-
1
-
-
68849097857
-
Homomorphic MACs: MAC-Based Integrity for Network Coding
-
Springer Verlag
-
S. Agrawal and D. Boneh. Homomorphic MACs: MAC-Based Integrity for Network Coding. In ACNS 2009. pages 292-305, Springer Verlag.
-
(2009)
ACNS
, pp. 292-305
-
-
Agrawal, S.1
Boneh, D.2
-
2
-
-
36248991171
-
How good is random linear coding based distributed network storage?
-
April
-
S. Acedanski, S. Deb, M. Medard, and R. Koetter, How good is random linear coding based distributed network storage?, in Proc. 1st Workshop on Network Coding, Theory, and Applications (Netcod05), Riva delGarda, Italy, April 2005.
-
(2005)
Proc. 1st Workshop on Network Coding, Theory, and Applications (Netcod05), Riva DelGarda, Italy
-
-
Acedanski, S.1
Deb, S.2
Medard, M.3
Koetter, R.4
-
3
-
-
0034229404
-
In Network information flow
-
R. Ahlswede, N. Cai, S. Li, and R. Yeung. In Network information flow. IEEE Transactions on Information Theory, 46(4). pages 1204-1216, 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.3
Yeung, R.4
-
4
-
-
79958003537
-
Homomorphic Signatures for Polynomial Functions
-
D. Boneh, D. M Freeman. Homomorphic Signatures for Polynomial Functions. In EUROCRYPT 2011. pages 149-168
-
(2011)
EUROCRYPT
, pp. 149-168
-
-
Boneh, D.1
Freeman, D.M.2
-
8
-
-
25644448947
-
Network coding for large scale content distribution
-
C. Gkantsidis and P. Rodriguez, Network coding for large scale content distribution, in Proc. IEEE INFOCOM05, Miami, FL, March 2005.
-
Proc. IEEE INFOCOM05, Miami, FL, March 2005
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
9
-
-
5044242517
-
Byzantine Modification Detection in Multicast Networks using Randomized Network Coding
-
T. Ho, B. Leong, R. Koetter, and M. Medard. Byzantine Modification Detection in Multicast Networks using Randomized Network Coding. In IEEE Proc. ISIT 2004.
-
IEEE Proc. ISIT 2004
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Medard, M.4
-
10
-
-
0142008000
-
The benefits of coding over routing in a randomized setting
-
July
-
T. Ho, M. Medard, M. Effros, and D. Karger, The benefits of coding over routing in a randomized setting, in Proc. IEEE Symposium on Information Theory (ISIT03), Kanagawa, Japan, July 2003.
-
(2003)
Proc. IEEE Symposium on Information Theory (ISIT03), Kanagawa, Japan
-
-
Ho, T.1
Medard, M.2
Effros, M.3
Karger, D.4
-
11
-
-
34548349361
-
Resilient network coding in the presence of Byzantine adversaries
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, M. Medard Resilient network coding in the presence of Byzantine adversaries. In Proc. INFOCOM, pages 616624, 2007.
-
(2007)
Proc. INFOCOM
, pp. 616624
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Medard, M.6
-
12
-
-
70349653419
-
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
-
E. Kehdi, B. Li, "Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding." in INFOCOM 2009 pages 1224-1232
-
(2009)
INFOCOM
, pp. 1224-1232
-
-
Kehdi, E.1
Li, B.2
-
13
-
-
33244466453
-
Network coding: The case of multiple unicast sessions
-
Z. Li and B. Li, Network coding: the case of multiple unicast sessions, in Proc. 42th Annual Allerton Conference on Communication, Control, and Computing, September-October, 2004.
-
Proc. 42th Annual Allerton Conference on Communication, Control, and Computing, September-October, 2004
-
-
Li, Z.1
Li, B.2
-
14
-
-
33845571437
-
Network coding for efficient wireless unicast
-
February
-
D. S. Lun, M. Medard, and R. Koetter, Network coding for efficient wireless unicast, in Proc. 2006 International Zurich Seminar on Communications (IZS06), Zurich, Switzerland, February 2006
-
(2006)
Proc. 2006 International Zurich Seminar on Communications (IZS06), Zurich, Switzerland
-
-
Lun, D.S.1
Medard, M.2
Koetter, R.3
-
15
-
-
49149086879
-
Explicit Non-adaptive Combinatorial Group Testing Schemes
-
E. Porat, A. Rothschild, "Explicit Non-adaptive Combinatorial Group Testing Schemes". In ICALP (1) 2008 pages 748-759
-
(2008)
ICALP
, Issue.1
, pp. 748-759
-
-
Porat, E.1
Rothschild, A.2
-
16
-
-
84867531010
-
Insecure "Provable Secure Network Coding"
-
Y. Wang, Insecure "Provable Secure Network Coding". In IACR Cryptology ePrint Archive 2009: 504, 2009
-
(2009)
IACR Cryptology EPrint Archive
, vol.504
, pp. 2009
-
-
Wang, Y.1
-
18
-
-
51349130622
-
An Efficient Signature-based Scheme for Securing Network Coding against Pollution Attacks
-
Z. Yu, T. Wei, B. Ramkumar, and Y. Guan. An Efficient Signature-based Scheme for Securing Network Coding against Pollution Attacks. In IEEE INFOCOM, 2008.
-
(2008)
IEEE INFOCOM
-
-
Yu, Z.1
Wei, T.2
Ramkumar, B.3
Guan, Y.4
|