-
1
-
-
70349682315
-
An efficient privacy-preserving scheme against traffic analysis attacks in network coding
-
Y. Fan, Y. Jiang, H. Zhu and X. Shen, An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding, IEEE INFOCOM, 2009.
-
(2009)
IEEE INFOCOM
-
-
Fan, Y.1
Jiang, Y.2
Zhu, H.3
Shen, X.4
-
2
-
-
0034229404
-
Network information flow
-
R. Ahlswede, N. Cai, S.-Y.R. Li and R.W. Yeung, Network information flow, IEEE Transactions on Information Theory, vol. 46, no. 4, pp. 1204-1216, 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
3
-
-
77953319343
-
P-coding: Secure network coding against eavesdropping attacks
-
P. Zhang, Y. Jiang, C. Lin, Y. Fan and X. Shen, P-Coding: Secure Network Coding against Eavesdropping Attacks, IEEE INFOCOM, 2010.
-
(2010)
IEEE INFOCOM
-
-
Zhang, P.1
Jiang, Y.2
Lin, C.3
Fan, Y.4
Shen, X.5
-
4
-
-
35148866571
-
Performance of network coding in ad hoc networks
-
J.S. Park, D.S. Lum, F. Soldo, M. Gerla and M. Medard, Performance of Network Coding in Ad Hoc Networks, IEEE Military Communications Conference (MILCOM), 2006.
-
(2006)
IEEE Military Communications Conference (MILCOM)
-
-
Park, J.S.1
Lum, D.S.2
Soldo, F.3
Gerla, M.4
Medard, M.5
-
7
-
-
45749150357
-
XORs in the air: Practical wireless network coding
-
S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard and J. Crowcroft, XORs in the Air: Practical Wireless Network Coding, IEEE/ACM Transactions on Networking, vol. 16, no. 3, pp. 497-510, 2008.
-
(2008)
IEEE/ACM Transactions on Networking
, vol.16
, Issue.3
, pp. 497-510
-
-
Katti, S.1
Rahul, H.2
Hu, W.3
Katabi, D.4
Medard, M.5
Crowcroft, J.6
-
10
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
T. El Gamal, A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Transactions on Information Theory, vol. 31, no. 4, pp469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
El Gamal, T.1
-
11
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, EUROCRYPT 1999.
-
EUROCRYPT 1999
-
-
Paillier, P.1
-
12
-
-
51349130622
-
An efficient signature-based scheme for securing network coding against pollution attacks
-
Z. Yu, Y. Wei, B. Ramkumar and Y. Guan, An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks, IEEE INFOCOM 2008.
-
IEEE INFOCOM 2008
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
14
-
-
0242334165
-
A algebraic approach to network coding
-
Oct.
-
R. Koetter and M. Medard, An Algebraic Approach to Network Coding, IEEE/ACM Transactions on Networking, vol. 11, no. 5, pp. 782-795, Oct. 2003.
-
(2003)
IEEE/ACM Transactions on Networking
, vol.11
, Issue.5
, pp. 782-795
-
-
Koetter, R.1
Medard, M.2
-
16
-
-
0037323073
-
Linear network coding
-
Feb.
-
S.-Y.R. Li, R.W. Yeung and Ning Cai, Linear network coding, Information Theory, IEEE Transactions on, vol.49, no.2, pp.371-381, Feb. 2003.
-
(2003)
Information Theory, IEEE Transactions on
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.-Y.R.1
Yeung, R.W.2
Cai, N.3
|