-
1
-
-
79551628302
-
Trusted storage over untrusted networks
-
Miami, FL, Dec
-
P. F. Oliveira, L. Lima, T. T. V. Vinhoza, M. Médard, and J. Barros, "Trusted storage over untrusted networks," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Miami, FL, Dec. 2010.
-
(2010)
Proc IEEE Global Commun. Conf. (GLOBECOM)
-
-
Oliveira, P.F.1
Lima, L.2
Vinhoza, T.T.V.3
Médard, M.4
Barros, J.5
-
2
-
-
77950347409
-
A view of cloud computing
-
M. Armbrust et al., "A view of cloud computing," Commun. ACM, vol. 53, no. 4, pp. 50-58, 2010.
-
(2010)
Commun ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
-
3
-
-
84926099526
-
Physical-layer security from inform
-
Cambridge U.K.: Cambridge Univ. Press
-
M. Bloch and J. Barros, Physical-Layer Security: From Inform. Theory to Security Eng. Cambridge, U.K.: Cambridge Univ. Press, 2011.
-
(2011)
Theory to Security Eng
-
-
Bloch, M.1
Barros, J.2
-
4
-
-
33745180496
-
Decentralized erasure codes for distributed networked storage
-
DOI 10.1109/TIT.2006.874535
-
A. G. Dimakis, V. Prabhakaran, and K. Ramchandran, "Decentralized erasure codes for distributed networked storage," IEEE/ACM Trans. Netw., vol. 52, no. 6, pp. 2809-2816, Jun. 2006. (Pubitemid 43898929)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.6
, pp. 2809-2816
-
-
Dimakis, A.G.1
Prabhakaran, V.2
Ramchandran, K.3
-
5
-
-
77955667642
-
On secure distributed data storage under repair dynamics
-
Austin, TX, Jul
-
S. Pawar, S. E.Rouayheb, andK. Ramchandran, "On secure distributed data storage under repair dynamics," in Proc. IEEE Int. Symp. Inform. Theory (ISIT), Austin, TX, Jul. 2010, pp. 2543-2547.
-
(2010)
Proc IEEE Int. Symp. Inform. Theory (ISIT)
, pp. 2543-2547
-
-
Pawar, S.1
Rouayheb, S.E.2
Ramchandran, K.3
-
6
-
-
84889424136
-
Error correction coding math
-
Hoboken NJ Wiley
-
T. K. Moon, Error Correction Coding: Math. Methods and Algorithms. Hoboken, NJ: Wiley, 2005.
-
(2005)
Methods and Algorithms
-
-
Moon, T.K.1
-
7
-
-
0021595510
-
Wire-tap channel II
-
Dec
-
L. H. OzarowandA. D.Wyner, "Wire-tap channel II," AT&T Bell Labs. Tech. J., vol. 63, no. 10, pp. 2135-2157, Dec. 1984.
-
(1984)
AT&T Bell Labs. Tech. J
, vol.63
, Issue.10
, pp. 2135-2157
-
-
Ozarowand, L.H.1
Wyner, A.D.2
-
10
-
-
84857740763
-
Secure network coding for wiretap networks of type II
-
Mar.
-
S. E. Rouayheb, E. Soljanin, and A. Sprintson, "Secure network coding for wiretap networks of type II," IEEE Trans. Inf. Theory, vol. 58, no. 3, pp. 1361-1371, Mar. 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.3
, pp. 1361-1371
-
-
Rouayheb, S.E.1
Soljanin, E.2
Sprintson, A.3
-
11
-
-
39349110413
-
Weakly secure network coding
-
Riva del Garda, Italy Apr
-
K. Bhattad and K. R. Narayanan, "Weakly secure network coding," in Proc. First Workshop on Network Coding, Theory, and Applicat. (NetCod), Riva del Garda, Italy, Apr. 2005.
-
(2005)
Proc. First Workshop on Network Coding, Theory, and Applicat. (NetCod)
-
-
Bhattad, K.1
Narayanan, K.R.2
-
12
-
-
77950676424
-
Universal weakly secure network coding
-
Volos, Greece, Jun
-
D. Silva and F. R. Kschischang, "Universal weakly secure network coding," in Proc. IEEE Inform. Theory Workshop (ITW), Volos, Greece, Jun. 2009, pp. 281-285.
