-
1
-
-
51649109673
-
On wiretap networks II
-
Nice, France, Jun
-
S. R. El and E. Soljanin, "On wiretap networks II," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 2007, pp. 551-555.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 551-555
-
-
El, S.R.1
Soljanin, E.2
-
2
-
-
0034229404
-
Network information flow
-
Jul
-
R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, "Network information flow," IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1204-1216, Jul. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
3
-
-
0037323073
-
Linear network coding
-
Feb
-
S.-Y. R. Li, R. W. Yeung, and N. Cai, "Linear network coding," IEEE Trans. Inf. Theory, vol. 49, no. 2, pp. 371-381, Feb. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.-Y.R.1
Yeung, R.W.2
Cai, N.3
-
5
-
-
52349100761
-
On the optimality of a construction of secure network codes
-
S. W. Yeung and N. Cai, "On the optimality of a construction of secure network codes," in Proc. IEEE Int. Symp. Inf. Theory, 2008, pp. 166-170.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 166-170
-
-
Yeung, S.W.1
Cai, N.2
-
6
-
-
33750025166
-
On the capacity of secure network coding
-
[CD ROM]. Sep
-
J. Feldman, T. Malkin, C. Stein, and R. A. Servedio, "On the capacity of secure network coding," in Proc. 42nd Annu. Allerton Conf. Commun., Control, and Comput., Sep. 2004, [CD ROM].
-
(2004)
Proc. 42nd Annu. Allerton Conf. Commun., Control, and Comput.
-
-
Feldman, J.1
Malkin, T.2
Stein, C.3
Servedio, R.A.4
-
7
-
-
1842815876
-
Security based on network topology against the wiretapping attack
-
Feb
-
K. Jain, "Security based on network topology against the wiretapping attack," IEEE Wireless Commun., vol. 11, no. 1, pp. 68-71, Feb. 2004.
-
(2004)
IEEE Wireless Commun.
, vol.11
, Issue.1
, pp. 68-71
-
-
Jain, K.1
-
8
-
-
61849154643
-
Weakly secure network coding
-
Appl., Apr., [CD ROM]
-
K. Bhattad and K. R. Narayanan, "Weakly secure network coding," in Proc. 1st Workshop Netw. Cod, Theory, Appl., Apr. 2005, [CD ROM].
-
(2005)
Proc. 1st Workshop Netw. Cod, Theory
-
-
Bhattad, K.1
Narayanan, K.R.2
-
9
-
-
5044242517
-
Byzantine modification detection in multicast networks using randomized network coding
-
Jun
-
T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and D. Karger, "Byzantine modification detection in multicast networks using randomized network coding," in Proc. 2004 IEEE Int. Symp. Inf. Theory, Jun. 2004, pp. 144-.
-
(2004)
Proc. 2004 IEEE Int. Symp. Inf. Theory
, pp. 144
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Medard, M.4
Effros, M.5
Karger, D.6
-
10
-
-
33749439326
-
Correction of adversarial errors in networks
-
S. Jaggi, M. Langberg, T. Ho, and M. Effros, "Correction of adversarial errors in networks," in Proc. IEEE Int. Symp. Inf. Theory, 2007, pp. 1455-1459.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1455-1459
-
-
Jaggi, S.1
Langberg, M.2
Ho, T.3
Effros, M.4
-
11
-
-
34548349361
-
Resilient network coding in the presence of byzantine adversaries
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, and M. Medard, "Resilient network coding in the presence of byzantine adversaries," in Proc. 26th IEEE Int. Conf. Comput. Commun., 2005, pp. 616-624.
-
(2005)
Proc. 26th IEEE Int. Conf. Comput. Commun.
, pp. 616-624
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Medard, M.6
-
12
-
-
45249101743
-
Resilient network coding in the presence of byzantine adversaries
-
Jun
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, M. Medard, and M. Effros, "Resilient network coding in the presence of byzantine adversaries," IEEE Trans. Inform. Theory, vol. 54, no. 6, pp. 2596-2603, Jun. 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, Issue.6
, pp. 2596-2603
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Medard, M.6
Effros, M.7
-
13
-
-
38349097767
-
Network error correction, Part I: Basic concepts and upper bounds
-
N. Cai and R. W. Yeung, "Network error correction, Part I: Basic concepts and upper bounds," Commun. Inf. Syst., no. 1, pp. 19-36, 2006.
-
(2006)
Commun. Inf. Syst.
, Issue.1
, pp. 19-36
-
-
Cai, N.1
Yeung, R.W.2
-
14
-
-
38349083344
-
Network error correction, Part II: Lower bounds
-
N. Cai and R. W. Yeung, "Network error correction, Part II: Lower bounds," Commun. Inf. Syst., no. 1, pp. 37-53, 2006.
-
(2006)
Commun. Inf. Syst.
, Issue.1
, pp. 37-53
-
-
Cai, N.1
Yeung, R.W.2
-
15
-
-
48849089497
-
Coding for errors and erasures in random network coding
-
Aug
-
R. Koetter and F. Kschischang, "Coding for errors and erasures in random network coding," IEEE Trans. Inf. Theory, vol. 54, no. 8, pp. 3579-3591, Aug. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.8
, pp. 3579-3591
-
-
Koetter, R.1
Kschischang, F.2
-
16
-
-
51349146209
-
A rank-metric approach to error control in random network coding
-
Aug
-
D. Silva, R. Koetter, and F. Kschischang, "A rank-metric approach to error control in random network coding," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 3951-3967, Aug. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 3951-3967
-
-
Silva, D.1
Koetter, R.2
Kschischang, F.3
-
17
-
-
0021595510
-
The wire-tap channel II
-
L. H. Ozarow and A. D. Wyner, "The wire-tap channel II," Bell Syst. Tech. J., vol. 63, pp. 2135-2157, 1984.
-
(1984)
Bell Syst. Tech. J.
