. 48, pp. 313-317.
-
(1979)
Proc. Nat. Comput. Conf.
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
4
-
-
70449473610
-
Valuable messages and random outputs of channels in linear network coding
-
presented at the, Seoul, Korea, Jun. 28-Jul. 3
-
N. Cai, "Valuable messages and random outputs of channels in linear network coding," presented at the IEEE Int. Symp. Inf. Theory 2009, Seoul, Korea, Jun. 28-Jul. 3, 2009.
-
(2009)
IEEE Int. Symp. Inf. Theory 2009
-
-
Cai, N.1
-
5
-
-
0036353798
-
Secure network coding
-
presented at the, Lausanne, Switzerland, Jun. 30-Jul. 5
-
N. Cai and R. W. Yeung, "Secure network coding," presented at the IEEE Int. Symp. Inf. Theory, Lausanne, Switzerland, Jun. 30-Jul. 5, 2002.
-
(2002)
IEEE Int. Symp. Inf. Theory
-
-
Cai, N.1
Yeung, R.W.2
-
6
-
-
51649104348
-
A security condition for multi-source linear network coding
-
presented at the, Nice, France, Jun. 24-29
-
N. Cai and R. W. Yeung, "A security condition for multi-source linear network coding," presented at the IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 24-29, 2007.
-
(2007)
IEEE Int. Symp. Inf. Theory
-
-
Cai, N.1
Yeung, R.W.2
-
7
-
-
38349083344
-
Network error correction, Part II: Lower bounds
-
N. Cai and R. W. Yeung, "Network error correction, Part II: Lower bounds," Commun. Inf. Syst., vol. 6, pp. 37-54, 2006.
-
(2006)
Commun. Inf. Syst.
, vol.6
, pp. 37-54
-
-
Cai, N.1
Yeung, R.W.2
-
8
-
-
77956363785
-
Capacity bounds for secure network coding
-
presented at the, Christchurch, New Zealand, Jan. 30-Feb. 1
-
T. Chan and A. Grant, "Capacity bounds for secure network coding," presented at the Austral. Commun. Theory Workshop, Christchurch, New Zealand, Jan. 30-Feb. 1, 2008.
-
(2008)
Austral. Commun. Theory Workshop
-
-
Chan, T.1
Grant, A.2
-
10
-
-
51649109673
-
On wiretap networks II
-
presented at the, Nice, France, Jun. 24-29
-
S. Y. El Rouayheb and E. Soljanin, "On wiretap networks II," presented at the IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 24-29, 2007.
-
(2007)
IEEE Int. Symp. Inf. Theory
-
-
El Rouayheb, S.Y.1
Soljanin, E.2
-
11
-
-
33846206172
-
On the capacity of secure network coding
-
presented at the, Monticello, IL, Sep. 29-Oct. 1
-
J. Feldman, T. Malkin, C. Stein, and R. A. Servedio, "On the capacity of secure network coding," presented at the 42nd Ann. Allerton Conf. Commun., Contr., Comput., Monticello, IL, Sep. 29-Oct. 1, 2004.
-
(2004)
42nd Ann. Allerton Conf. Commun., Contr., Comput.
-
-
Feldman, J.1
Malkin, T.2
Stein, C.3
Servedio, R.A.4
-
13
-
-
0001049514
-
Nonnegative entropy measures of multivariate symmetric correlations
-
T. S. Han, "Nonnegative entropy measures of multivariate symmetric correlations," Inf. Contr., vol. 36, pp. 133-156, 1978.
-
(1978)
Inf. Contr.
, vol.36
, pp. 133-156
-
-
Han, T.S.1
-
14
-
-
70449482308
-
Strongly secure linear network coding
-
Oct.
-
K. Harada and H. Yamamoto, "Strongly secure linear network coding," EICE Trans. Fundament., vol. E91-A, no. 10, pp. 2720-2728, Oct. 2008.
-
(2008)
EICE Trans. Fundament.
, vol.E91-A
, Issue.10
, pp. 2720-2728
-
-
Harada, K.1
Yamamoto, H.2
-
15
-
-
33947399169
-
A random linear network coding approach to multicast
-
DOI 10.1109/TIT.2006.881746
-
T. Ho, M. Médard, R. Koetter, D. Karger, M. Effros, J. Shi, and B. Leong, "A random linear network coding approach to multicast," IEEE Trans. Inf. Theory, vol. 52, pp. 4413-4430, Oct. 2006. (Pubitemid 46445282)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.10
, pp. 4413-4430
-
-
Ho, T.1
Medard, M.2
Koetter, R.3
Karger, D.R.4
Effros, M.5
Shi, J.6
Leong, B.7
-
16
-
-
20544473127
-
Polynomial time algorithms for multicast network code construction
-
S. Jaggi, P. Sanders, P. A. Chou, M. Effros, S. Egner, K. Jain, and L. Tolhuizen, "Polynomial time algorithms for multicast network code construction," IEEE Trans. Inf. Theory, vol. IT-51, pp. 1973-1982, 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.IT-51
, pp. 1973-1982
-
-
Jaggi, S.1
Sanders, P.2
Chou, P.A.3
Effros, M.4
Egner, S.5
Jain, K.6
Tolhuizen, L.7
-
17
-
-
1842815876
-
Security based on network topology against the wiretapping attack
-
Feb.
