-
1
-
-
38549121414
-
ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks
-
DOI 10.1109/ICC.2007.211, 4288882, 2007 IEEE International Conference on Communications, ICC'07
-
X. Lin, R. Lu, H. Zhu, P.-H. Ho, X. Shen, and Z. Cao, "ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks," in Proc. IEEE ICC'07, pp. 1247-1253, 2007. (Pubitemid 351145708)
-
(2007)
IEEE International Conference on Communications
, pp. 1247-1253
-
-
Lin, X.1
Lu, R.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
Cao, Z.6
-
2
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards statistically strong source anonymity for sensor networks," in Proc. IEEE INFOCOM'08, pp. 51-55, 2008.
-
(2008)
Proc.IEEE INFOCOM'08
, pp. 51-55
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
3
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
Nov.
-
M. K. Reiter and A. D. Rubin, "Crowds: Anonymity for web transactions," ACM Trans. Inf. and System Security, vol. 1, no. 1, pp. 66-92, Nov. 1998.
-
(1998)
ACM Trans. Inf. and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
5
-
-
0038041177
-
Introducing morphmix: Peer-to-peer based anonymous Internet usage with collusion detection
-
M. Rennhard and B. Plattner, "Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection," in Proc. ACM Workshop on Privacy in the Electronic Society, pp. 91-102, 2002.
-
(2002)
Proc. ACM Workshop on Privacy in the Electronic Society
, pp. 91-102
-
-
Rennhard, M.1
Plattner, B.2
-
6
-
-
0037810717
-
Mixminion: Design of a type III anonymous remailer protocol
-
May
-
G. Danezis, R. Dingledine, and N. Mathewson, "Mixminion: design of a type III anonymous remailer protocol," in Proc. IEEE Symposium on Security and Privacy, pp. 2-15, May 2003.
-
(2003)
Proc. IEEE Symposium on Security and Privacy
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
7
-
-
0005063385
-
Onion routing for anonymous and private Internet connections
-
Feb.
-
D. Goldschlag, M. Reed, and P. Syverson, "Onion routing for anonymous and private Internet connections," Commun. ACM, vol. 42, no. 2, pp. 39-41, Feb. 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
8
-
-
34547484913
-
Achieving privacy in mesh networks
-
DOI 10.1145/1180345.1180348, Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
X. Wu and N. Li, "Achieving privacy in mesh networks," in Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'06), pp. 13-22, 2006. (Pubitemid 47168555)
-
(2006)
Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 13-22
-
-
Wu, X.1
Li, N.2
-
9
-
-
0034229404
-
Network information flow,"
-
July
-
R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, "Network information flow," IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1204-1216, July 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
10
-
-
33947399169
-
A random linear network coding approach to multicast
-
DOI 10.1109/TIT.2006.881746
-
T. Ho, M. Medard, R. Koetter, D. R. Karger, M. Effros, J. Shi, and B. Leong, "A random linear network coding approach to multicast," IEEE Trans. Inf. Theory, vol. 52, no. 10, pp. 4413-4430, 2006. (Pubitemid 46445282)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.10
, pp. 4413-4430
-
-
Ho, T.1
Medard, M.2
Koetter, R.3
Karger, D.R.4
Effros, M.5
Shi, J.6
Leong, B.7
-
11
-
-
0037323073
-
Linear network coding
-
S.-Y. R. Li, R. W. Yeung, and C. Ning, "Linear network coding," IEEE Trans. Inf. Theory, vol. 49, no. 2, pp. 371-381, 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.-Y.R.1
Yeung, R.W.2
Ning, C.3
-
12
-
-
0037703307
-
Polynomial time algorithms for network information flow
-
P. Sanders, S. Egner, and L. Tolhuizen, "Polynomial time algorithms for network information flow," in Proc. 15th ACM Symposium on Parallel Algorithms and Architectures (SPAA'03), pp. 286-294, 2003.
