-
1
-
-
34548342249
-
XORs in the Air: Practical Wireless Network Coding
-
S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, and J. Crowcroft, "XORs in the Air: Practical Wireless Network Coding," in SIGCOMM'06, 2006.
-
(2006)
SIGCOMM'06
-
-
Katti, S.1
Rahul, H.2
Hu, W.3
Katabi, D.4
Medard, M.5
Crowcroft, J.6
-
2
-
-
49749141141
-
Butteflies in the Mesh: Lightweight Localized Wireless Network Coding
-
S. Omiwade, R. Zheng, and C. Hua, "Butteflies in the Mesh: Lightweight Localized Wireless Network Coding," in NetCod'08, 2008.
-
(2008)
NetCod'08
-
-
Omiwade, S.1
Zheng, R.2
Hua, C.3
-
3
-
-
79960881977
-
GestureFlow: Streaming Gestures to an Audience
-
Y. Feng, Z. Liu, and B. Li, "GestureFlow : Streaming Gestures to an Audience," in IEEE INFOCOM'11, 2011.
-
(2011)
IEEE INFOCOM'11
-
-
Feng, Y.1
Liu, Z.2
Li, B.3
-
4
-
-
0036353798
-
Secure Network Coding
-
N. Cai and R. W. Yeung, "Secure Network Coding," in ISIT'02, 2002.
-
(2002)
ISIT'02
-
-
Cai, N.1
Yeung, R.W.2
-
5
-
-
46749115942
-
Network Error Correction Coding in Packetized Networks
-
Z. Zhang, "Network Error Correction Coding in Packetized Networks," in Info Theory Workshop, 2006.
-
Info Theory Workshop, 2006
-
-
Zhang, Z.1
-
6
-
-
34548349361
-
Resilient Network Coding in the Presence of Byzantine Adversaries
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, and M. Medard, "Resilient Network Coding in the Presence of Byzantine Adversaries," in INFOCOM'07.
-
INFOCOM'07
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Medard, M.6
-
7
-
-
51649121337
-
Coding for Errors and Erasures in Random Network Coding
-
R. Koetter and F. R. Kschischang, "Coding for Errors and Erasures in Random Network Coding," in ISIT'07, 2007.
-
(2007)
ISIT'07
-
-
Koetter, R.1
Kschischang, F.R.2
-
8
-
-
5044242517
-
Byzantine Modification Detection in Multicast Networks using Randomized Network Coding
-
T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and D. R. Karger, "Byzantine Modification Detection in Multicast Networks using Randomized Network Coding," in ISIT'04, 2004.
-
(2004)
ISIT'04
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Medard, M.4
Effros, M.5
Karger, D.R.6
-
9
-
-
70349653419
-
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
-
E. Kehdi and B. Li, "Null Keys : Limiting Malicious Attacks Via Null Space Properties of Network Coding," in INFOCOM'09, 2009.
-
(2009)
INFOCOM'09
-
-
Kehdi, E.1
Li, B.2
-
10
-
-
70349664122
-
An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks," in INFOCOM'09, 2009.
-
(2009)
INFOCOM'09
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
11
-
-
84861603565
-
Practical Defenses Against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks
-
J. Dong, R. Curtmola, and C. Nita-Rotaru, "Practical Defenses Against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks," in WiSec'09.
-
WiSec'09
-
-
Dong, J.1
Curtmola, R.2
Nita-Rotaru, C.3
-
12
-
-
39049090594
-
Cooperative Security for Network Coding File Distribution
-
C. Gkantsidis and P. R. Rodriguez, "Cooperative Security for Network Coding File Distribution," in INFOCOM'06, 2006.
-
(2006)
INFOCOM'06
-
-
Gkantsidis, C.1
Rodriguez, P.R.2
-
13
-
-
46149123879
-
On the practical and security issues of batch content distribution via network coding
-
Q. Li, D.-M. Chiu, and J. C. Lui, "On the practical and security issues of batch content distribution via network coding," in ICNP'06, 2006.
