메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1012-1017

SANC: Source authentication using network coding

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION INFORMATION; AUTHENTICATION SCHEME; CODING PERFORMANCE; MAPPING FUNCTIONS; MULTICAST SCENARIOS; PACKET HEADER; PARITY BITS; REGULAR NETWORKS; SCALABLE NETWORKS; SECURITY ANALYSIS; SIMULATION RESULT; SOURCE AUTHENTICATION;

EID: 79960595492     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOMW.2011.5928775     Document Type: Conference Paper
Times cited : (3)

References (17)
  • 1
    • 70349682315 scopus 로고    scopus 로고
    • An efficient privacy-preserving scheme against traffic analysis attacks in network coding
    • Y. Fan, Y. Jiang, H. Zhu and X. Shen, An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding, IEEE INFOCOM, 2009.
    • (2009) IEEE INFOCOM
    • Fan, Y.1    Jiang, Y.2    Zhu, H.3    Shen, X.4
  • 3
    • 77953319343 scopus 로고    scopus 로고
    • P-coding: Secure network coding against eavesdropping attacks
    • P. Zhang, Y. Jiang, C. Lin, Y. Fan and X. Shen, P-Coding: Secure Network Coding against Eavesdropping Attacks, IEEE INFOCOM, 2010.
    • (2010) IEEE INFOCOM
    • Zhang, P.1    Jiang, Y.2    Lin, C.3    Fan, Y.4    Shen, X.5
  • 10
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • T. El Gamal, A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Transactions on Information Theory, vol. 31, no. 4, pp469-472, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • El Gamal, T.1
  • 11
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, EUROCRYPT 1999.
    • EUROCRYPT 1999
    • Paillier, P.1
  • 12
    • 51349130622 scopus 로고    scopus 로고
    • An efficient signature-based scheme for securing network coding against pollution attacks
    • Z. Yu, Y. Wei, B. Ramkumar and Y. Guan, An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks, IEEE INFOCOM 2008.
    • IEEE INFOCOM 2008
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4
  • 14
    • 0242334165 scopus 로고    scopus 로고
    • A algebraic approach to network coding
    • Oct.
    • R. Koetter and M. Medard, An Algebraic Approach to Network Coding, IEEE/ACM Transactions on Networking, vol. 11, no. 5, pp. 782-795, Oct. 2003.
    • (2003) IEEE/ACM Transactions on Networking , vol.11 , Issue.5 , pp. 782-795
    • Koetter, R.1    Medard, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.