-
1
-
-
0034229404
-
Network information flow
-
R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, "Network information flow," IEEE Trans. Inf. Theory, vol. 46, pp. 1204-1216, 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
2
-
-
0142008000
-
The benefits of coding over routing in a randomized setting
-
July
-
T. Ho, M. Médard, M. Effros, and D. Karger, "The benefits of coding over routing in a randomized setting," in Proc. IEEE ISIT, Kanagawa, Japan, July 2003.
-
(2003)
Proc. IEEE ISIT, Kanagawa, Japan
-
-
Ho, T.1
Médard, M.2
Effros, M.3
Karger, D.4
-
4
-
-
33845571437
-
Network coding for efficient wireless unicast
-
Zurich, Switzerland, February
-
D. Lun, M. Médard, and R. Koetter, "Network coding for efficient wireless unicast," in Proc. International Zurich Seminar on Communications, Zurich, Switzerland, February 2006.
-
(2006)
Proc. International Zurich Seminar on Communications
-
-
Lun, D.1
Médard, M.2
Koetter, R.3
-
5
-
-
0242334165
-
An algebraic approach to network coding
-
R. Koetter and M. Médard, "An algebraic approach to network coding," IEEE/ACM Trans. Netw., vol. 11, pp. 782-795, 2003.
-
(2003)
IEEE/ACM Trans. Netw.
, vol.11
, pp. 782-795
-
-
Koetter, R.1
Médard, M.2
-
6
-
-
41749121006
-
On coding for reliable communication over packet networks
-
D. Lun, M. Medard, R. Koetter, and M. Effros, "On coding for reliable communication over packet networks," Physical Communication, vol. 1, no. 1, pp. 3-20, 2008.
-
(2008)
Physical Communication
, vol.1
, Issue.1
, pp. 3-20
-
-
Lun, D.1
Medard, M.2
Koetter, R.3
Effros, M.4
-
7
-
-
33947399169
-
A random linear network coding approach to multicast
-
DOI 10.1109/TIT.2006.881746
-
T. Ho, M. Médard, R. Koetter, M. Effros, J. Shi, and D. R. Karger, "A random linear coding approach to mutlicast," IEEE Trans. Inf. Theory, vol. 52, pp. 4413-4430, 2006. (Pubitemid 46445282)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.10
, pp. 4413-4430
-
-
Ho, T.1
Medard, M.2
Koetter, R.3
Karger, D.R.4
Effros, M.5
Shi, J.6
Leong, B.7
-
8
-
-
36248991171
-
How good is random linear coding based distributed network storage?
-
Riva del Garda, Italy, April
-
S. Acedański, S. Deb, M. Médard, and R. Koetter, "How good is random linear coding based distributed network storage?" in Proc. 1st Netcod, Riva del Garda, Italy, April 2005.
-
(2005)
Proc. 1st Netcod
-
-
Acedański, S.1
Deb, S.2
Médard, M.3
Koetter, R.4
-
9
-
-
25644448947
-
Network coding for large scale content distribution
-
Miami, FL, March
-
C. Gkantsidis and P. Rodriguez, "Network coding for large scale content distribution," in Proc. IEEE INFOCOM, Miami, FL, March 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
11
-
-
34547410740
-
Comprehensive view of a live network coding p2p system
-
Rio de Janeiro, Brazil, October
-
C. Gkantsidis, J. Miller, and P. Rodriguez, "Comprehensive view of a live network coding p2p system," in Proc. ACM SIGCOMM/USENIX Internet Measurement Conference, Rio de Janeiro, Brazil, October 2006.
-
(2006)
Proc. ACM SIGCOMM/USENIX Internet Measurement Conference
-
-
Gkantsidis, C.1
Miller, J.2
Rodriguez, P.3
-
12
-
-
0003828107
-
-
Ph.D. dissertation, Massachusetts Institute of Technology, Cambridge, MA, October
-
R. Perlman, "Network layer protocols with Byzantine robustness," Ph.D. dissertation, Massachusetts Institute of Technology, Cambridge, MA, October 1988.
-
(1988)
Network Layer Protocols with Byzantine Robustness
-
-
Perlman, R.1
-
14
-
-
84976699318
-
The Byzantine generals problem
-
L. Lamport, R. Shostak, and M. Pease, "The Byzantine generals problem," ACM Trans. Programming Languages and Systems, vol. 4, pp. 382-401, 1982.
-
(1982)
ACM Trans. Programming Languages and Systems
, vol.4
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
15
-
-
34548349361
-
Resilient network coding in the presence of Byzantine adversaries
-
DOI 10.1109/INFCOM.2007.78, 4215660, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, and M. Médard, "Resilient network coding in the presence of Byzantine adversaries," in Proc. IEEE INFOCOM, March 2007, pp. 616 - 624. (Pubitemid 47334278)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 616-624
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Medard, M.6
-
16
-
-
39049090594
-
Cooperative security for network coding file distribution
-
April
-
C. Gkantsidis and P. Rodriguez, "Cooperative security for network coding file distribution," in Proc. IEEE INFOCOM, April 2006.
-
(2006)
Proc. IEEE INFOCOM
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
17
-
-
0038483826
-
Emergence of scaling in random networks
-
A. Barabási and R. Albert, "Emergence of Scaling in Random Networks," Science, vol. 286, no. 5439, p. 509, 1999.
-
(1999)
Science
, vol.286
, Issue.5439
, pp. 509
-
-
Barabási, A.1
Albert, R.2
-
18
-
-
0035474003
-
Search in power-law networks
-
September
-
L. A. Adamic, R. M. Lukose, A. R. Puniyani, and B. A. Huberman, "Search in power-law networks," Phys. Rev. E, vol. 64, no. 4, p. 046135, September 2001.
