-
2
-
-
0034229404
-
Network information flow
-
Ahlswede, R., Cai, N., Li, S-Y.R. and Yeung, R.W. (2000) 'Network information flow', IEEE Transactions on Information Theory, Vol. 46, No. 4, pp.1204-1216.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
3
-
-
3042683432
-
Message authentication using hash functions: The HMAC construction. RSA laboratories
-
Spring
-
Bellare, M., Canetti, R., and Krawczyk, H. (1996) 'Message authentication using hash functions: the HMAC construction. RSA Laboratories', CryptoBytes, Vol. 2, No. 1, Spring.
-
(1996)
CryptoBytes
, vol.2
, Issue.1
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
5
-
-
77950653458
-
Performance of network coding for ad hoc networks in realistic simulation scenarios
-
May
-
Campolo, C., Casetti, C., Chiasserini, C.F. and Tarapiah, S. (2009) 'Performance of network coding for ad hoc networks in realistic simulation scenarios', International Conference on Telecommunications (ICT), May, pp.31-36.
-
(2009)
International Conference on Telecommunications (ICT)
, pp. 31-36
-
-
Campolo, C.1
Casetti, C.2
Chiasserini, C.F.3
Tarapiah, S.4
-
6
-
-
44049100993
-
Signatures for network coding
-
DOI 10.1109/CISS.2006.286587, 4067928, 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings
-
Charles, D., Jain, K. and Lauter, K. (2006) 'Signatures for network coding', 40th Annual Conference on Information Sciences and Systems, May, pp.857-863. (Pubitemid 351710133)
-
(2007)
2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings
, pp. 857-863
-
-
Charles, D.1
Jain, K.2
Lauter, K.3
-
7
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
El Gamal, T. (1985) 'A public-key cryptosystem and a signature scheme based on discrete logarithms', IEEE Transactions on Information Theory, Vol. 31, No. 4, pp.469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
El Gamal, T.1
-
8
-
-
70349682315
-
An efficient privacy-preserving scheme against traffic analysis attacks in network coding
-
19-25 April
-
Fan, Y., Jiang, Y., Zhu, H. and Shen, X. (2009) 'An efficient privacy-preserving scheme against traffic analysis attacks in network coding', IEEE INFOCOM, 19-25 April, pp.2213-2221.
-
(2009)
IEEE INFOCOM
, pp. 2213-2221
-
-
Fan, Y.1
Jiang, Y.2
Zhu, H.3
Shen, X.4
-
9
-
-
79960595492
-
SANC: Source authentication using network coding
-
April
-
Fathy, A., ElBatt, T. and Youssef, M. (2011) 'SANC: Source Authentication Using Network Coding', IEEE SCNC Workshop, April, pp.1012-1017.
-
(2011)
IEEE SCNC Workshop
, pp. 1012-1017
-
-
Fathy, A.1
ElBatt, T.2
Youssef, M.3
-
10
-
-
33745142955
-
Network coding: An instant primer
-
DOI 10.1145/1111322.1111337
-
Fragouli, C., Le Boudec, J.Y. and Widmer, J. (2006) 'Network coding: an instant primer', ACM SIGCOMM Computer Communication Review, January, pp.63-68. (Pubitemid 46323585)
-
(2006)
Computer Communication Review
, vol.36
, Issue.1
, pp. 63-68
-
-
Fragouli, C.1
Le Boudec, J.-Y.2
Widmer, J.3
-
11
-
-
51349150827
-
Reliability gain of network coding in lossy wireless networks
-
Ghaderi, M., Towsley, D., Kurose, J. (2008) 'Reliability gain of network coding in lossy wireless networks', IEEE INFOCOM'08.
-
(2008)
IEEE INFOCOM'08
-
-
Ghaderi, M.1
Towsley, D.2
Kurose, J.3
-
12
-
-
39049090594
-
Cooperative security for network coding file distribution
-
April
-
Gkantsidis, C. and Rodriguez, P. (2006) 'Cooperative security for network coding file distribution', IEEE INFOCOM, April, pp.1-13.
-
(2006)
IEEE INFOCOM
, pp. 1-13
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
14
-
-
73449086635
-
An efficient dynamic-identity based signature scheme for secure network coding
-
Jiang, Y., Zhu, H., Shi, M., Shen, X. and Lin, C. (2010) 'An efficient dynamic-identity based signature scheme for secure network coding', ElSevier Computer Networks, Vol. 54, No. 1, pp.28-40.
-
(2010)
ElSevier Computer Networks
, vol.54
, Issue.1
, pp. 28-40
-
-
Jiang, Y.1
Zhu, H.2
Shi, M.3
Shen, X.4
Lin, C.5
-
15
-
-
45749150357
-
XORs in the air: Practical wireless network coding
-
Katti, S., Rahul, H., Hu, W., Katabi, D., Medard, M. and Crowcroft, J. (2008) 'XORs in the air: practical wireless network coding', IEEE/ACM Transactions on Networking, Vol. 16, No. 3, pp.497-510.
