메뉴 건너뛰기




Volumn , Issue , 2012, Pages 343-351

On detecting pollution attacks in inter-session network coding

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION OVERHEADS; DETECTION SCHEME; INTER-SESSION CODING; INTERMEDIATE NODE; MULTIPLE KEYS; MULTISOURCES; POLLUTION ATTACK;

EID: 84861595495     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2012.6195771     Document Type: Conference Paper
Times cited : (20)

References (42)
  • 2
    • 49749141141 scopus 로고    scopus 로고
    • Butteflies in the Mesh: Lightweight Localized Wireless Network Coding
    • S. Omiwade, R. Zheng, and C. Hua, "Butteflies in the Mesh: Lightweight Localized Wireless Network Coding," in NetCod'08, 2008.
    • (2008) NetCod'08
    • Omiwade, S.1    Zheng, R.2    Hua, C.3
  • 3
    • 79960881977 scopus 로고    scopus 로고
    • GestureFlow: Streaming Gestures to an Audience
    • Y. Feng, Z. Liu, and B. Li, "GestureFlow : Streaming Gestures to an Audience," in IEEE INFOCOM'11, 2011.
    • (2011) IEEE INFOCOM'11
    • Feng, Y.1    Liu, Z.2    Li, B.3
  • 4
    • 0036353798 scopus 로고    scopus 로고
    • Secure Network Coding
    • N. Cai and R. W. Yeung, "Secure Network Coding," in ISIT'02, 2002.
    • (2002) ISIT'02
    • Cai, N.1    Yeung, R.W.2
  • 5
    • 46749115942 scopus 로고    scopus 로고
    • Network Error Correction Coding in Packetized Networks
    • Z. Zhang, "Network Error Correction Coding in Packetized Networks," in Info Theory Workshop, 2006.
    • Info Theory Workshop, 2006
    • Zhang, Z.1
  • 7
    • 51649121337 scopus 로고    scopus 로고
    • Coding for Errors and Erasures in Random Network Coding
    • R. Koetter and F. R. Kschischang, "Coding for Errors and Erasures in Random Network Coding," in ISIT'07, 2007.
    • (2007) ISIT'07
    • Koetter, R.1    Kschischang, F.R.2
  • 8
    • 5044242517 scopus 로고    scopus 로고
    • Byzantine Modification Detection in Multicast Networks using Randomized Network Coding
    • T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and D. R. Karger, "Byzantine Modification Detection in Multicast Networks using Randomized Network Coding," in ISIT'04, 2004.
    • (2004) ISIT'04
    • Ho, T.1    Leong, B.2    Koetter, R.3    Medard, M.4    Effros, M.5    Karger, D.R.6
  • 9
    • 70349653419 scopus 로고    scopus 로고
    • Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
    • E. Kehdi and B. Li, "Null Keys : Limiting Malicious Attacks Via Null Space Properties of Network Coding," in INFOCOM'09, 2009.
    • (2009) INFOCOM'09
    • Kehdi, E.1    Li, B.2
  • 10
    • 70349664122 scopus 로고    scopus 로고
    • An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks
    • Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks," in INFOCOM'09, 2009.
    • (2009) INFOCOM'09
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4
  • 11
    • 84861603565 scopus 로고    scopus 로고
    • Practical Defenses Against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks
    • J. Dong, R. Curtmola, and C. Nita-Rotaru, "Practical Defenses Against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks," in WiSec'09.
    • WiSec'09
    • Dong, J.1    Curtmola, R.2    Nita-Rotaru, C.3
  • 12
    • 39049090594 scopus 로고    scopus 로고
    • Cooperative Security for Network Coding File Distribution
    • C. Gkantsidis and P. R. Rodriguez, "Cooperative Security for Network Coding File Distribution," in INFOCOM'06, 2006.
    • (2006) INFOCOM'06
    • Gkantsidis, C.1    Rodriguez, P.R.2
  • 13
    • 46149123879 scopus 로고    scopus 로고
    • On the practical and security issues of batch content distribution via network coding
    • Q. Li, D.-M. Chiu, and J. C. Lui, "On the practical and security issues of batch content distribution via network coding," in ICNP'06, 2006.
    • (2006) ICNP'06
    • Li, Q.1    Chiu, D.-M.2    Lui, J.C.3
  • 14
    • 51649125221 scopus 로고    scopus 로고
    • Signatures for Content Distribution with Network Coding
    • F. Zhao, T. Kalkert, M. Medard, and K. J. Han, "Signatures for Content Distribution with Network Coding," in ISIT'07, 2007.
    • (2007) ISIT'07
    • Zhao, F.1    Kalkert, T.2    Medard, M.3    Han, K.J.4
  • 16
    • 68849117052 scopus 로고    scopus 로고
    • Signing a Linear Subspace: Signature Schemes for Network Coding
    • D. Boneh, D. Freeman, J. Katz, and B. Waters, "Signing a Linear Subspace : Signature Schemes for Network Coding," in PKC'09, 2009.
    • (2009) PKC'09
    • Boneh, D.1    Freeman, D.2    Katz, J.3    Waters, B.4
  • 17
    • 78249273398 scopus 로고    scopus 로고
    • Homomorphic MACs: MAC-Based Integrity for Network Coding
    • S. Agrawal and D. Boneh, "Homomorphic MACs : MAC-Based Integrity for Network Coding," in ACNS'09, 2009.
    • (2009) ACNS'09
    • Agrawal, S.1    Boneh, D.2
  • 19
    • 73449086635 scopus 로고    scopus 로고
    • An efficient dynamic-identity based signature scheme for secure network coding
    • Jan.
    • Y. Jiang, H. Zhu, M. Shi, X. S. Shen, and C. Lin, "An efficient dynamic-identity based signature scheme for secure network coding," Computer Networks, vol. 54, no. 1, pp. 28-40, Jan. 2010.
