-
2
-
-
0034229404
-
Network information flow
-
Jul.
-
R. Ahlswede, N. Cai, S. R. Li, and R. W. Yeung, "Network information flow," IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1204-1216, Jul. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.R.3
Yeung, R.W.4
-
3
-
-
84892732844
-
-
Microsoft Research, Cambridge, U.K.
-
"Avalanche: File swarming with network coding," Microsoft Research, Cambridge, U.K. [Online]. Available: http://research.microsoft. com/en-us/projects/avalanche
-
Avalanche: File Swarming with Network Coding
-
-
-
4
-
-
84855725909
-
-
Rep. 2008/316
-
D. Boneh, D. Freeman, J. Katz, and B. Waters, "Signing a linear subspace: Signature schemes for network coding," Rep. 2008/316, 2008 [Online]. Available: http://eprint.iacr.org/2008/316
-
(2008)
Signing A Linear Subspace: Signature Schemes for Network Coding
-
-
Boneh, D.1
Freeman, D.2
Katz, J.3
Waters, B.4
-
5
-
-
44049100993
-
Signatures for network coding
-
DOI 10.1109/CISS.2006.286587, 4067928, 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings
-
D. Charles, K. Jain, and K. Lauter, "Signatures for network coding," in Proc. Conf. Inf. Sci. Syst., 2006, pp. 857-863. (Pubitemid 351710133)
-
(2007)
2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings
, pp. 857-863
-
-
Charles, D.1
Jain, K.2
Lauter, K.3
-
6
-
-
84866014912
-
Distributed file sharing: Network coding meets compressed sensing
-
H. Chen, "Distributed file sharing: Network coding meets compressed sensing," in Proc. IEEE ChinaCom, 2008, pp. 1-5.
-
(2008)
Proc. IEEE ChinaCom
, pp. 1-5
-
-
Chen, H.1
-
7
-
-
20544449877
-
Practical network coding
-
P. Chou, Y. Wu, and K. Jain, "Practical network coding," in Proc. Allerton Conf. Commun., Control, Comput., 2003, pp. 40-49.
-
(2003)
Proc. Allerton Conf. Commun., Control, Comput.
, pp. 40-49
-
-
Chou, P.1
Wu, Y.2
Jain, K.3
-
8
-
-
0026992399
-
Multi-receiver/multi-sender network security: Efficient authenticated multicast/feedback
-
Y. Desmedt, Y. Frankel, and M. Yung, "Multi-receiver/multi-sender network security: Efficient authenticated multicast/feedback," in Proc. IEEE INFOCOM, 1992, vol. 3, pp. 2045-2054. (Pubitemid 23615213)
-
(1992)
Proceedings - IEEE INFOCOM
, vol.3
, pp. 2045-2054
-
-
Desmedt Yvo1
Frankel Yair2
Yung Moti3
-
9
-
-
34548321654
-
Network coding for distributed storage systems
-
DOI 10.1109/INFCOM.2007.232, 4215814, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
A. G. Dimakis, P. B. Godfrey, M. J. Wainwright, and K. Ramchandran, "Network coding for distributed storage systems," in Proc. IEEE INFOCOM, 2007, pp. 2000-2008. (Pubitemid 47334432)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 2000-2008
-
-
Dimakis, A.G.1
Godfrey, P.B.2
Wainwright, M.J.3
Ramchandran, K.4
-
10
-
-
25644448947
-
Network coding for large scale content distribution
-
Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
-
C. Gkantsidis and P. Rodriguez, "Network coding for large scale content distribution," in Proc. IEEE INFOCOM, 2005, vol. 4, pp. 2235-2245. (Pubitemid 41382341)
-
(2005)
Proceedings - IEEE INFOCOM
, vol.4
, pp. 2235-2245
-
-
Gkantsidis, C.1
Rodriguez, P.R.2
-
11
-
-
34547410740
-
Comprehensive view of a live network coding P2P system
-
DOI 10.1145/1177080.1177104, Proceedings of the 2006 ACM SIGCOMM Internet Measurement Conference, IMC 2006
-
C. Gkantsidis, J. Miller, and P. Rodriguez, "Comprehensive view of a live network coding P2P system," in Proc. ACM SIGCOMM IMC, 2006, pp. 177-188. (Pubitemid 47165600)
-
(2006)
Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC
, pp. 177-188
-
-
Gkantsidis, C.1
Miller, J.2
Rodriguez, P.3
-
12
-
-
39049090594
-
Cooperative security for network coding file distribution
-
C. Gkantsidis and P. Rodriguez, "Cooperative security for network coding file distribution," in Proc. IEEE INFOCOM, 2006, pp. 1-13.
