-
1
-
-
70349659577
-
Dependable and secure sensor data storage with dynamic integrity and assurance
-
Q. Wang, K. Ren, W. Lou, and Y. Zhang, "Dependable and Secure Sensor Data Storage With Dynamic Integrity and Assurance," Proc. IEEE INFOCOM, 2009.
-
(2009)
Proc. IEEE INFOCOM
-
-
Wang, Q.1
Ren, K.2
Lou, W.3
Zhang, Y.4
-
2
-
-
78649377956
-
Network coding for distributed storage in wireless networks
-
Saligrama, Springer
-
A.G. Dimakis and K. Ramchandran, "Network Coding for Distributed Storage in Wireless Networks," Networked Sensing Information and Control, Signals and Communication Series, V. Saligrama, Springer, 2008.
-
(2008)
Networked Sensing Information and Control, Signals and Communication Series
, vol.5
-
-
Dimakis, A.G.1
Ramchandran, K.2
-
3
-
-
34548321654
-
Network coding for distributed storage system
-
A.G. Dimakis, P.B. Godfrey, M.J. Wainwright, and K. Ramchandran, "Network Coding for Distributed Storage System," Proc. IEEE INFOCOM, 2007.
-
(2007)
Proc. IEEE INFOCOM
-
-
Dimakis, A.G.1
Godfrey, P.B.2
Wainwright, M.J.3
Ramchandran, K.4
-
4
-
-
33646711258
-
High availability in DHTs: Erasure coding vs. replication
-
R. Rodrigues and B. Liskov, "High Availability in DHTs: Erasure Coding vs. Replication," Peer-to-Peer Systems, 2005.
-
(2005)
Peer-to-Peer Systems
-
-
Rodrigues, R.1
Liskov, B.2
-
5
-
-
34548339912
-
Growth codes: Maximizing sensor network data persistence
-
A. Kamra and V. Misra, "Growth Codes: Maximizing Sensor Network Data Persistence," Proc. ACM SIGCOMM, 2006.
-
(2006)
Proc. ACM SIGCOMM
-
-
Kamra, A.1
Misra, V.2
-
6
-
-
34548355137
-
Data persisitence in large-scale sensor networks with decentralized fountain codes
-
Y. Lin, B. Liang, and B. Li, "Data Persisitence in Large-Scale Sensor Networks with Decentralized Fountain Codes," Proc. IEEE INFOCOM, 2007.
-
(2007)
Proc. IEEE INFOCOM
-
-
Lin, Y.1
Liang, B.2
Li, B.3
-
9
-
-
0000369806
-
Some applications of rabin's fingerprinting method
-
A.Z. Broder, "Some Applications of Rabin's Fingerprinting Method," Sequences II: Methods in Comm., Security, and Computer Science, pp. 143-152, 1993.
-
(1993)
Sequences II: Methods in Comm., Security, and Computer Science
, pp. 143-152
-
-
Broder, A.Z.1
-
12
-
-
34249316910
-
TinyPEDS: Tiny persistent encrypted data storage in asynchronous wireless sensor networks
-
DOI 10.1016/j.adhoc.2006.05.004, PII S1570870506000321
-
J. Girao, D. Westhoff, E. Mykletun, and T. Araki, "Tinypeds: Tiny Persistent Encrypted Data Storage in Asynchronous Wireless Sensor Networks," Elsevier Ad Hoc Networks, vol. 5, no. 7, 1073- 1089, 2007. (Pubitemid 46819205)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.7
, pp. 1073-1089
-
-
Girao, J.1
Westhoff, D.2
Mykletun, E.3
Araki, T.4
-
13
-
-
49149089237
-
Catch me (if you can): Data survival in unattended sensor networks
-
R.D. Pietro, L.V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, "Catch Me (If You Can): Data Survival in Unattended Sensor Networks," Proc. IEEE Sixth Ann. Int'l Conf. Pervasive Computing and Comm., 2008.
-
(2008)
Proc. IEEE Sixth Ann. Int'l Conf. Pervasive Computing and Comm.
-
-
Pietro, R.D.1
Mancini, L.V.2
Soriente, C.3
Spognardi, A.4
Tsudik, G.5
-
15
-
-
35048880121
-
Dependable and secure data storage in wireless Ad Hoc networks: An assessment of DS2
-
S. Chessa, R.D. Pietro, and P. Maestrini, "Dependable and Secure Data Storage in Wireless Ad Hoc Networks: An Assessment of DS2," Proc. WONS, 2004.
-
(2004)
Proc. WONS
-
-
Chessa, S.1
Pietro, R.D.2
Maestrini, P.3
-
16
-
-
29844438193
-
Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
-
W. Zhang, H. Song, S. Zhu, and G. Cao, "Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks," Proc. ACM MobiHoc, 2005.
-
(2005)
Proc. ACM MobiHoc
-
-
Zhang, W.1
Song, H.2
Zhu, S.3
Cao, G.4
-
19
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
M.O. Rabin, "Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance," J. ACM, vol. 36, no. 2, pp. 335- 348, 1989.
-
(1989)
J. ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
20
-
-
33745142955
-
Network coding: An instant primer
-
C. Fragouli, J.Y. Boudec, and J. Widmer, "Network Coding: An Instant Primer," ACM SIGCOMM Comm. Rev., vol. 36, 2006.
-
(2006)
ACM SIGCOMM Comm. Rev.
, vol.36
-
-
Fragouli, C.1
Boudec, J.Y.2
Widmer, J.3
-
23
-
-
0034229404
-
Network information flow
-
July
-
R. Ahlswede, N. Cai, S.R. Li, and R.W. Yeung, "Network Information Flow," IEEE Trans. Information Theory, vol. 46, no. 4, pp. 1204-1216, July 2000.