    • (2010) Computer Networks , vol.54 , Issue.1 , pp. 28-40
    • Jiang, Y.1    Zhu, H.2    Shi, M.3    Shen, X.S.4    Lin, C.5
  • 20
    • 79960873240 scopus 로고    scopus 로고
    • Padding for Orthogonality: Efficient Subspace Authentication for Network Coding
    • P. Zhang, Y. Jiang, C. Lin, H. Yao, A. Wasef, and X. S. Shen, "Padding for Orthogonality : Efficient Subspace Authentication for Network Coding," in INFOCOM'11.
    • INFOCOM'11
    • Zhang, P.1    Jiang, Y.2    Lin, C.3    Yao, H.4    Wasef, A.5    Shen, X.S.6
  • 22
    • 80053005778 scopus 로고    scopus 로고
    • Identifying Malicious Nodes in Network-Coding- Based Peer-to-Peer Streaming Networks
    • Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana, "Identifying Malicious Nodes in Network-Coding- Based Peer-to-Peer Streaming Networks," in Mini INFOCOM'10.
    • Mini INFOCOM'10
    • Wang, Q.1    Vu, L.2    Nahrstedt, K.3    Khurana, H.4
  • 24
    • 80053034503 scopus 로고    scopus 로고
    • TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding
    • -, "TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding," in NetCod'11, 2011.
    • (2011) NetCod'11
    • Le, A.1    Markopoulou, A.2
  • 25
    • 77957826130 scopus 로고    scopus 로고
    • Locating Byzantine Attackers in Intra-Session Network Coding using SpaceMac
    • -, "Locating Byzantine Attackers in Intra-Session Network Coding using SpaceMac," in NetCod'10, 2010.
    • (2010) NetCod'10
    • Le, A.1    Markopoulou, A.2
  • 27
    • 84888691981 scopus 로고    scopus 로고
    • Preventing Pollution Attacks in Multi-Source Network Coding
    • S. Agrawal, D. Boneh, X. Boyen, and D. Freeman, "Preventing Pollution Attacks in Multi-Source Network Coding," in PKC'10, 2010.
    • (2010) PKC'10
    • Agrawal, S.1    Boneh, D.2    Boyen, X.3    Freeman, D.4
  • 28
    • 77749315035 scopus 로고    scopus 로고
    • Short Signatures for Multi-source Network Coding
    • W. Yan, M. Yang, L. Li, and H. Fang, "Short Signatures for Multi-source Network Coding," in MINES'09, 2009.
    • (2009) MINES'09
    • Yan, W.1    Yang, M.2    Li, L.3    Fang, H.4
  • 29
    • 77955105846 scopus 로고    scopus 로고
    • Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems
    • J. Dong, R. Curtmola, C. Nita-Rotaru, and D. Yau, "Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems," in WiNC'10, 2010.
    • (2010) WiNC'10
    • Dong, J.1    Curtmola, R.2    Nita-Rotaru, C.3    Yau, D.4
  • 30
    • 3543050732 scopus 로고    scopus 로고
    • On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution
    • M. N. Krohn, M. J. Freedman, and D. Mazieres, "On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution," in SP'04, 2004.
    • (2004) SP'04
    • Krohn, M.N.1    Freedman, M.J.2    Mazieres, D.3
  • 31
    • 26444451487 scopus 로고    scopus 로고
    • On Private Scalar Product Computation for Privacy-Preserving Data Mining
    • B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen, "On Private Scalar Product Computation for Privacy-Preserving Data Mining," in ICISC'04, 2004.
    • (2004) ICISC'04
    • Goethals, B.1    Laur, S.2    Lipmaa, H.3    Mielikainen, T.4
  • 32
    • 0002757750 scopus 로고    scopus 로고
    • Keying Hash Functions for Message Authentication
    • M. Bellare, R. Canetti, H. Krawczyk, "Keying Hash Functions for Message Authentication," in CRYPTO'96, 1996.
    • (1996) CRYPTO'96
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 33
    • 85013633759 scopus 로고    scopus 로고
    • An Algebraic Watchdog for Wireless Network Coding
    • M. Kim, R. Kotter, M. Medard, and J. Barros, "An Algebraic Watchdog for Wireless Network Coding," in ISIT09, 2009.
    • (2009) ISIT09
    • Kim, M.1    Kotter, R.2    Medard, M.3    Barros, J.4
  • 34
    • 80051926174 scopus 로고    scopus 로고
    • A multi-hop multi-source algebraic watchdog
    • M. Kim, M. Medard, and J. Barros, "A multi-hop multi-source algebraic watchdog,"in ITW'10, 2010.
    • (2010) ITW'10
    • Kim, M.1    Medard, M.2    Barros, J.3
  • 38
    • 0000277371 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
    • P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes," in EUROCRYPT'99, 1999.
    • (1999) EUROCRYPT'99
    • Paillier, P.1
  • 39
    • 1642379074 scopus 로고
    • Dense probabilistic encryption
    • Apr.
    • J. Benaloh, "Dense probabilistic encryption," in Workshop on Selected Areas of Cryptography, vol. 28, no. 2, pp. 120-128, Apr. 1994.
    • (1994) Workshop on Selected Areas of Cryptography , vol.28 , Issue.2 , pp. 120-128
    • Benaloh, J.1
  • 42
    • 84966243285 scopus 로고
    • Modular Multiplication Without Trial Division
    • Apr.
    • P. L. Montgomery, "Modular Multiplication Without Trial Division," Mathematics of Computation, vol. 44, no. 170, p. 519, Apr. 1985.
    • (1985) Mathematics of Computation , vol.44 , Issue.170 , pp. 519
    • Montgomery, P.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.