-
(2006)
Proc. IEEE INFOCOM
, pp. 1-13
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
13
-
-
84937409531
-
Unconditionally secure digital signature schemes admitting transferability
-
Proc. ASIACRYPT
-
G. Hanaoka, J. Shikata, Y. Zheng, and H. Imai, "Unconditionally secure digital signature schemes admitting transferability," in Proc. ASIACRYPT, 2000, vol. 1976, LNCS, pp. 130-142.
-
(2000)
LNCS
, vol.1976
, pp. 130-142
-
-
Hanaoka, G.1
Shikata, J.2
Zheng, Y.3
Imai, H.4
-
14
-
-
33750317296
-
XORs in the air: Practical wireless network coding
-
DOI 10.1145/1151659.1159942
-
S. Katti, H. Rahul, W. Hu, D. Katabi, M. Médard, and J. Crowcroft, "XORs in the air: Practical wireless network coding," in Proc. ACM SIGCOMM, 2006, pp. 243-254. (Pubitemid 44623731)
-
(2006)
Computer Communication Review
, vol.36
, Issue.4
, pp. 243-254
-
-
Katti, S.1
Rahul, H.2
Hu, W.3
Katabi, D.4
Medard, M.5
Crowcroft, J.6
-
15
-
-
0242334165
-
An algebraic approach to network coding
-
Oct.
-
R.Koetter and M. Medard, "An algebraic approach to network coding," IEEE/ACM Trans. Netw., vol. 11, no. 5, pp. 782-795, Oct. 2003.
-
(2003)
IEEE/ACM Trans. Netw.
, vol.11
, Issue.5
, pp. 782-795
-
-
Koetter, R.1
Medard, M.2
-
16
-
-
48849089497
-
Coding for errors and erasures in random network coding
-
Aug.
-
R. Koetter and F. R. Kschischang, "Coding for errors and erasures in random network coding," IEEE Trans. Inf. Theory, vol. 54, no. 8, pp. 3579-3591, Aug. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.8
, pp. 3579-3591
-
-
Koetter, R.1
Kschischang, F.R.2
-
17
-
-
0037323073
-
Linear network coding
-
Feb.
-
S.-Y. R. Li and R. W. Yeung, "Linear network coding," IEEE Trans. Inf. Theory, vol. 49, no. 2, pp. 371-381, Feb. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.-Y.R.1
Yeung, R.W.2
-
18
-
-
64549152089
-
Multi-receiver authentication codes for network coding
-
F. Oggier and H. Fathi, "Multi-receiver authentication codes for network coding," in Proc. 46th Annu. Allerton Conf. Commun., Control, Comput., 2008, pp. 1225-1231.
-
(2008)
Proc. 46th Annu. Allerton Conf. Commun., Control, Comput.
, pp. 1225-1231
-
-
Oggier, F.1
Fathi, H.2
-
19
-
-
84957715332
-
New results on multi-receiver authentication codes
-
Advances in Cryptology - EUROCRYPT '98
-
R. Safavi-Naini and H.Wang, "New results on multi-receiver authentication codes," in Proc. Eurocrypt, 1998, vol. LNCS 1403, pp. 527-541. (Pubitemid 128081510)
-
(1998)
Lecture Notes in Computer Science
, Issue.1403
, pp. 527-541
-
-
Safavi-Naini, R.1
Wang, H.2
-
20
-
-
51349146209
-
A rank-metric approach to error control in random network coding
-
Sep.
-
D. Silva, F. R. Kschischang, and R. Koetter, "A rank-metric approach to error control in random network coding," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 3951-3967, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 3951-3967
-
-
Silva, D.1
Kschischang, F.R.2
Koetter, R.3
-
22
-
-
51349130622
-
An efficient signaturebased scheme for securing network coding against pollution attacks
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient signaturebased scheme for securing network coding against pollution attacks," in Proc. IEEE INFOCOM, 2008, pp. 1409-1417.
-
(2008)
Proc. IEEE INFOCOM
, pp. 1409-1417
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
23
-
-
70349664122
-
An efficient scheme for securingXOR network coding against pollution attacks
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient scheme for securingXOR network coding against pollution attacks," in Proc. IEEE INFOCOM, 2009, pp. 406-414.
-
(2009)
Proc. IEEE INFOCOM
, pp. 406-414
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
24
-
-
51649125221
-
Signatures for content distribution with network coding
-
F. Zhao, T. Kalker, M. Medard, and K. J. Han, "Signatures for content distribution with network coding," in Proc. IEEE Int. Symp. Inf. Theory, 2007, pp. 556-560.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 556-560
-
-
Zhao, F.1
Kalker, T.2
Medard, M.3
Han, K.J.4
|