, vol.63
, pp. 2135-2157
-
-
Ozarow, L.H.1
Wyner, A.D.2
-
19
-
-
20544473127
-
Polynomial time algorithms for multicast network code construction
-
Jun
-
S. Jaggi, P. Sanders, P. Chou, M. Effros, S. Egner, K. Jain, and L. Tolhuizen, "Polynomial time algorithms for multicast network code construction," IEEE Trans. Inform. Theory, vol. 51, no. 6, pp. 1973-1982, Jun. 2005.
-
(2005)
IEEE Trans. Inform. Theory
, vol.51
, Issue.6
, pp. 1973-1982
-
-
Jaggi, S.1
Sanders, P.2
Chou, P.3
Effros, M.4
Egner, S.5
Jain, K.6
Tolhuizen, L.7
-
20
-
-
33947377921
-
Information flow decomposition for network coding
-
Mar
-
C. Fragouli and E. Soljanin, "Information flow decomposition for network coding," IEEE Trans. Inf. Theory, vol. 52, no. 3, pp. 829-848, Mar. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.3
, pp. 829-848
-
-
Fragouli, C.1
Soljanin, E.2
-
21
-
-
33745155370
-
The encoding complexity of network coding
-
Jun
-
M. Langberg, A. Sprintson, and J. Bruck, "The encoding complexity of network coding," IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2386-2397, Jun. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.6
, pp. 2386-2397
-
-
Langberg, M.1
Sprintson, A.2
Bruck, J.3
-
22
-
-
58349107919
-
Network coding: A computational perspective
-
Jan
-
M. Langberg, A. Sprintson, and J. Bruck, "Network coding: A computational perspective," IEEE Trans. Inf. Theory, vol. 55, no. 1, pp. 147-157, Jan. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.1
, pp. 147-157
-
-
Langberg, M.1
Sprintson, A.2
Bruck, J.3
-
23
-
-
52349119694
-
Security for wiretap networks via rank-metric codes
-
Jul
-
D. Silva and F. R. Kschischang, "Security for wiretap networks via rank-metric codes," in Proc. IEEE Int. Symp. Inf. Theory, Toronto, Canada, Jul. 2008, pp. 176-180.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory, Toronto, Canada
, pp. 176-180
-
-
Silva, D.1
Kschischang, F.R.2
-
24
-
-
79251506640
-
Universal secure network coding via rank-metric codes
-
Feb
-
D. Silva and F. R. Kschischang, "Universal secure network coding via rank-metric codes," IEEE Trans. Inf. Theory vol. 52, no. 2, pp. 1124-1135, Feb. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.52
, Issue.2
, pp. 1124-1135
-
-
Silva, D.1
Kschischang, F.R.2
-
25
-
-
52349122643
-
On secure communication over wireless erasure networks
-
Toronto, Canada, Jul
-
A. Mills, B. Smith, T. C. Clancy, E. Soljanin, and S. Vishwanath, "On secure communication over wireless erasure networks," in Proc. IEEE Int. Symp. Inf. Theory, Toronto, Canada, Jul. 2008, pp. 161-165.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 161-165
-
-
Mills, A.1
Smith, B.2
Clancy, T.C.3
Soljanin, E.4
Vishwanath, S.5
-
27
-
-
0016562514
-
The wiretap channel
-
A. D. Wyner, "The wiretap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
28
-
-
47849089589
-
-
Breda, The Netherlands: Now Publishers
-
R. Yeung, S.-Y Li, N. Cai, and Z. Zhang, Network Coding Theory (Foundations and Trends in Communications and Information Theory). Breda, The Netherlands: Now Publishers, 2006.
-
(2006)
Network Coding Theory (Foundations and Trends in Communications and Information Theory).
-
-
Yeung, R.1
Li, S.-Y.2
Cai, N.3
Zhang, Z.4
-
29
-
-
0026219389
-
Generalized hamming weights for linear codes
-
Sep
-
V. K. Wei, "Generalized hamming weights for linear codes," IEEE Trans. Inf. Theory, vol. 37, no. 5, pp. 1412-1518, Sep. 1991.
-
(1991)
IEEE Trans. Inf. Theory
, vol.37
, Issue.5
, pp. 1412-1518
-
-
Wei, V.K.1
-
30
-
-
77950823812
-
Network generalized hamming weight
-
presented at, Lausanne, Switzerland, Jun
-
C.-K. Ngai, R. W. Yeung, and Z. Zhang, "Network generalized hamming weight," presented at the presented at the Workshop Netw. Cod., Theory Appl., Lausanne, Switzerland, Jun. 2009.
-
(2009)
The presented at the Workshop Netw. Cod., Theory Appl.
-
-
Ngai, C.-K.1
Yeung, R.W.2
Zhang, Z.3
-
31
-
-
46749115942
-
Network error correction coding in packetized networks
-
Chengdu, China, Oct
-
Z. Zhang, "Network error correction coding in packetized networks," in Proc. IEEE Int. Inf. Theory Workshop, Chengdu, China, Oct. 2006, pp. 433-437.
-
(2006)
Proc. IEEE Int. Inf. Theory Workshop
, pp. 433-437
-
-
Zhang, Z.1
-
32
-
-
47849109698
-
Characterizations of network error correction/detection and erasure correction
-
San Diego, CA, Jan
-
S. Yang and R. W. Yeung, "Characterizations of network error correction/detection and erasure correction," in Proc. 3rd Workshop Netw. Cod., Theory, Appl., San Diego, CA, Jan. 2007.
-
(2007)
Proc. 3rd Workshop Netw. Cod., Theory, Appl.
-
-
Yang, S.1
Yeung, R.W.2
|