-
1
-
-
0034229404
-
Network information flow
-
Ahlswede, R., Cai, N., Li, S., Yeung, R.: Network Information Flow. IEEE Trans. on Information Theory 46, 1204-1216 (2000)
-
(2000)
IEEE Trans. on Information Theory
, vol.46
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.3
Yeung, R.4
-
2
-
-
68849097857
-
Homomorphic MACs: MAC-based integrity for network coding
-
Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. Springer, Heidelberg
-
Agrawal, S., Boneh, D.: Homomorphic MACs: MAC-Based Integrity for Network Coding. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 292-305. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5536
, pp. 292-305
-
-
Agrawal, S.1
Boneh, D.2
-
3
-
-
79952505869
-
Preventing pollution attacks in multi-source network coding
-
Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
-
Agrawal, S., Boneh, D., Boyen, X., Freeman, D.: Preventing Pollution Attacks in Multi-source Network Coding. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 161-176. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6056
, pp. 161-176
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
Freeman, D.4
-
4
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM CCS 1993, pp. 62-73 (1993)
-
(1993)
ACM CCS 1993
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
35048841300
-
Efficient selective-ID secure identity-based encryption without random oracles
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Boneh, D., Boyen, X.: Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
6
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. Journal of Computing 32(3), 586-615 (2003);
-
(2003)
Journal of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
84874324906
-
Identity-Based Encryption from theWeil Pairing
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-Based Encryption from theWeil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
67049095592
-
Signing a Linear Subspace: Signature Schemes for Network Coding
-
Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
-
Boneh, D., Freeman, D., Katz, J., Waters, B.: Signing a Linear Subspace: Signature Schemes for Network Coding. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 68-87. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 68-87
-
-
Boneh, D.1
Freeman, D.2
Katz, J.3
Waters, B.4
-
9
-
-
58349086247
-
Generalized identity based and broadcast encryption schemes
-
Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
-
Boneh, D., Hamburg, M.: Generalized Identity Based and Broadcast Encryption Schemes. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 455-470. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 455-470
-
-
Boneh, D.1
Hamburg, M.2
-
12
-
-
77954639466
-
Converting pairing-based cryptosystems from composite-order groups to prime-order groups
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Freeman, D.: Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 44-61. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 44-61
-
-
Freeman, D.1
-
13
-
-
78649897589
-
Secure network coding over the integers
-
Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
-
Gennaro, R., Katz, J., Krawczyk, H., Rabin, T.: Secure Network Coding over the Integers. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 142-160. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6056
, pp. 142-160
-
-
Gennaro, R.1
Katz, J.2
Krawczyk, H.3
Rabin, T.4
-
14
-
-
25644448947
-
Network coding for large scale content distribution
-
Gkantsidis, C., Rodriguez, P.: Network Coding for Large Scale Content Distribution. In: IEEE INFOCOM (2005)
-
(2005)
IEEE INFOCOM
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
15
-
-
5044242517
-
Byzantine Modification Detection in Multicast Networks using Randomized Network Coding
-
Ho, T., Leong, B., Koetter, R., Ḿedard, M., Effros, M., Karger, D.: Byzantine Modification Detection in Multicast Networks using Randomized Network Coding. In: International Symposium on Information Theory (ISIT), pp. 144-152 (2004)
-
(2004)
International Symposium on Information Theory (ISIT
, pp. 144-152
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Ḿedard, M.4
Effros, M.5
Karger, D.6
-
16
-
-
45249101743
-
Resilient network coding in the presence of byzantine adversaries
-
Jaggi, S., Langberg, M., Katti, S., Ho, T., Katabi, D., Ḿedard, M., Effros, M.: Resilient Network Coding in the Presence of Byzantine Adversaries. IEEE Trans. on Information Theory 54, 2596-2603 (2008)
-
(2008)
IEEE Trans. on Information Theory
, vol.54
, pp. 2596-2603
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Ḿedard, M.6
Effros, M.7
-
17
-
-
3543050732
-
On-the-fly verification of rateless erasure codes for efficient content distribution
-
Krohn, M., Freedman, M., Mazieres, D.: On-the-fly Verification of Rateless Erasure Codes for Efficient Content Distribution. In: IEEE Symposium on Security and Privacy, pp. 226-240 (2004)
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 226-240
-
-
Krohn, M.1
Freedman, M.2
Mazieres, D.3
-
18
-
-
77949581448
-
New techniques for dual system encryption and fully secure HIBE with short ciphertexts
-
Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
-
Lewko, A., Waters, B.: New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 455-479. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5978
, pp. 455-479
-
-
Lewko, A.1
Waters, B.2
-
19
-
-
0037323073
-
Linear network coding
-
Li, S.-Y.-R., Yeung, R.-W., Cai, N.: Linear Network Coding. IEEE Trans. on Information Theory 49, 371-381 (2003)
-
(2003)
IEEE Trans. on Information Theory
, vol.49
, pp. 371-381
-
-
Li, S.-Y.-R.1
Yeung, R.-W.2
Cai, N.3
-
20
-
-
77953301246
-
RIPPLE authentication for network coding
-
Li, Y., Yao, H., Chen, M., Jaggi, S., Rosen, A.: RIPPLE Authentication for Network Coding. In: IEEE INFOCOM 2010 (2010)
-
(2010)
IEEE INFOCOM 2010
-
-
Li, Y.1
Yao, H.2
Chen, M.3
Jaggi, S.4
Rosen, A.5
-
21
-
-
84944905011
-
Homomorphic signature schemes
-
Preneel, B. (ed.) CT-RSA 2002. Springer, Heidelberg
-
Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic Signature Schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244-262. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2271
, pp. 244-262
-
-
Johnson, R.1
Molnar, D.2
Song, D.3
Wagner, D.4
-
22
-
-
67049087745
-
Identification of multiple invalid signatures in pairing-based batched signatures
-
Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
-
Matt, B.: Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 337-356. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 337-356
-
-
Matt, B.1
-
23
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
24
-
-
24944566040
-
Efficient Identity-Based Encryption without random oracles
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Waters, B.: Efficient Identity-Based Encryption Without Random Oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005) (Pubitemid 41313949)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
25
-
-
70350345210
-
Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-636. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 619-636
-
-
Waters, B.1
-
26
-
-
51649125221
-
Signatures for content distribution with network coding
-
Zhao, F., Kalker, T., Ḿedard, M., Han, K.: Signatures for Content Distribution with Network Coding. In: International Symposium on Information Theory (ISIT) (2007)
-
(2007)
International Symposium on Information Theory (ISIT)
-
-
Zhao, F.1
Kalker, T.2
Ḿedard, M.3
Han, K.4
|