-
1
-
-
0034229404
-
Network information flow
-
July
-
R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, "Network information flow," IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1204-1216, July 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
2
-
-
45749150357
-
XORs in the air: Practical wireless network coding
-
June
-
S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, and J. Crowcroft, "XORs in the air: practical wireless network coding," IEEE/ACM Trans. Networking, vol. 16, no. 3, pp. 497-510, June 2008.
-
(2008)
IEEE/ACM Trans. Networking
, vol.16
, Issue.3
, pp. 497-510
-
-
Katti, S.1
Rahul, H.2
Hu, W.3
Katabi, D.4
Medard, M.5
Crowcroft, J.6
-
3
-
-
25644448947
-
Network coding for large scale content distribution
-
Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
-
C. Gkantsidis and P. R. Rodriguez, "Network coding for large scale content distribution," in Proc. IEEE INFOCOM, vol. 4, pp. 2235-2245, Mar. 2005. (Pubitemid 41382341)
-
(2005)
Proceedings - IEEE INFOCOM
, vol.4
, pp. 2235-2245
-
-
Gkantsidis, C.1
Rodriguez, P.R.2
-
4
-
-
0037323073
-
Linear network coding
-
Feb.
-
S.-Y. R. Li, R. W. Yeung, and N. Cai, "Linear network coding," IEEE Trans. Inf. Theory, vol. 49, no. 2, pp. 371-381, Feb. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.-Y.R.1
Yeung, R.W.2
Cai, N.3
-
5
-
-
0142008000
-
The benefits of coding over routing in a randomized setting
-
T. Ho, R. Koetter, M. Medard, D. R. Karger, and M. Effros, "The benefits of coding over routing in a randomized setting," in Proc. IEEE International Symposium on Information Theory, 2003.
-
(2003)
Proc. IEEE International Symposium on Information Theory
-
-
Ho, T.1
Koetter, R.2
Medard, M.3
Karger, D.R.4
Effros, M.5
-
7
-
-
78649897589
-
Secure network coding over the integers
-
R. Gennaro, J. Katz, H. Krawczyk, and T. Rabin, "Secure network coding over the integers," in Proc. International Conference on Practice and Theory in Public Key Cryptography, 2010.
-
(2010)
Proc. International Conference on Practice and Theory in Public Key Cryptography
-
-
Gennaro, R.1
Katz, J.2
Krawczyk, H.3
Rabin, T.4
-
9
-
-
73449142510
-
Secure network coding with minimum overhead based on hash functions
-
Dec.
-
M. Adeli and H. Liu, "Secure network coding with minimum overhead based on hash functions," IEEE Commun. Lett., pp. 956-958, vol. 13, no. l2, Dec. 2009.
-
(2009)
IEEE Commun. Lett
, vol.13
, Issue.12
, pp. 956-958
-
-
Adeli, M.1
Liu, H.2
-
11
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
A. Perrig, R. Canetti, D. Song, and J. D. Tygar, "Efficient and secure source authentication for multicast," in Proc. Network and Distributed System Security Symposium, pp. 35-46, 2001.
-
(2001)
Proc. Network and Distributed System Security Symposium
, pp. 35-46
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, J.D.4
-
12
-
-
77953301246
-
RIPPLE authentication for network coding
-
Y. Li, H. Yao, M. Chen, S. Jaggi, and A. Rosen, "RIPPLE authentication for network coding," in Proc. IEEE INFOCOM, 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Li, Y.1
Yao, H.2
Chen, M.3
Jaggi, S.4
Rosen, A.5
|