-
(2003)
Proc. 15th ACM Symposium on Parallel Algorithms and Architectures (SPAA'03)
, pp. 286-294
-
-
Sanders, P.1
Egner, S.2
Tolhuizen, L.3
-
13
-
-
36348977584
-
Network coding in live peer-to-peer streaming
-
DOI 10.1109/TMM.2007.907460
-
M. Wang and B. Li, "Network coding in live peer-to-peer streaming," IEEE Trans. Multimedia, vol. 9, no. 8, pp. 1554-1567, 2007. (Pubitemid 350157897)
-
(2007)
IEEE Transactions on Multimedia
, vol.9
, Issue.8
, pp. 1554-1567
-
-
Wang, M.1
Li, B.2
-
14
-
-
34548355193
-
Location-aware security services for wireless sensor networks using network coding
-
DOI 10.1109/INFCOM.2007.146, 4215728, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
E. Ayday, F. Delgosha, and F. Fekri, "Location-aware security services for wireless sensor networks using network coding," in Proc. IEEE INFOCOM '07, pp. 1226-1234, 2007. (Pubitemid 47334346)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 1226-1234
-
-
Ayday, E.1
Delgosha, F.2
Fekri, F.3
-
15
-
-
47949101718
-
On network coding for security
-
K. Han, T. Ho, R. Koetter, M. Medard, and F. Zhao, "On network coding for security," in Proc. IEEE MILCOM '07, pp. 1-6, 2007.
-
(2007)
Proc. IEEE MILCOM '07
, pp. 1-6
-
-
Han, K.1
Ho, T.2
Koetter, R.3
Medard, M.4
Zhao, F.5
-
16
-
-
33745135399
-
On achieving maximum multicast throughput in undirected networks
-
DOI 10.1109/TIT.2006.874515
-
Z. Li, B. Li, and L. C. Lau, "On achieving maximum multicast throughput in undirected networks," IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2467-2485, June 2006. (Pubitemid 43898904)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.6
, pp. 2467-2485
-
-
Li, Z.1
Li, B.2
Lau, L.C.3
-
17
-
-
28844481518
-
Minimum-energy multicast in mobile ad hoc networks using network coding
-
DOI 10.1109/TCOMM.2005.857148
-
Y. Wu, P. A. Chou, and S.-Y. Kung, "Minimum-energy multicast in mobile ad hoc networks using network coding," IEEE Trans. Commun., vol. 53, no. 11, pp. 1906-1918, Nov. 2005. (Pubitemid 41763708)
-
(2005)
IEEE Transactions on Communications
, vol.53
, Issue.11
, pp. 1906-1918
-
-
Wu, Y.1
Chou, P.A.2
Kung, S.-Y.3
-
18
-
-
85032750989
-
Network coding for the internet and wireless networks
-
DOI 10.1109/MSP.2007.904818
-
P. A. Chou and Y. Wu, "Network coding for the Internet and wireless networks," IEEE Signal Process. Mag., vol. 24, no. 5, pp. 77-85, Sep. 2007. (Pubitemid 350130507)
-
(2007)
IEEE Signal Processing Magazine
, vol.24
, Issue.5
, pp. 77-85
-
-
Chou, P.A.1
Wu, Y.2
-
19
-
-
70349659577
-
Dependable and secure sensor data storage with dynamic integrity assurance
-
Rio de Janeiro, Brazil Apr.
-
Q. Wang, K. Ren, W. Lou, and Y. Zhang, "Dependable and secure sensor data storage with dynamic integrity assurance," in Proc. IEEE INFOCOM'09, Rio de Janeiro, Brazil, Apr. 2009.
-
(2009)
Proc. IEEE INFOCOM'09
-
-
Wang, Q.1
Ren, K.2
Lou, W.3
Zhang, Y.4
-
20
-
-
67650593875
-
Training overhead for decoding random linear network codes in wireless networks
-
M. Riemensberger, Y. E. Sagduyu, M. L. Honig, and W. Utschick, "Training overhead for decoding random linear network codes in wireless networks," IEEE J. Sel. Areas Commun., vol. 27, no. 5, pp. 729-737, 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.5
, pp. 729-737
-
-
Riemensberger, M.1
Sagduyu, Y.E.2
Honig, M.L.3
Utschick, W.4
-
21
-
-
38349140937
-
Linear network error correction codes in packet networks,"
-
Z. Zhang, "Linear network error correction codes in packet networks," IEEE Trans. Inf. Theory, vol. 54, no. 1, pp. 209-218, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.1
, pp. 209-218
-
-
Zhang, Z.1
-
22
-
-
48849089497
-
Coding for errors and erasures in random network coding
-
R. Koetter and F. R. Kschischang, "Coding for errors and erasures in random network coding," IEEE Trans. Inf. Theory, vol. 54, no. 8, pp. 3579-3591, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.8
, pp. 3579-3591
-
-
Koetter, R.1
Kschischang, F.R.2
-
23
-
-
70349682315
-
An efficient privacy-preserving scheme against traffic analysis attacks in network coding
-
Rio de Janeiro, Brazil Apr.
