-
1
-
-
0034229404
-
Network information flow
-
Jul.
-
R. Ahlswede, N. Cai, S.-y. R. Li, and R. W. Yeung, "Network Information Flow," IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1204-1216, Jul. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
2
-
-
82055199252
-
On counteracting byzantine attacks in network coded peer-to-peer networks
-
Jun.
-
M. Kim, L. Lima, F. Zhao, J. Barros, M. Medard, R. Koetter, T. Kalkert, and K. J. Han, "On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks," IEEE J. Sel. Areas Commun., vol. 28, no. 5, pp. 692-702, Jun. 2010.
-
(2010)
IEEE J. Sel. Areas Commun.
, vol.28
, Issue.5
, pp. 692-702
-
-
Kim, M.1
Lima, L.2
Zhao, F.3
Barros, J.4
Medard, M.5
Koetter, R.6
Kalkert, T.7
Han, K.J.8
-
3
-
-
70349146976
-
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
-
Zurich, Switzerland
-
J. Dong, R. Curtmola, and C. Nita-Rotaru, "Practical Defenses against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks," in Proc. ACM WiSec 2009, Zurich, Switzerland, pp. 111-122.
-
Proc. ACM WiSec 2009
, pp. 111-122
-
-
Dong, J.1
Curtmola, R.2
Nita-Rotaru, C.3
-
4
-
-
39049090594
-
Cooperative security for network coding file distribution
-
Barcelona, Spain
-
C. Gkantsidis and P. R. Rodriguez, "Cooperative Security for Network Coding File Distribution," in Proc. IEEE INFOCOM 2006, Barcelona, Spain, pp. 1-13.
-
(2006)
Proc. IEEE INFOCOM
, pp. 1-13
-
-
Gkantsidis, C.1
Rodriguez, P.R.2
-
5
-
-
0036353798
-
Secure network coding
-
Lausanne, Switzerland
-
N. Cai and R. W. Yeung, "Secure Network Coding," in Proc. ISIT 2002, Lausanne, Switzerland, p. 323.
-
Proc. ISIT
, vol.2002
, pp. 323
-
-
Cai, N.1
Yeung, R.W.2
-
6
-
-
33749439326
-
Correction of adversarial errors in networks
-
DOI 10.1109/ISIT.2005.1523584, 1523584, Proceedings of the 2005 IEEE International Symposium on Information Theory, ISIT 05
-
S. Jaggi, M. Langberg, T. Ho, and M. Effros, "Correction of Adversarial Errors in Networks," in Proc. ISIT 2005, Adelaide, Australia, pp. 1455-1459. (Pubitemid 44508283)
-
(2005)
IEEE International Symposium on Information Theory - Proceedings
, vol.2005
, pp. 1455-1459
-
-
Jaggi, S.1
Langbergt, M.2
Ho, T.3
Effros, M.4
-
7
-
-
51649121337
-
Coding for errors and erasures in Random Network Coding
-
Nice, France
-
R. Koetter and F. R. Kschischang, "Coding for Errors and Erasures in Random Network Coding," in Proc. ISIT 2007, Nice, France, pp. 791-795.
-
(2007)
Proc. ISIT
, pp. 791-795
-
-
Koetter, R.1
Kschischang, F.R.2
-
8
-
-
3543050732
-
On-the-fly verification of rateless erasure codes for efficient content distribution
-
Oakland, CA, USA
-
M. N. Krohn, M. J. Freedman, and D. Mazieres, "On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution," in Proc. IEEE SP 2004, Oakland, CA, USA, pp. 226-240.
-
(2004)
Proc. IEEE SP
, pp. 226-240
-
-
Krohn, M.N.1
Freedman, M.J.2
Mazieres, D.3
-
9
-
-
68849097857
-
Homomorphic MACs : MAC-based integrity for network coding
-
Paris-Rocquencourt, France
-
S. Agrawal and D. Boneh, "Homomorphic MACs : MAC-Based Integrity for Network Coding," in Proc. ACNS 2009, Paris-Rocquencourt, France, pp. 292-305.
-
(2009)
Proc. ACNS
, pp. 292-305
-
-
Agrawal, S.1
Boneh, D.2
-
10
-
-
77953301246
-
RIPPLE authentication for network coding
-
San Diego, CA, USA
-
Y. Li, H. Yao, M. Chen, S. Jaggi, and A. Rosen, "RIPPLE Authentication for Network Coding," in Proc. IEEE INFOCOM 2010, San Diego, CA, USA, pp. 2258-2266.
