메뉴 건너뛰기




Volumn 19, Issue 6, 2011, Pages 1587-1596

An authentication code against pollution attacks in network coding

Author keywords

Authentication codes; network coding; pollution attacks

Indexed keywords

AUTHENTICATION CODES; COMPUTATIONAL ASSUMPTIONS; FILE DISTRIBUTION; GOOD PUT; INTEGRITY CHECK; INTERMEDIATE NODE; MALICIOUS INSIDERS; MALICIOUS PACKETS; MULTICAST NETWORK; POLLUTION ATTACK; POLLUTION ATTACKS; TRUSTED AUTHORITIES;

EID: 84655169995     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2011.2126592     Document Type: Article
Times cited : (19)

References (24)
  • 1
  • 3
    • 84892732844 scopus 로고    scopus 로고
    • Microsoft Research, Cambridge, U.K.
    • "Avalanche: File swarming with network coding," Microsoft Research, Cambridge, U.K. [Online]. Available: http://research.microsoft. com/en-us/projects/avalanche
    • Avalanche: File Swarming with Network Coding
  • 6
    • 84866014912 scopus 로고    scopus 로고
    • Distributed file sharing: Network coding meets compressed sensing
    • H. Chen, "Distributed file sharing: Network coding meets compressed sensing," in Proc. IEEE ChinaCom, 2008, pp. 1-5.
    • (2008) Proc. IEEE ChinaCom , pp. 1-5
    • Chen, H.1
  • 8
    • 0026992399 scopus 로고
    • Multi-receiver/multi-sender network security: Efficient authenticated multicast/feedback
    • Y. Desmedt, Y. Frankel, and M. Yung, "Multi-receiver/multi-sender network security: Efficient authenticated multicast/feedback," in Proc. IEEE INFOCOM, 1992, vol. 3, pp. 2045-2054. (Pubitemid 23615213)
    • (1992) Proceedings - IEEE INFOCOM , vol.3 , pp. 2045-2054
    • Desmedt Yvo1    Frankel Yair2    Yung Moti3
  • 9
    • 34548321654 scopus 로고    scopus 로고
    • Network coding for distributed storage systems
    • DOI 10.1109/INFCOM.2007.232, 4215814, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
    • A. G. Dimakis, P. B. Godfrey, M. J. Wainwright, and K. Ramchandran, "Network coding for distributed storage systems," in Proc. IEEE INFOCOM, 2007, pp. 2000-2008. (Pubitemid 47334432)
    • (2007) Proceedings - IEEE INFOCOM , pp. 2000-2008
    • Dimakis, A.G.1    Godfrey, P.B.2    Wainwright, M.J.3    Ramchandran, K.4
  • 10
    • 25644448947 scopus 로고    scopus 로고
    • Network coding for large scale content distribution
    • Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
    • C. Gkantsidis and P. Rodriguez, "Network coding for large scale content distribution," in Proc. IEEE INFOCOM, 2005, vol. 4, pp. 2235-2245. (Pubitemid 41382341)
    • (2005) Proceedings - IEEE INFOCOM , vol.4 , pp. 2235-2245
    • Gkantsidis, C.1    Rodriguez, P.R.2
  • 12
    • 39049090594 scopus 로고    scopus 로고
    • Cooperative security for network coding file distribution
    • C. Gkantsidis and P. Rodriguez, "Cooperative security for network coding file distribution," in Proc. IEEE INFOCOM, 2006, pp. 1-13.
    • (2006) Proc. IEEE INFOCOM , pp. 1-13
    • Gkantsidis, C.1    Rodriguez, P.2
  • 13
    • 84937409531 scopus 로고    scopus 로고
    • Unconditionally secure digital signature schemes admitting transferability
    • Proc. ASIACRYPT
    • G. Hanaoka, J. Shikata, Y. Zheng, and H. Imai, "Unconditionally secure digital signature schemes admitting transferability," in Proc. ASIACRYPT, 2000, vol. 1976, LNCS, pp. 130-142.
    • (2000) LNCS , vol.1976 , pp. 130-142
    • Hanaoka, G.1    Shikata, J.2    Zheng, Y.3    Imai, H.4
  • 15
    • 0242334165 scopus 로고    scopus 로고
    • An algebraic approach to network coding
    • Oct.
    • R.Koetter and M. Medard, "An algebraic approach to network coding," IEEE/ACM Trans. Netw., vol. 11, no. 5, pp. 782-795, Oct. 2003.
    • (2003) IEEE/ACM Trans. Netw. , vol.11 , Issue.5 , pp. 782-795
    • Koetter, R.1    Medard, M.2
  • 16
    • 48849089497 scopus 로고    scopus 로고
    • Coding for errors and erasures in random network coding
    • Aug.
    • R. Koetter and F. R. Kschischang, "Coding for errors and erasures in random network coding," IEEE Trans. Inf. Theory, vol. 54, no. 8, pp. 3579-3591, Aug. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.8 , pp. 3579-3591
    • Koetter, R.1    Kschischang, F.R.2
  • 17
    • 0037323073 scopus 로고    scopus 로고
    • Linear network coding
    • Feb.
    • S.-Y. R. Li and R. W. Yeung, "Linear network coding," IEEE Trans. Inf. Theory, vol. 49, no. 2, pp. 371-381, Feb. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.2 , pp. 371-381
    • Li, S.-Y.R.1    Yeung, R.W.2
  • 19
    • 84957715332 scopus 로고    scopus 로고
    • New results on multi-receiver authentication codes
    • Advances in Cryptology - EUROCRYPT '98
    • R. Safavi-Naini and H.Wang, "New results on multi-receiver authentication codes," in Proc. Eurocrypt, 1998, vol. LNCS 1403, pp. 527-541. (Pubitemid 128081510)
    • (1998) Lecture Notes in Computer Science , Issue.1403 , pp. 527-541
    • Safavi-Naini, R.1    Wang, H.2
  • 20
    • 51349146209 scopus 로고    scopus 로고
    • A rank-metric approach to error control in random network coding
    • Sep.
    • D. Silva, F. R. Kschischang, and R. Koetter, "A rank-metric approach to error control in random network coding," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 3951-3967, Sep. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 3951-3967
    • Silva, D.1    Kschischang, F.R.2    Koetter, R.3
  • 22
    • 51349130622 scopus 로고    scopus 로고
    • An efficient signaturebased scheme for securing network coding against pollution attacks
    • Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient signaturebased scheme for securing network coding against pollution attacks," in Proc. IEEE INFOCOM, 2008, pp. 1409-1417.
    • (2008) Proc. IEEE INFOCOM , pp. 1409-1417
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4
  • 23
    • 70349664122 scopus 로고    scopus 로고
    • An efficient scheme for securingXOR network coding against pollution attacks
    • Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient scheme for securingXOR network coding against pollution attacks," in Proc. IEEE INFOCOM, 2009, pp. 406-414.
    • (2009) Proc. IEEE INFOCOM , pp. 406-414
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.