-
1
-
-
0034229404
-
Network information flow
-
July
-
R. Ahlswede, N. Cai, S.-Y. Li, and R. Yeung, "Network information flow," IEEE Transactions on Information Theory, vol. 46, pp. 1204-1216, July 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.3
Yeung, R.4
-
2
-
-
0037323073
-
Linear network coding
-
S.-Y. Li, R. W. Yeung, and N. Cai, "Linear network coding," IEEE Transactions on Information Theory, vol. 49, no. 2, pp. 371-381, 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.-Y.1
Yeung, R.W.2
Cai, N.3
-
3
-
-
0242334165
-
An algebraic approach to network coding
-
R. Koetter and M. Medard, "An algebraic approach to network coding,"IEEE/ACM Transactions on Networking, vol. 11, no. 5, pp. 782-795, 2003.
-
(2003)
IEEE/ACM Transactions on Networking
, vol.11
, Issue.5
, pp. 782-795
-
-
Koetter, R.1
Medard, M.2
-
4
-
-
5044242517
-
Byzantine modification detection in multicast networks using randomized network coding
-
July
-
T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and D. Karger, "Byzantine modification detection in multicast networks using randomized network coding," in International Symposium on Information Theory (ISIT) 2004, p. 144, July 2004.
-
(2004)
International Symposium on Information Theory (ISIT) 2004
, pp. 144
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Medard, M.4
Effros, M.5
Karger, D.6
-
5
-
-
39049090594
-
Cooperative security for network coding file distribution
-
Apr.
-
C. Gkantsidis and P. Rodriguez, "Cooperative security for network coding file distribution," in IEEE INFOCOM 2006, pp. 1-13, Apr. 2006.
-
(2006)
IEEE INFOCOM 2006
, pp. 1-13
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
7
-
-
3543050732
-
On-the-fly verification of rateless erasure codes for efficient content distribution
-
May
-
M. Krohn, M. Freedman, and D. Mazieres, "On-the-fly verification of rateless erasure codes for efficient content distribution," in IEEE Symposium on Security and Privacy 2004, pp. 226-240, May 2004.
-
(2004)
IEEE Symposium on Security and Privacy 2004
, pp. 226-240
-
-
Krohn, M.1
Freedman, M.2
Mazieres, D.3
-
8
-
-
70349653419
-
Null keys: Limiting malicious attacks via null space properties of network coding
-
Apr.
-
E. Kehdi and B. Li, "Null keys: Limiting malicious attacks via null space properties of network coding," in IEEE INFOCOM 2009, pp. 1224-1232, Apr. 2009.
-
(2009)
IEEE INFOCOM 2009
, pp. 1224-1232
-
-
Kehdi, E.1
Li, B.2
-
9
-
-
33749439326
-
Correction of adversarial errors in networks
-
S. Jaggi, M. Langberg, T. Ho, and M. Effros, "Correction of adversarial errors in networks," in Proc. of International Symposium on Information Theory (ISIT 2005), pp. 1455-1459, 2005.
-
(2005)
Proc. of International Symposium on Information Theory (ISIT 2005)
, pp. 1455-1459
-
-
Jaggi, S.1
Langberg, M.2
Ho, T.3
Effros, M.4
-
10
-
-
44049100993
-
Signatures for network coding
-
D. Charles, K. Jain, and K. Lauter, "Signatures for network coding," in Proc. of CISS'06, pp. 857-863, 2006.
-
(2006)
Proc. of CISS'06
, pp. 857-863
-
-
Charles, D.1
Jain, K.2
Lauter, K.3
|