-
(2000)
IEEE Trans. Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.R.3
Yeung, R.W.4
-
24
-
-
33745135399
-
On achieving maximum multicast throughput in undirected networks
-
DOI 10.1109/TIT.2006.874515
-
Z. Li, B. Li, and L.C. Lau, "On Achieving Maximum Multicast throughput in Undirected Networks," IEEE Trans. Information Theory, vol. 52, no. 6, pp. 2467-2485, June 2006. (Pubitemid 43898904)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.6
, pp. 2467-2485
-
-
Li, Z.1
Li, B.2
Lau, L.C.3
-
25
-
-
28844481518
-
Minimum-energy multicast in mobile ad hoc networks using network coding
-
DOI 10.1109/TCOMM.2005.857148
-
Y. Wu, P. Chou, and S. Kung, "Minimum-Energy Multicast in Mobile Ad Hoc Networks Using Network Coding," IEEE Trans. Comm., vol. 53, no. 11, pp. 1906-1918, Nov. 2005. (Pubitemid 41763708)
-
(2005)
IEEE Transactions on Communications
, vol.53
, Issue.11
, pp. 1906-1918
-
-
Wu, Y.1
Chou, P.A.2
Kung, S.-Y.3
-
26
-
-
51349130622
-
An efficient signature-based scheme for securing network coding against pollution attacks
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An Efficient Signature-Based Scheme for Securing Network Coding against Pollution Attacks," Proc. IEEE INFOCOM, 2008.
-
(2008)
Proc. IEEE INFOCOM
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
27
-
-
70349664122
-
An efficient scheme for securing XOR network coding against pollution attacks
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An Efficient Scheme for Securing XOR Network Coding Against Pollution Attacks," Proc. IEEE INFOCOM, 2009.
-
(2009)
Proc. IEEE INFOCOM
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
29
-
-
79960873240
-
Padding for orthogonality: Efficient subspace authentication for network coding
-
P. Zhang, Y. Jiang, C. Lin, H. Yao, A. Wasef, and X. Shen, "Padding for Orthogonality: Efficient Subspace Authentication for Network Coding," Proc. IEEE INFOCOM, 2011.
-
(2011)
Proc. IEEE INFOCOM
-
-
Zhang, P.1
Jiang, Y.2
Lin, C.3
Yao, H.4
Wasef, A.5
Shen, X.6
-
30
-
-
73449086635
-
An efficient dynamic-identity based signature scheme for secure network coding
-
Y. Jiang, H. Zhu, M. Shi, X. Shen, and C. Lin, "An Efficient Dynamic-Identity Based Signature Scheme for Secure Network Coding," Elsevier Ad Hoc Networks, vol. 54, no. 1, pp. 28-40, 2010.
-
(2010)
Elsevier Ad Hoc Networks
, vol.54
, Issue.1
, pp. 28-40
-
-
Jiang, Y.1
Zhu, H.2
Shi, M.3
Shen, X.4
Lin, C.5
-
31
-
-
79959372660
-
A scalable and robust key pre-distribution scheme with network coding for sensor data storage networks
-
R. Zeng, Y. Jiang, C. Lin, Y. Fan, and X. Shen, "A Scalable and Robust Key Pre-Distribution Scheme with Network Coding for Sensor Data Storage Networks," ELSEVIER Computer Networks, vol. 55, no. 10, pp. 2534-2544, 2011.
-
ELSEVIER Computer Networks
, vol.55
, Issue.10
, pp. 2534-2544
-
-
Zeng, R.1
Jiang, Y.2
Lin, C.3
Fan, Y.4
Shen, X.5
-
32
-
-
0035246316
-
Efficient erasure correcting codes
-
DOI 10.1109/18.910575, PII S0018944801007350
-
M. Luby, M. Mizenmacher, M.A. Ahokrollahi, and D. Spielman, "Efficient Erasure Correcting Codes," IEEE Trans. Informantion Theory, vol. 47, no. 2, pp. 569-584, Feb. 2001. (Pubitemid 32318090)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.2
, pp. 569-584
-
-
Luby, M.G.1
Mitzenmacher, M.2
Shokrollahi, M.A.3
Spielman, D.A.4
-
33
-
-
77955178649
-
On homomorphic signatures for network coding
-
Set
-
A. Yun, J. Cheon, and Y. Kim, "On Homomorphic Signatures for Network Coding," IEEE Trans. Computers, vol. 59, no. 9, pp. 1295- 1296, Sept. 2010.
-
(2010)
IEEE Trans. Computers
, vol.59
, Issue.9
, pp. 1295-1296
-
-
Yun, A.1
Cheon, J.2
Kim, Y.3
-
34
-
-
70349682315
-
An efficient privacy- preserving scheme against traffic analysis attacks in network coding
-
Y. Fan, Y. Jiang, H. Zhu, and X. Shen, "An Efficient Privacy- Preserving Scheme Against Traffic Analysis Attacks in Network Coding," Proc. IEEE INFOCOM, 2009.
-
(2009)
Proc. IEEE INFOCOM
-
-
Fan, Y.1
Jiang, Y.2
Zhu, H.3
Shen, X.4
-
35
-
-
77953319343
-
P-Coding: Secure network coding against eavesdropping attacks
-
P. Zhang, Y. Jiang, C. Lin, Y. Fan, and X. Shen, "P-Coding: Secure Network Coding against Eavesdropping Attacks," Proc. IEEE INFOCOM, 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Zhang, P.1
Jiang, Y.2
Lin, C.3
Fan, Y.4
Shen, X.5
|