-
1
-
-
0034229404
-
Network information flow
-
Jul.
-
R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, "Network information flow," IEEE Trans. on Iriformation Theory, vol. 46, no. 4, pp. 1204-1216, Jul. 2000.
-
(2000)
IEEE Trans. on Iriformation Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
3
-
-
28844481518
-
Minimum-energy multicast in mobile ad hoc networks using network coding
-
Nov.
-
Y. Wu, P. A. Chou, and S.-Y. Kung, "Minimum-energy multicast in mobile ad hoc networks using network coding," IEEE Trans. on Communications, vol. 54, no. 11, Nov. 2005.
-
(2005)
IEEE Trans. on Communications
, vol.54
, Issue.11
-
-
Wu, Y.1
Chou, P.A.2
Kung, S.-Y.3
-
4
-
-
0142008000
-
The benefits of coding over routing in a randomized setting
-
Jun.
-
T. Ho, R. Koetter, M. Medard, D. Karger, and M. Effros, "The benefits of coding over routing in a randomized setting," in Proc. of IEEE International Symposium on Iriformation Theory, Jun. 2003.
-
(2003)
Proc. of IEEE International Symposium on Iriformation Theory
-
-
Ho, T.1
Koetter, R.2
Medard, M.3
Karger, D.4
Effros, M.5
-
6
-
-
77953317474
-
UUSee: Large-scale operational on-demand streaming with random network coding
-
Mar.
-
Z. Liu, C. Wu, B. Li, and S. Zhao, "UUSee: Large-scale operational on-demand streaming with random network coding," in Proc. of IEEE INFOCOM, Mar. 2010.
-
(2010)
Proc. of IEEE INFOCOM
-
-
Liu, Z.1
Wu, C.2
Li, B.3
Zhao, S.4
-
7
-
-
36949027308
-
Trading structure for randomness in wireless opportunistic routing
-
Aug.
-
S. Chachulski, M. Jennings, S. Katti, and D. Katabi, "Trading structure for randomness in wireless opportunistic routing," in Proc. of ACM SIGCOMM, Aug. 2007.
-
(2007)
Proc. of ACM SIGCOMM
-
-
Chachulski, S.1
Jennings, M.2
Katti, S.3
Katabi, D.4
-
8
-
-
5044242517
-
Byzantine modification detection in multicast networks using randomized network coding
-
Jun.
-
T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and D. Karger, "Byzantine modification detection in multicast networks using randomized network coding," in Proc. of IEEE IEEE International Symposium on Information Theory, Jun. 2004.
-
(2004)
Proc. of IEEE IEEE International Symposium on Information Theory
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Medard, M.4
Effros, M.5
Karger, D.6
-
9
-
-
34548349361
-
Resilient network coding in the presence of byzantine adversaries
-
May
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, and M. Medard, "Resilient network coding in the presence of byzantine adversaries," in Proc. of IEEE INFOCOM, May 2007.
-
(2007)
Proc. of IEEE INFOCOM
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Medard, M.6
-
11
-
-
39049090594
-
Cooperative security for network coding file distribution
-
Apr.
-
C. Gkantsidis and P. Rodriguez, "Cooperative security for network coding file distribution," in Proc. of IEEE INFOCOM, Apr. 2006.
-
(2006)
Proc. of IEEE INFOCOM
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
12
-
-
51349130622
-
An efficient signature-based scheme for securing network coding against pollution attacks
-
Apr.
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient signature-based scheme for securing network coding against pollution attacks," in Proc. of IEEE INFOCOM, Apr. 2008.
-
(2008)
Proc. of IEEE INFOCOM
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
13
-
-
51649125221
-
Signatures for content distribution with network coding
-
Jun.
-
F. Zhao, T. Kalker, M. Medard, and K. J. Han, "Signatures for content distribution with network coding," in Proc. of IEEE IEEE International Symposium on Iriformation Theory, Jun. 2007.
-
(2007)
Proc. of IEEE IEEE International Symposium on Iriformation Theory
-
-
Zhao, F.1
Kalker, T.2
Medard, M.3
Han, K.J.4
-
14
-
-
67049095592
-
Signing a linear subspace: Signature schemes for network coding
-
D. Boneh, D. Freeman, J. Katz, and B. Waters, "Signing a linear subspace: Signature schemes for network coding," in Proc. of International Coriference on Practice and Theory in Public Key Cryptography, 2009.
