-
1
-
-
0026219389
-
Generalized Hamming weight for linear codes
-
Sep.
-
V. K. Wei, "Generalized Hamming weight for linear codes," IEEE Trans. Inf. Theory, vol. 37, no. 6, pp. 1412-1418, Sep. 1991.
-
(1991)
IEEE Trans. Inf. Theory
, vol.37
, Issue.6
, pp. 1412-1418
-
-
Wei, V.K.1
-
3
-
-
85062838317
-
Safeguarding cryptographic keys
-
G. R. Blakley, "Safeguarding cryptographic keys," in Proc. National Computer Conf., 1979, vol. 48, pp. 313-317.
-
(1979)
Proc. National Computer Conf.
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
4
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," in Commun. ACM, 1979, vol. 22, pp. 612-613.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
7
-
-
20544473127
-
Polynomial time algorithms for multicast network code construction
-
Jun.
-
S. Jaggi et al., "Polynomial time algorithms for multicast network code construction," IEEE Trans. Inf. Theory, vol. 51, no. 6, pp. 1973-1982, Jun. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.6
, pp. 1973-1982
-
-
Jaggi, S.1
-
13
-
-
33746357208
-
Maximum distance q-nary codes
-
Apr.
-
R. C. Singleton, "Maximum distance q-nary codes," IEEE Trans. Inf. Theory, vol. IT-10, no. 2, pp. 116-118, Apr. 1964.
-
(1964)
IEEE Trans. Inf. Theory
, vol.IT-10
, Issue.2
, pp. 116-118
-
-
Singleton, R.C.1
-
14
-
-
38349097767
-
Network error correction, Part I: Basic concepts and upper bounds
-
R. W. Yeung and N. Cai, "Network error correction, Part I: Basic concepts and upper bounds," Commun. Info. and Syst., vol. 6, pp. 19-36, 2006.
-
(2006)
Commun. Info. and Syst.
, vol.6
, pp. 19-36
-
-
Yeung, R.W.1
Cai, N.2
-
15
-
-
38349083344
-
Network error correction, Part II: Lower bounds
-
N. Cai and R. W. Yeung, "Network error correction, Part II: Lower bounds," Commun. Info. and Syst., vol. 6, pp. 37-54, 2006.
-
(2006)
Commun. Info. and Syst.
, vol.6
, pp. 37-54
-
-
Cai, N.1
Yeung, R.W.2
-
16
-
-
58349107919
-
Network coding: A computational perspective
-
Jan.
-
M. Langberg, A. Sprintson, and J. Bruck, "Network coding: A computational perspective," IEEE Trans. Inf. Theory, vol. 55, no. 1, pp. 147-157, Jan. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.1
, pp. 147-157
-
-
Langberg, M.1
Sprintson, A.2
Bruck, J.3
-
17
-
-
78650893906
-
Secure network coding in wiretap network
-
submitted for publication
-
N. Cai and R. W. Yeung, "Secure network coding in wiretap network," IEEE Trans. Inf. Theory., submitted for publication.
-
IEEE Trans. Inf. Theory
-
-
Cai, N.1
Yeung, R.W.2
-
19
-
-
47849109698
-
Characterizations of network error correction/ detection and erausre correction
-
San Diego, CA, Jan.
-
S. Yang and R. W. Yeung, "Characterizations of network error correction/ detection and erausre correction," in Proc. 3rd Workshop on Network Coding, Theory, and Applications (NetCod 2007), San Diego, CA, Jan. 2007.
-
(2007)
Proc. 3rd Workshop on Network Coding, Theory, and Applications (NetCod 2007)
-
-
Yang, S.1
Yeung, R.W.2
-
20
-
-
46749113890
-
Weight properties of network codes
-
S. Yang, R. W. Yeung, and Z. Zhang, "Weight properties of network codes," Eur. Trans. Telecomm., vol. 19, pp. 371-383, 2008.
-
(2008)
Eur. Trans. Telecomm.
, vol.19
, pp. 371-383
-
-
Yang, S.1
Yeung, R.W.2
Zhang, Z.3
|