-
1
-
-
0242426103
-
The TESLA Broadcast Authentication Protocol
-
A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "The TESLA Broadcast Authentication Protocol," RSA CryptoBytes, vol. 5, 2002.
-
(2002)
RSA CryptoBytes
, vol.5
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
2
-
-
25644448947
-
Network Coding for Large Scale Content Distribution
-
C. Gkantsidis and P. R. Rodriguez, "Network Coding for Large Scale Content Distribution," in INFOCOM'05.
-
INFOCOM'05
-
-
Gkantsidis, C.1
Rodriguez, P.R.2
-
3
-
-
77953317474
-
UUSee: Large-Scale Operational On-Demand Streaming with Random Network Coding
-
Z. Liu, C. Wu, B. Li, and S. Zhao, "UUSee : Large-Scale Operational On-Demand Streaming with Random Network Coding," in INFOCOM'10.
-
INFOCOM'10
-
-
Liu, Z.1
Wu, C.2
Li, B.3
Zhao, S.4
-
4
-
-
36749056448
-
R2: Random Push with Random Network Coding in Live Peer-to-Peer Streaming
-
Dec.
-
M. Wang and B. Li, "R2: Random Push with Random Network Coding in Live Peer-to-Peer Streaming," JSAC, vol. 25, no. 9, Dec. 2007.
-
(2007)
JSAC
, vol.25
, Issue.9
-
-
Wang, M.1
Li, B.2
-
5
-
-
79951942028
-
Random Network Coding in Peer-to-Peer Networks: From Theory to Practice
-
B. Li and D. Niu, "Random Network Coding in Peer-to-Peer Networks : From Theory to Practice," IEEE, vol. 99, no. 3, 2011.
-
(2011)
IEEE
, vol.99
, Issue.3
-
-
Li, B.1
Niu, D.2
-
6
-
-
39049090594
-
Cooperative Security for Network Coding File Distribution
-
C. Gkantsidis and P. R. Rodriguez, "Cooperative Security for Network Coding File Distribution," in INFOCOM'06.
-
INFOCOM'06
-
-
Gkantsidis, C.1
Rodriguez, P.R.2
-
7
-
-
80052990890
-
On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution
-
M. N. Krohn, M. J. Freedman, and D. Mazieres, "On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution," in SP'04.
-
SP'04
-
-
Krohn, M.N.1
Freedman, M.J.2
Mazieres, D.3
-
8
-
-
68849117052
-
Signing a Linear Subspace: Signature Schemes for Network Coding
-
D. Boneh, D. Freeman, J. Katz, and B. Waters, "Signing a Linear Subspace : Signature Schemes for Network Coding," in PKC'09.
-
PKC'09
-
-
Boneh, D.1
Freeman, D.2
Katz, J.3
Waters, B.4
-
10
-
-
44049100993
-
Signatures for network coding
-
D. Charles, K. Jain, and K. Lauter, "Signatures for network coding," in Info Sciences and Systems, vol. 1, no. 1, 2006.
-
(2006)
Info Sciences and Systems
, vol.1
, Issue.1
-
-
Charles, D.1
Jain, K.2
Lauter, K.3
-
11
-
-
79960873240
-
Padding for Orthogonality: Efficient Subspace Authentication for Network Coding
-
P. Zhang, Y. Jiang, C. Lin, H. Yao, A. Wasef, and X. S. Shen, "Padding for Orthogonality : Efficient Subspace Authentication for Network Coding," in INFOCOM'11.
-
INFOCOM'11
-
-
Zhang, P.1
Jiang, Y.2
Lin, C.3
Yao, H.4
Wasef, A.5
Shen, X.S.6
-
12
-
-
78249273398
-
Homomorphic MACs: MAC-Based Integrity for Network Coding
-
S. Agrawal and D. Boneh, "Homomorphic MACs : MAC-Based Integrity for Network Coding," in ACNS'09.
-
ACNS'09
-
-
Agrawal, S.1
Boneh, D.2
-
14
-
-
77953301246
-
RIPPLE Authentication for Network Coding
-
Y. Li, H. Yao, M. Chen, S. Jaggi, and A. Rosen, "RIPPLE Authentication for Network Coding," in INFOCOM'10.
-
INFOCOM'10
-
-
Li, Y.1
Yao, H.2
Chen, M.3
Jaggi, S.4
Rosen, A.5
-
15
-
-
80053005778
-
Identifying Malicious Nodes in Network-Coding- Based Peer-to-Peer Streaming Networks
-
Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana, "Identifying Malicious Nodes in Network-Coding- Based Peer-to-Peer Streaming Networks," in Mini INFOCOM'10.
-
Mini INFOCOM'10
-
-
Wang, Q.1
Vu, L.2
Nahrstedt, K.3
Khurana, H.4
-
16
-
-
70349146976
-
Practical Defenses Against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks
-
J. Dong, R. Curtmola, and C. Nita-Rotaru, "Practical Defenses Against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks," in ACM WiSec'09.
-
ACM WiSec'09
-
-
Dong, J.1
Curtmola, R.2
Nita-Rotaru, C.3
-
17
-
-
70349653419
-
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
-
E. Kehdi and B. Li, "Null Keys : Limiting Malicious Attacks Via Null Space Properties of Network Coding," in INFOCOM'09.
-
INFOCOM'09
-
-
Kehdi, E.1
Li, B.2
-
19
-
-
80053039714
-
Locating Byzantine Attackers in Intra-Session Network Coding using SpaceMac
-
A. Le and A. Markopoulou, "Locating Byzantine Attackers in Intra-Session Network Coding using SpaceMac," in NetCod'10.
-
NetCod'10
-
-
Le, A.1
Markopoulou, A.2
-
22
-
-
80052990503
-
-
[Online]. Available
-
A. Le, "SpaceMac Library," 2011. [Online]. Available: http://www.ics.uci.edu/~anhml/software.html#SpaceMac
-
(2011)
SpaceMac Library
-
-
Le, A.1
|