메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1026-1034

Padding for orthogonality: Efficient subspace authentication for network coding

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION MECHANISMS; LOW-BANDWIDTH; ORTHOGONALITY; POLLUTION ATTACK; PUBLIC KEYS; SIGNATURE SCHEME; STORE AND FORWARD; SYMMETRIC KEYS; VERIFICATION PROCESS;

EID: 79960873240     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2011.5934876     Document Type: Conference Paper
Times cited : (88)

References (27)
  • 3
    • 28844481518 scopus 로고    scopus 로고
    • Minimum-energy multicast in mobile ad hoc networks using network coding
    • Nov.
    • Y. Wu, P. A. Chou, and S.-Y. Kung, "Minimum-energy multicast in mobile ad hoc networks using network coding," IEEE Trans. on Communications, vol. 54, no. 11, Nov. 2005.
    • (2005) IEEE Trans. on Communications , vol.54 , Issue.11
    • Wu, Y.1    Chou, P.A.2    Kung, S.-Y.3
  • 5
  • 6
    • 77953317474 scopus 로고    scopus 로고
    • UUSee: Large-scale operational on-demand streaming with random network coding
    • Mar.
    • Z. Liu, C. Wu, B. Li, and S. Zhao, "UUSee: Large-scale operational on-demand streaming with random network coding," in Proc. of IEEE INFOCOM, Mar. 2010.
    • (2010) Proc. of IEEE INFOCOM
    • Liu, Z.1    Wu, C.2    Li, B.3    Zhao, S.4
  • 11
    • 39049090594 scopus 로고    scopus 로고
    • Cooperative security for network coding file distribution
    • Apr.
    • C. Gkantsidis and P. Rodriguez, "Cooperative security for network coding file distribution," in Proc. of IEEE INFOCOM, Apr. 2006.
    • (2006) Proc. of IEEE INFOCOM
    • Gkantsidis, C.1    Rodriguez, P.2
  • 12
    • 51349130622 scopus 로고    scopus 로고
    • An efficient signature-based scheme for securing network coding against pollution attacks
    • Apr.
    • Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient signature-based scheme for securing network coding against pollution attacks," in Proc. of IEEE INFOCOM, Apr. 2008.
    • (2008) Proc. of IEEE INFOCOM
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4
  • 15
    • 70349664122 scopus 로고    scopus 로고
    • An efficient scheme for securing XOR network coding against pollution attacks
    • Apr.
    • Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient scheme for securing XOR network coding against pollution attacks," in Proc. of IEEE INFOCOM, Apr. 2009.
    • (2009) Proc. of IEEE INFOCOM
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4
  • 18
    • 70349653419 scopus 로고    scopus 로고
    • Null keys: Limiting malicious attacks via null space properties of network coding
    • Apr.
    • E. Kehdi and B. Li, "Null keys: limiting malicious attacks via null space properties of network coding," in Proc. of IEEE INFOCOM, Apr. 2009.
    • (2009) Proc. of IEEE INFOCOM
    • Kehdi, E.1    Li, B.2
  • 21
    • 1142306653 scopus 로고    scopus 로고
    • An efficient public key traitor tracing scheme
    • Aug.
    • D. Boneh and M. Franklin, "An efficient public key traitor tracing scheme," in Proc. of CRYPTO"99, Aug. 1999.
    • (1999) Proc. of CRYPTO , vol.99
    • Boneh, D.1    Franklin, M.2
  • 23
    • 84966243285 scopus 로고
    • Modular multiplication without trial division
    • P. L. Montgomery, "Modular multiplication without trial division," Mathematics of Computation, vol. 44, no. 170, pp. 519-521, 1985.
    • (1985) Mathematics of Computation , vol.44 , Issue.170 , pp. 519-521
    • Montgomery, P.L.1
  • 24
    • 70349682315 scopus 로고    scopus 로고
    • An efficient privacy-preserving scheme against traffic analysis in network coding
    • Apr.
    • Y. Fan, Y. Jiang, H. Zhu, and X. Shen, "An efficient privacy-preserving scheme against traffic analysis in network coding," in Proc. of IEEE INFOCOM, Apr. 2009.
    • (2009) Proc. of IEEE INFOCOM
    • Fan, Y.1    Jiang, Y.2    Zhu, H.3    Shen, X.4
  • 26
    • 70449529634 scopus 로고    scopus 로고
    • A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding
    • Dec.
    • Y. Jiang, Y. Fan, X. Shen, and C. Lin, "A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding," Computer Networks, vol. 53, no. 18, pp. 3089-3101, Dec. 2009.
    • (2009) Computer Networks , vol.53 , Issue.18 , pp. 3089-3101
    • Jiang, Y.1    Fan, Y.2    Shen, X.3    Lin, C.4
  • 27
    • 77955178649 scopus 로고    scopus 로고
    • On homomorphic signatures for network coding
    • Mar.
    • A. Yun, J. H. Cheon, and Y. Kim, "On homomorphic signatures for network coding," IEEE Trans. on Computers, vol. 59, no. 9, pp. 1295- 1296, Mar. 2010.
    • (2010) IEEE Trans. on Computers , vol.59 , Issue.9 , pp. 1295-1296
    • Yun, A.1    Cheon, J.H.2    Kim, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.