-
Proc. IEEE INFOCOM 2010
, pp. 2258-2266
-
-
Li, Y.1
Yao, H.2
Chen, M.3
Jaggi, S.4
Rosen, A.5
-
11
-
-
67049095592
-
Signing a linear subspace : Signature schemes for network coding
-
Irvine, CA, USA
-
D. Boneh, D. Freeman, J. Katz, and B. Waters, "Signing a Linear Subspace : Signature Schemes for Network Coding," in Proc. PKC 2009, Irvine, CA, USA, pp. 68-87.
-
(2009)
Proc. PKC
, pp. 68-87
-
-
Boneh, D.1
Freeman, D.2
Katz, J.3
Waters, B.4
-
12
-
-
70349653419
-
Null keys : Limiting malicious attacks via null space properties of network coding
-
Rio de Janeiro, Brazil
-
E. Kehdi and B. Li, "Null Keys : Limiting Malicious Attacks Via Null Space Properties of Network Coding," in IEEE INFOCOM 2009, Rio de Janeiro, Brazil, pp. 1224-1232.
-
(2009)
IEEE INFOCOM
, pp. 1224-1232
-
-
Kehdi, E.1
Li, B.2
-
13
-
-
79960873240
-
Padding for orthogonality : Efficient subspace authentication for network coding
-
Shanghai, China
-
P. Zhang, Y. Jiang, C. Lin, H. Yao, A. Wasef, and X. S. Shen, "Padding for Orthogonality : Efficient Subspace Authentication for Network Coding," in IEEE INFOCOM 2011, Shanghai, China, pp. 1026-1034.
-
IEEE INFOCOM 2011
, pp. 1026-1034
-
-
Zhang, P.1
Jiang, Y.2
Lin, C.3
Yao, H.4
Wasef, A.5
Shen, X.S.6
-
14
-
-
49749084764
-
On locating byzantine attackers
-
Hong Kong, China
-
M. Jafarisiavoshani, C. Fragouli, and S. Diggavi, "On Locating Byzantine Attackers," in Proc. NetCod 2008, Hong Kong, China, pp. 1-6.
-
Proc. NetCod
, vol.2008
, pp. 1-6
-
-
Jafarisiavoshani, M.1
Fragouli, C.2
Diggavi, S.3
-
15
-
-
77957830620
-
Identifying malicious nodes in network-coding-based peer-to-peer streaming networks
-
San Diego, CA, USA
-
Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana, "Identifying Malicious Nodes in Network-Coding-Based Peer-to-Peer Streaming Networks," in Proc. IEEE Mini INFOCOM 2010, San Diego, CA, USA, pp. 1-5.
-
Proc. IEEE Mini INFOCOM 2010
, pp. 1-5
-
-
Wang, Q.1
Vu, L.2
Nahrstedt, K.3
Khurana, H.4
-
16
-
-
80052990503
-
-
[Online]. Available
-
A. Le, "SpaceMac Library," 2011. [Online]. Available: http://www.ics.uci.edu/anhml/software.html#SpaceMac
-
(2011)
SpaceMac Library
-
-
Le, A.1
-
17
-
-
80053033478
-
Cooperative defense against pollution attacks in network coding using spacemac
-
[Online] Available:
-
A. Le and A. Markopoulou, "Cooperative Defense Against Pollution Attacks in Network Coding Using SpaceMac," in Technical Report. [Online]. Available: http://arxiv.org/abs/1102.3504
-
Technical Report
-
-
Le, A.1
Markopoulou, A.2
-
18
-
-
77955674519
-
Locating byzantine attackers in intra-session network coding using spacemac
-
Toronto, ON, Canada
-
A. Le and A. Markopoulou, "Locating Byzantine Attackers in Intra-Session Network Coding using SpaceMac," in Proc. NetCod 2010, Toronto, ON, Canada, pp. 1-6.
-
(2010)
Proc. NetCod
, pp. 1-6
-
-
Le, A.1
Markopoulou, A.2
-
20
-
-
47849104036
-
Subspace properties of randomized network coding
-
Bergen, Norway
-
M. Jafarisiavoshani, C. Fragouli, and S. Diggavi, "Subspace Properties of Randomized Network Coding," in Proc. ITW 2007, Bergen, Norway, pp. 1-5.
-
(2007)
Proc. ITW
, pp. 1-5
-
-
Jafarisiavoshani, M.1
Fragouli, C.2
Diggavi, S.3
|