메뉴 건너뛰기




Volumn , Issue , 2011, Pages

An efficient error-detection and error-correction (EDEC) scheme for network coding

Author keywords

[No Author keywords available]

Indexed keywords

ANALYSIS AND SIMULATION; COMPUTATIONAL OVERHEADS; ERROR CONTROL; MALICIOUS ATTACK; NETWORK ENVIRONMENTS; NETWORK THROUGHPUT; NODE COMPROMISE; THROUGHPUT IMPROVEMENT;

EID: 84863146999     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2011.6134039     Document Type: Conference Paper
Times cited : (11)

References (12)
  • 3
    • 0242334165 scopus 로고    scopus 로고
    • An algebraic approach to network coding
    • R. Koetter and M. Medard, "An algebraic approach to network coding,"IEEE/ACM Transactions on Networking, vol. 11, no. 5, pp. 782-795, 2003.
    • (2003) IEEE/ACM Transactions on Networking , vol.11 , Issue.5 , pp. 782-795
    • Koetter, R.1    Medard, M.2
  • 5
    • 39049090594 scopus 로고    scopus 로고
    • Cooperative security for network coding file distribution
    • Apr.
    • C. Gkantsidis and P. Rodriguez, "Cooperative security for network coding file distribution," in IEEE INFOCOM 2006, pp. 1-13, Apr. 2006.
    • (2006) IEEE INFOCOM 2006 , pp. 1-13
    • Gkantsidis, C.1    Rodriguez, P.2
  • 7
    • 3543050732 scopus 로고    scopus 로고
    • On-the-fly verification of rateless erasure codes for efficient content distribution
    • May
    • M. Krohn, M. Freedman, and D. Mazieres, "On-the-fly verification of rateless erasure codes for efficient content distribution," in IEEE Symposium on Security and Privacy 2004, pp. 226-240, May 2004.
    • (2004) IEEE Symposium on Security and Privacy 2004 , pp. 226-240
    • Krohn, M.1    Freedman, M.2    Mazieres, D.3
  • 8
    • 70349653419 scopus 로고    scopus 로고
    • Null keys: Limiting malicious attacks via null space properties of network coding
    • Apr.
    • E. Kehdi and B. Li, "Null keys: Limiting malicious attacks via null space properties of network coding," in IEEE INFOCOM 2009, pp. 1224-1232, Apr. 2009.
    • (2009) IEEE INFOCOM 2009 , pp. 1224-1232
    • Kehdi, E.1    Li, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.