-
Y. Fan, Y. Jiang, H. Zhu, and X. Shen, "An efficient privacy-preserving scheme against traffic analysis attacks in network coding," in Proc. IEEE INFOCOM'09, Rio de Janeiro, Brazil, Apr. 2009.
-
(2009)
Proc. IEEE INFOCOM'09
-
-
Fan, Y.1
Jiang, Y.2
Zhu, H.3
Shen, X.4
-
25
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuocity classes
-
P. Paillier, "Public-key cryptosystems based on composite degree residuocity classes," in Proc. EUROCRYPT'99, vol. 1592, pp. 223-238, 1999.
-
(1999)
Proc. EUROCRYPT'99
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
26
-
-
77951134439
-
An informationtheoretic cryptanalysis of network coding-is protecting the code enough?
-
L. Lima, J. P. Vilela, J. Barros, and M. Medard, "An informationtheoretic cryptanalysis of network coding-is protecting the code enough?" in Proc. ISITA'08, pp. 1-6, 2008.
-
(2008)
Proc. ISITA'08
, pp. 1-6
-
-
Lima, L.1
Vilela, J.P.2
Barros, J.3
Medard, M.4
-
28
-
-
33748118047
-
Group key management protocols: A novel taxonomy
-
Y. Challal and H. Seba, "Group key management protocols: A novel taxonomy," International J. Inf. Technol., vol. 2, pp. 105-119, 2005.
-
(2005)
International J. Inf. Technol.
, vol.2
, pp. 105-119
-
-
Challal, Y.1
Seba, H.2
-
29
-
-
51349130622
-
An efficient signature-based scheme for securing network coding against pollution attacks
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient signature-based scheme for securing network coding against pollution attacks," in Proc. IEEE INFOCOM, 2008.
-
(2008)
Proc. IEEE INFOCOM
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
30
-
-
39049090594
-
Cooperative security for network coding file distribution
-
C. Gkantsidis and P. R. Rodriguez, "Cooperative security for network coding file distribution," in Proc. IEEE INFOCOM'06, pp. 1-13, 2006.
-
(2006)
Proc. IEEE INFOCOM'06
, pp. 1-13
-
-
Gkantsidis, C.1
Rodriguez, P.R.2
-
31
-
-
69249229584
-
Secure network coding for wireless mesh networks: Threats, challenges, and directions
-
Nov.
-
J. Dong, R. Curtmola, and C. Nita-Rotaru, "Secure network coding for wireless mesh networks: threats, challenges, and directions," Computer Commun. (Elsevier), vol. 32, no. 17, pp. 1790-1801, Nov. 2009.
-
(2009)
Computer Commun. (Elsevier)
, vol.32
, Issue.17
, pp. 1790-1801
-
-
Dong, J.1
Curtmola, R.2
Nita-Rotaru, C.3
-
33
-
-
45249101743
-
Resilient network coding in the presence of Byzantine adversaries,"
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, M. Medard, and M. Effros, "Resilient network coding in the presence of Byzantine adversaries," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2596-2603, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2596-2603
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Medard, M.6
Effros, M.7
-
34
-
-
73449142510
-
Secure network coding with minimum overhead based on hash functions
-
M. Adeli and H. Liu, "Secure network coding with minimum overhead based on hash functions," IEEE Commun. Lett., vol. 13, no. 12, pp. 956-958, 2009.
-
(2009)
IEEE Commun. Lett.
, vol.13
, Issue.12
, pp. 956-958
-
-
Adeli, M.1
Liu, H.2
|