-
K. Jain, "Security based on network topology against the wiretapping attack," IEEE Wireless Commun., pp. 68-71, Feb. 2004.
-
(2004)
IEEE Wireless Commun
, pp. 68-71
-
-
Jain, K.1
-
18
-
-
0037323073
-
Linear network coding
-
S.-Y. R. Li, R. W. Yeung, and N. Cai, "Linear network coding," IEEE Trans. Inf. Theory, vol. 49, pp. 371-381, 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, pp. 371-381
-
-
Li, S.-Y.R.1
Yeung, R.W.2
Cai, N.3
-
19
-
-
51649118865
-
Random linear network coding: A free cipher?
-
presented at the, Nice, France, Jun. 24-29
-
L. Lima, M. Médard, and J. Barros, "Random linear network coding: A free cipher?," presented at the IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 24-29, 2007.
-
(2007)
IEEE Int. Symp. Inf. Theory
-
-
Lima, L.1
Médard, M.2
Barros, J.3
-
20
-
-
77950823812
-
Network generalized Hamming weight
-
presented at the, Lausanne, Switzerland
-
C.-K. Ngai, R. W. Yeung, and Z. Zhang, "Network generalized Hamming weight," presented at the 2009 Workshop on Network Coding, Theory Appl., Lausanne, Switzerland, 2009.
-
(2009)
2009 Workshop on Network Coding, Theory Appl.
-
-
Ngai, C.-K.1
Yeung, R.W.2
Zhang, Z.3
-
21
-
-
77950848164
-
Secure error-correcting (SEC) network codes
-
presented at the, Lausanne, Switzerland
-
C.-K. Ngai and R. W. Yeung, "Secure error-correcting (SEC) network codes," presented at the 2009 Workshop on Network Coding, Theory and Appl., Lausanne, Switzerland, 2009.
-
(2009)
2009 Workshop on Network Coding, Theory and Appl.
-
-
Ngai, C.-K.1
Yeung, R.W.2
-
23
-
-
78650891351
-
Secure network coding with a cost criterion
-
presented at the, Boston, MA, Apr.
-
J. Tan and M. Médard, "Secure network coding with a cost criterion," presented at the 2ndWorkshop on Network Coding, Theory and Appl., Boston, MA, Apr. 2006.
-
(2006)
2ndWorkshop on Network Coding, Theory and Appl.
-
-
Tan, J.1
Médard, M.2
-
24
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
25
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Sys. Tech. J., vol. 28, pp. 656-715, 1949.
-
(1949)
Bell Sys. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
26
-
-
0026219389
-
Generalized Hamming weight for linear codes
-
Sep.
-
V. K. Wei, "Generalized Hamming weight for linear codes," IEEE Trans. Inf. Theory, vol. 37, pp. 1412-1418, Sep. 1991.
-
(1991)
IEEE Trans. Inf. Theory
, vol.37
, pp. 1412-1418
-
-
Wei, V.K.1
-
29
-
-
38349097767
-
Network error correction, Part I: Basic concepts and upper bounds
-
R. W. Yeung and N. Cai, "Network error correction, Part I: Basic concepts and upper bounds," Commun. Inf. Syst., vol. 6, pp. 19-36, 2006.
-
(2006)
Commun. Inf. Syst.
, vol.6
, pp. 19-36
-
-
Yeung, R.W.1
Cai, N.2
-
30
-
-
52349100761
-
On the optimality of a construction of secure network codes
-
presented at the, Toronto, ON, Canada, Jul. 6-11
-
R. W. Yeung and N. Cai, "On the optimality of a construction of secure network codes," presented at the IEEE Int. Symp. Inf. Theory, Toronto, ON, Canada, Jul. 6-11, 2008.
-
(2008)
IEEE Int. Symp. Inf. Theory
-
-
Yeung, R.W.1
Cai, N.2
-
31
-
-
33846198316
-
Network coding theory
-
R. W. Yeung, S.-Y. R. Li, N. Cai, and Z. Zhang, "Network coding theory," Found. Trends in Commun. Inf. Theory, vol. 2, no. 4 and 5, pp. 241-381, 2005.
-
(2005)
Found. Trends in Commun. Inf. Theory
, vol.2
, Issue.4-5
, pp. 241-381
-
-
Yeung, R.W.1
Li, S.-Y.R.2
Cai, N.3
Zhang, Z.4
-
32
-
-
70449513043
-
A general security condition for multisource linear network coding
-
presented at the, Seoul, Korea, Jun. 28-Jul. 3
-
Z. Zhang and R. W. Yeung, "A general security condition for multisource linear network coding," presented at the IEEE Int. Symp. Inf. Theory, Seoul, Korea, Jun. 28-Jul. 3, 2009.
-
(2009)
IEEE Int. Symp. Inf. Theory
-
-
Zhang, Z.1
Yeung, R.W.2
|