-
(2001)
Phys. Rev. e
, vol.64
, Issue.4
, pp. 046135
-
-
Adamic, L.A.1
Lukose, R.M.2
Puniyani, A.R.3
Huberman, B.A.4
-
19
-
-
0035794256
-
Epidemic spreading in scale-free networks
-
DOI 10.1103/PhysRevLett.86.3200
-
R. Pastor-Satorras and A. Vespignani, "Epidemic spreading in scale-free networks," Phys. Rev. Lett., vol. 86, no. 14, pp. 3200-3203, Apr 2001. (Pubitemid 32317894)
-
(2001)
Physical Review Letters
, vol.86
, Issue.14
, pp. 3200-3203
-
-
Pastor-Satorras, R.1
Vespignani, A.2
-
20
-
-
0035689341
-
Infection dynamics on scale-free networks
-
Nov
-
R. M. May and A. L. Lloyd, "Infection dynamics on scale-free networks," Phys. Rev. E, vol. 64, no. 6, p. 066112, Nov 2001.
-
(2001)
Phys. Rev. e
, vol.64
, Issue.6
, pp. 066112
-
-
May, R.M.1
Lloyd, A.L.2
-
21
-
-
51649125221
-
Signatures for content distribution with network coding
-
June
-
F. Zhao, T. Kalker, M. Médard, and K. J. Han, "Signatures for content distribution with network coding," in Proc. IEEE ISIT, June 2007.
-
(2007)
Proc. IEEE ISIT
-
-
Zhao, F.1
Kalker, T.2
Médard, M.3
Han, K.J.4
-
22
-
-
62349095697
-
Countering byzantine adversaries with network coding: An overhead analysis
-
November
-
M. Kim, M. Médard, and J. Barros, "Countering byzantine adversaries with network coding: An overhead analysis," in Proc. IEEE MILCOM, November 2008.
-
(2008)
Proc. IEEE MILCOM
-
-
Kim, M.1
Médard, M.2
Barros, J.3
-
23
-
-
70449516066
-
Byzantine attacks against network coding in peer to peer distributed storage
-
June
-
L. Lima, J. Barros, and R. Koetter, "Byzantine attacks against network coding in peer to peer distributed storage," in Proc. IEEE ISIT, June 2009.
-
(2009)
Proc. IEEE ISIT
-
-
Lima, L.1
Barros, J.2
Koetter, R.3
-
24
-
-
34548321654
-
Network coding for distributed storage systems
-
Anchorage, Alaska, May
-
A. G. Dimakis, P. B. Godfrey, M. J. Wainwright, and K. Ramchandran, "Network coding for distributed storage systems," in Proc. IEEE INFOCOM, Anchorage, Alaska, May 2007.
-
(2007)
Proc. IEEE INFOCOM
-
-
Dimakis, A.G.1
Godfrey, P.B.2
Wainwright, M.J.3
Ramchandran, K.4
-
26
-
-
48849089497
-
Coding for errors and erasures in random network coding
-
R. Koetter and F. Kschischang, "Coding for errors and erasures in random network coding," IEEE Trans. Inf. Theory, vol. 54, pp. 3579-3591, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, pp. 3579-3591
-
-
Koetter, R.1
Kschischang, F.2
-
27
-
-
64549135473
-
Adversarial error correction for network coding: Models and metrics
-
Monticello, IL, September
-
D. Silva and F. Kschischang, "Adversarial error correction for network coding: Models and metrics," in Proc. Annual Allerton Conf. on Commun., Control, and Computing, Monticello, IL, September 2008.
-
(2008)
Proc. Annual Allerton Conf. on Commun., Control, and Computing
-
-
Silva, D.1
Kschischang, F.2
-
28
-
-
5044242517
-
Byzantine modification detection in multicast networks using randomized network coding
-
June
-
T. Ho, B. Leong, R. Koetter, M. Médard, and M. Effros, "Byzantine modification detection in multicast networks using randomized network coding," in Proc. IEEE ISIT, June 2004.
-
(2004)
Proc. IEEE ISIT
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Médard, M.4
Effros, M.5
-
30
-
-
0348003132
-
The state of elliptic curve cryptography
-
March
-
N. Koblitz, A. Menezes, and S. Vanstone, "The state of elliptic curve cryptography," Designs, Codes and Cryptography, vol. 19, no. 2-3, pp. 173-193, March 2000.
-
(2000)
Designs, Codes and Cryptography
, vol.19
, Issue.2-3
, pp. 173-193
-
-
Koblitz, N.1
Menezes, A.2
Vanstone, S.3
-
31
-
-
51349130622
-
An efficient signaturebased scheme for securing network coding against pollution attacks
-
Pheonix, AZ, April
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient signaturebased scheme for securing network coding against pollution attacks," in Proceedings of IEEE INFOCOM, Pheonix, AZ, April 2008.
-
(2008)
Proceedings of IEEE INFOCOM
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
33
-
-
0003508562
-
Digital signature standard (DSS)
-
National Institute of Standards and Technology
-
National Institute of Standards and Technology, "Digital signature standard (DSS)," FIBS PUB 186-2, 2000.
-
(2000)
FIBS PUB
, vol.186
, Issue.2
-
-
-
34
-
-
84957085257
-
An efficient public key traitor tracing scheme
-
Springer-Verlag
-
D. Boneh and M. Franklin, "An efficient public key traitor tracing scheme," in Lecture Notes in Computer Science, vol. 1666. Springer-Verlag, 1999, pp. 338-353.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 338-353
-
-
Boneh, D.1
Franklin, M.2
|