-
(2009)
Proc. of International Coriference on Practice and Theory in Public Key Cryptography
-
-
Boneh, D.1
Freeman, D.2
Katz, J.3
Waters, B.4
-
15
-
-
70349664122
-
An efficient scheme for securing XOR network coding against pollution attacks
-
Apr.
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient scheme for securing XOR network coding against pollution attacks," in Proc. of IEEE INFOCOM, Apr. 2009.
-
(2009)
Proc. of IEEE INFOCOM
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
17
-
-
77953301246
-
RIPPLE authentication for network coding
-
Mar.
-
Y. Li, H. Yao, M. Chen, S. Jaggi, and A. Rosen, "RIPPLE authentication for network coding," in Proc. of IEEE INFOCOM, Mar. 2010.
-
(2010)
Proc. of IEEE INFOCOM
-
-
Li, Y.1
Yao, H.2
Chen, M.3
Jaggi, S.4
Rosen, A.5
-
18
-
-
70349653419
-
Null keys: Limiting malicious attacks via null space properties of network coding
-
Apr.
-
E. Kehdi and B. Li, "Null keys: limiting malicious attacks via null space properties of network coding," in Proc. of IEEE INFOCOM, Apr. 2009.
-
(2009)
Proc. of IEEE INFOCOM
-
-
Kehdi, E.1
Li, B.2
-
19
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
Mar.
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. P inkas, "Multicast security: A taxonomy and some efficient constructions," in Proc. of IEEE INFOCOM, Mar. 1999.
-
(1999)
Proc. of IEEE INFOCOM
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Inkas, B.P.6
-
21
-
-
1142306653
-
An efficient public key traitor tracing scheme
-
Aug.
-
D. Boneh and M. Franklin, "An efficient public key traitor tracing scheme," in Proc. of CRYPTO"99, Aug. 1999.
-
(1999)
Proc. of CRYPTO
, vol.99
-
-
Boneh, D.1
Franklin, M.2
-
23
-
-
84966243285
-
Modular multiplication without trial division
-
P. L. Montgomery, "Modular multiplication without trial division," Mathematics of Computation, vol. 44, no. 170, pp. 519-521, 1985.
-
(1985)
Mathematics of Computation
, vol.44
, Issue.170
, pp. 519-521
-
-
Montgomery, P.L.1
-
24
-
-
70349682315
-
An efficient privacy-preserving scheme against traffic analysis in network coding
-
Apr.
-
Y. Fan, Y. Jiang, H. Zhu, and X. Shen, "An efficient privacy-preserving scheme against traffic analysis in network coding," in Proc. of IEEE INFOCOM, Apr. 2009.
-
(2009)
Proc. of IEEE INFOCOM
-
-
Fan, Y.1
Jiang, Y.2
Zhu, H.3
Shen, X.4
-
25
-
-
77953319343
-
P-Coding: Secure network coding against eavesdropping attacks
-
Mar.
-
P. Zhang, Y. Jiang, C. Lin, Y. Fan, and X. Shen, "P-Coding: Secure network coding against eavesdropping attacks," in Proc. of IEEE INFOCOM, Mar. 2010.
-
(2010)
Proc. of IEEE INFOCOM
-
-
Zhang, P.1
Jiang, Y.2
Lin, C.3
Fan, Y.4
Shen, X.5
-
26
-
-
70449529634
-
A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding
-
Dec.
-
Y. Jiang, Y. Fan, X. Shen, and C. Lin, "A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding," Computer Networks, vol. 53, no. 18, pp. 3089-3101, Dec. 2009.
-
(2009)
Computer Networks
, vol.53
, Issue.18
, pp. 3089-3101
-
-
Jiang, Y.1
Fan, Y.2
Shen, X.3
Lin, C.4
-
27
-
-
77955178649
-
On homomorphic signatures for network coding
-
Mar.
-
A. Yun, J. H. Cheon, and Y. Kim, "On homomorphic signatures for network coding," IEEE Trans. on Computers, vol. 59, no. 9, pp. 1295- 1296, Mar. 2010.
-
(2010)
IEEE Trans. on Computers
, vol.59
, Issue.9
, pp. 1295-1296
-
-
Yun, A.1
Cheon, J.H.2
Kim, Y.3
|