-
(2006)
ICNP'06
-
-
Li, Q.1
Chiu, D.-M.2
Lui, J.C.3
-
14
-
-
51649125221
-
Signatures for Content Distribution with Network Coding
-
F. Zhao, T. Kalkert, M. Medard, and K. J. Han, "Signatures for Content Distribution with Network Coding," in ISIT'07, 2007.
-
(2007)
ISIT'07
-
-
Zhao, F.1
Kalkert, T.2
Medard, M.3
Han, K.J.4
-
15
-
-
44049100993
-
Signatures for network coding
-
D. Charles, K. Jain, and K. Lauter, "Signatures for network coding," in Info Sciences and Systems, vol. 1, no. 1, 2006.
-
(2006)
Info Sciences and Systems
, vol.1
, Issue.1
-
-
Charles, D.1
Jain, K.2
Lauter, K.3
-
16
-
-
68849117052
-
Signing a Linear Subspace: Signature Schemes for Network Coding
-
D. Boneh, D. Freeman, J. Katz, and B. Waters, "Signing a Linear Subspace : Signature Schemes for Network Coding," in PKC'09, 2009.
-
(2009)
PKC'09
-
-
Boneh, D.1
Freeman, D.2
Katz, J.3
Waters, B.4
-
17
-
-
78249273398
-
Homomorphic MACs: MAC-Based Integrity for Network Coding
-
S. Agrawal and D. Boneh, "Homomorphic MACs : MAC-Based Integrity for Network Coding," in ACNS'09, 2009.
-
(2009)
ACNS'09
-
-
Agrawal, S.1
Boneh, D.2
-
18
-
-
77953301246
-
RIPPLE Authentication for Network Coding
-
Y. Li, H. Yao, M. Chen, S. Jaggi, and A. Rosen, "RIPPLE Authentication for Network Coding," in INFOCOM'10, 2010.
-
(2010)
INFOCOM'10
-
-
Li, Y.1
Yao, H.2
Chen, M.3
Jaggi, S.4
Rosen, A.5
-
19
-
-
73449086635
-
An efficient dynamic-identity based signature scheme for secure network coding
-
Jan.
-
Y. Jiang, H. Zhu, M. Shi, X. S. Shen, and C. Lin, "An efficient dynamic-identity based signature scheme for secure network coding," Computer Networks, vol. 54, no. 1, pp. 28-40, Jan. 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.1
, pp. 28-40
-
-
Jiang, Y.1
Zhu, H.2
Shi, M.3
Shen, X.S.4
Lin, C.5
-
20
-
-
79960873240
-
Padding for Orthogonality: Efficient Subspace Authentication for Network Coding
-
P. Zhang, Y. Jiang, C. Lin, H. Yao, A. Wasef, and X. S. Shen, "Padding for Orthogonality : Efficient Subspace Authentication for Network Coding," in INFOCOM'11.
-
INFOCOM'11
-
-
Zhang, P.1
Jiang, Y.2
Lin, C.3
Yao, H.4
Wasef, A.5
Shen, X.S.6
-
22
-
-
80053005778
-
Identifying Malicious Nodes in Network-Coding- Based Peer-to-Peer Streaming Networks
-
Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana, "Identifying Malicious Nodes in Network-Coding- Based Peer-to-Peer Streaming Networks," in Mini INFOCOM'10.
-
Mini INFOCOM'10
-
-
Wang, Q.1
Vu, L.2
Nahrstedt, K.3
Khurana, H.4
-
24
-
-
80053034503
-
TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding
-
-, "TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding," in NetCod'11, 2011.
-
(2011)
NetCod'11
-
-
Le, A.1
Markopoulou, A.2
-
25
-
-
77957826130
-
Locating Byzantine Attackers in Intra-Session Network Coding using SpaceMac
-
-, "Locating Byzantine Attackers in Intra-Session Network Coding using SpaceMac," in NetCod'10, 2010.