-
(2008)
IEEE/ACM Transactions on Networking
, vol.16
, Issue.3
, pp. 497-510
-
-
Katti, S.1
Rahul, H.2
Hu, W.3
Katabi, D.4
Medard, M.5
Crowcroft, J.6
-
16
-
-
0242334165
-
An algebraic approach to network coding
-
October
-
Koetter, R. and Medard, M. (2003) 'An algebraic approach to network coding', IEEE/ACM Transactions on Networking, Vol. 11, No. 5, October, pp.782-795.
-
(2003)
IEEE/ACM Transactions on Networking
, vol.11
, Issue.5
, pp. 782-795
-
-
Koetter, R.1
Medard, M.2
-
17
-
-
0037323073
-
Linear network coding
-
IEEE Transactions on February
-
Li, S-Y.R., Yeung, R.W. and Cai, N. (2003) 'Linear network coding', Information Theory, IEEE Transactions on, Vol.49, No. 2, February, pp.371-381.
-
(2003)
Information Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.-Y.R.1
Yeung, R.W.2
Cai, N.3
-
18
-
-
25844497569
-
On achieving optimal throughput with network coding
-
Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
-
Li, Z., Li, B., Jiang, D. and Lau, L.C. (2005) 'On achieving optimal throughput with network coding', IEEE INFOCOM'05, March, pp.2184-2194. (Pubitemid 41390727)
-
(2005)
Proceedings - IEEE INFOCOM
, vol.3
, pp. 2184-2194
-
-
Li, Z.1
Li, B.2
Jiang, D.3
Lau, L.C.4
-
19
-
-
51649118865
-
Random linear network coding: A free cipher?
-
June
-
Lima, L., Medard, M. and Barros, J. (2007) 'Random linear network coding: a free cipher?', IEEE International Symposium on Information Theory (ISIT), June, pp.546-550.
-
(2007)
IEEE International Symposium on Information Theory (ISIT)
, pp. 546-550
-
-
Lima, L.1
Medard, M.2
Barros, J.3
-
21
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Paillier, P. (1999) 'Public-key cryptosystems based on composite degree residuosity classes', EUROCRYPT, pp.223-238.
-
(1999)
EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
22
-
-
35148866571
-
Performance of network coding in ad hoc networks
-
October
-
Park, J.S., Lum, D.S., Soldo, F., Gerla, M. and Medard, M. (2006) 'Performance of network coding in ad hoc networks', IEEE Military Communications Conference (MILCOM), October, pp.1-6.
-
(2006)
IEEE Military Communications Conference (MILCOM)
, pp. 1-6
-
-
Park, J.S.1
Lum, D.S.2
Soldo, F.3
Gerla, M.4
Medard, M.5
-
24
-
-
78649298118
-
Flexible, extensible, and efficient VANET authentication
-
November
-
Studer, A., Bai, F., Bellur, B. and Perrig, A. (2008) 'Flexible, extensible, and efficient VANET authentication', IEEE 6th Annual Conference on Embedded Security in Cars (ESCAR), November, pp.1-6.
-
(2008)
IEEE 6th Annual Conference on Embedded Security in Cars (ESCAR)
, pp. 1-6
-
-
Studer, A.1
Bai, F.2
Bellur, B.3
Perrig, A.4
-
25
-
-
51249125036
-
Lightweight security for network coding
-
May
-
Vilela, J.P., Lima, L. and Barros, J. (2008) 'Lightweight security for network coding', IEEE International Conference on Communications (ICC), May, pp.1750-1754.
-
(2008)
IEEE International Conference on Communications (ICC)
, pp. 1750-1754
-
-
Vilela, J.P.1
Lima, L.2
Barros, J.3
-
26
-
-
77951613128
-
Tiered authentication of multicast traffic in wireless ad-hoc networks
-
November
-
Younis, M. and Farrag, O. (2009) 'Tiered authentication of multicast traffic in wireless ad-hoc networks', IEEE GLOBECOM'09, November, pp.1-7.
-
(2009)
IEEE GLOBECOM'09
, pp. 1-7
-
-
Younis, M.1
Farrag, O.2
-
27
-
-
69249185292
-
An efficient signature-based scheme for securing network coding against pollution attacks
-
April
-
Yu, Z., Wei, Y., Ramkumar, B. and Guan, Y. (2008) 'An efficient signature-based scheme for securing network coding against pollution attacks', IEEE INFOCOM'08, April, pp.1409-1417.
-
(2008)
IEEE INFOCOM'08
, pp. 1409-1417
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
28
-
-
77953319343
-
P-coding: Secure network coding against eavesdropping attacks
-
March
-
Zhang, P., Jiang, Y., Lin, C., Fan, Y. and Shen, X. (2010) 'P-coding: secure network coding against eavesdropping attacks', IEEE INFOCOM, March, pp.1-9.
-
(2010)
IEEE INFOCOM
, pp. 1-9
-
-
Zhang, P.1
Jiang, Y.2
Lin, C.3
Fan, Y.4
Shen, X.5
|