-
(2010)
NetCod'10
-
-
Le, A.1
Markopoulou, A.2
-
27
-
-
84888691981
-
Preventing Pollution Attacks in Multi-Source Network Coding
-
S. Agrawal, D. Boneh, X. Boyen, and D. Freeman, "Preventing Pollution Attacks in Multi-Source Network Coding," in PKC'10, 2010.
-
(2010)
PKC'10
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
Freeman, D.4
-
28
-
-
77749315035
-
Short Signatures for Multi-source Network Coding
-
W. Yan, M. Yang, L. Li, and H. Fang, "Short Signatures for Multi-source Network Coding," in MINES'09, 2009.
-
(2009)
MINES'09
-
-
Yan, W.1
Yang, M.2
Li, L.3
Fang, H.4
-
29
-
-
77955105846
-
Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems
-
J. Dong, R. Curtmola, C. Nita-Rotaru, and D. Yau, "Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems," in WiNC'10, 2010.
-
(2010)
WiNC'10
-
-
Dong, J.1
Curtmola, R.2
Nita-Rotaru, C.3
Yau, D.4
-
30
-
-
3543050732
-
On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution
-
M. N. Krohn, M. J. Freedman, and D. Mazieres, "On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution," in SP'04, 2004.
-
(2004)
SP'04
-
-
Krohn, M.N.1
Freedman, M.J.2
Mazieres, D.3
-
31
-
-
26444451487
-
On Private Scalar Product Computation for Privacy-Preserving Data Mining
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen, "On Private Scalar Product Computation for Privacy-Preserving Data Mining," in ICISC'04, 2004.
-
(2004)
ICISC'04
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikainen, T.4
-
33
-
-
85013633759
-
An Algebraic Watchdog for Wireless Network Coding
-
M. Kim, R. Kotter, M. Medard, and J. Barros, "An Algebraic Watchdog for Wireless Network Coding," in ISIT09, 2009.
-
(2009)
ISIT09
-
-
Kim, M.1
Kotter, R.2
Medard, M.3
Barros, J.4
-
34
-
-
80051926174
-
A multi-hop multi-source algebraic watchdog
-
M. Kim, M. Medard, and J. Barros, "A multi-hop multi-source algebraic watchdog,"in ITW'10, 2010.
-
(2010)
ITW'10
-
-
Kim, M.1
Medard, M.2
Barros, J.3
-
38
-
-
0000277371
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes," in EUROCRYPT'99, 1999.
-
(1999)
EUROCRYPT'99
-
-
Paillier, P.1
-
39
-
-
1642379074
-
Dense probabilistic encryption
-
Apr.
-
J. Benaloh, "Dense probabilistic encryption," in Workshop on Selected Areas of Cryptography, vol. 28, no. 2, pp. 120-128, Apr. 1994.
-
(1994)
Workshop on Selected Areas of Cryptography
, vol.28
, Issue.2
, pp. 120-128
-
-
Benaloh, J.1
-
40
-
-
0242426103
-
The TESLA Broadcast Authentication Protocol
-
A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "The TESLA Broadcast Authentication Protocol," RSA CryptoBytes, vol. 5, 2002.
-
(2002)
RSA CryptoBytes
, vol.5
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
41
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
R. Canetti, J. Garayt, G. Itkid, D. Micciancios, M. Naore, and B. Pinkasll, "Multicast security: a taxonomy and some efficient constructions," in INFOCOM '99.
-
INFOCOM '99
-
-
Canetti, R.1
Garayt, J.2
Itkid, G.3
Micciancios, D.4
Naore, M.5
Pinkasll, B.6
-
42
-
-
84966243285
-
Modular Multiplication Without Trial Division
-
Apr.
-
P. L. Montgomery, "Modular Multiplication Without Trial Division," Mathematics of Computation, vol. 44, no. 170, p. 519, Apr. 1985.
-
(1985)
Mathematics of Computation
, vol.44
, Issue.170
, pp. 519
-
-
Montgomery, P.L.1
|