-
(2009)
Proc IEEE Inform. Theory Workshop (ITW)
, pp. 281-285
-
-
Silva, D.1
Kschischang, F.R.2
-
13
-
-
51649118865
-
Random linear network coding: A free cipher?
-
Nice, France Jun
-
L. Lima, M. Médard, and J. Barros, "Random linear network coding: A free cipher?," in Proc. IEEE Int. Symp. Inform. Theory (ISIT), Nice, France, Jun. 2007.
-
(2007)
Proc. IEEE Int. Symp. Inform. Theory (ISIT)
-
-
Lima, L.1
Médard, M.2
Barros, J.3
-
14
-
-
78650893906
-
Secure network coding on a wiretap network
-
Jan.
-
N. Cai and R. W. Yeung, "Secure network coding on a wiretap network," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 424-435, Jan. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.1
, pp. 424-435
-
-
Cai, N.1
Yeung, R.W.2
-
15
-
-
70449482308
-
Strongly secure linear network coding
-
K. Harada and H. Yamamoto, "Strongly secure linear network coding," IEICE Trans. Fund. Electron., Commun., Comput. Sci., vol. 91, no. 10, pp. 2720-2728, 2008.
-
(2008)
IEICE Trans. Fund. Electron., Commun., Comput. Sci
, vol.91
, Issue.10
, pp. 2720-2728
-
-
Harada, K.1
Yamamoto, H.2
-
16
-
-
0018545449
-
How to share a secret
-
Nov
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
17
-
-
85062838317
-
Safeguarding cryptographic keys
-
Montvale, NJ AFIPS Press
-
G. Blakley, "Safeguarding cryptographic keys," in Proc. Nat. Comput. Conf., Montvale, NJ, 1979, vol. 48, pp. 313-317, AFIPS Press.
-
(1979)
Proc. Nat. Comput. Conf.
, vol.48
, pp. 313-317
-
-
Blakley, G.1
-
18
-
-
0022783866
-
Secret sharing system using (k, l, n) threshold scheme
-
H. Yamamoto, "Secret sharing system using threshold scheme," Electron. Commun. Jpn. (Part I: Commun.), vol. 69, no. 9, pp. 46-54, 1986. (Pubitemid 16638393)
-
(1986)
Electronics and Communications in Japan, Part I: Communications (English translation of Denshi Tsushin Gakkai Ronbunshi)
, vol.69
, Issue.9
, pp. 46-54
-
-
Yamamoto Hirosuke1
-
19
-
-
84947912552
-
All-or-nothing encryption and the package transform
-
Fast Software Encryption
-
R. Rivest, "All-or-nothing encryption and the package transform," in Fast Software Encryption. New York: Springer, 1997, pp. 210-218. (Pubitemid 127100717)
-
(1997)
Lecture Notes in Computer Science
, Issue.1267
, pp. 210-218
-
-
Rivest, R.L.1
-
21
-
-
0344839058
-
On the security properties of OAEP as an all-or-nothing transform
-
Springer
-
V. Boyko, "On the security properties of OAEP as an all-or-nothing transform," in Proc. Advances in Cryptology (Crypto'99), 1999, pp. 783-783, Springer.
-
(1999)
Proc. Advances in Cryptology (Crypto'99
, pp. 783-783
-
-
Boyko, V.1
-
22
-
-
0010137766
-
Something about All or Nothing (Transforms)
-
DOI 10.1023/A:1008304703074
-
D. R. Stinson, "Something about all or nothing (transforms)," Designs, Codes and Cryptography, vol. 22, no. 2, pp. 133-138, 2001. (Pubitemid 33672294)
-
(2001)
Designs, Codes, and Cryptography
, vol.22
, Issue.2
, pp. 133-138
-
-
Stinson, D.R.1
-
23
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
Apr
-
M. O. Rabin, "Efficient dispersal of information for security, load balancing, and fault tolerance," J. ACM, vol. 36, no. 2, pp. 335-348, Apr. 1989.
-
(1989)
J. ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
25
-
-
79955971286
-
DepSky: Dependable and secure storage in a cloud-of-clouds
-
Salzburg, Austria, Apr
-
A. Bessani, M. Correia, B. Quaresma, F. André, and P. Sousa, "DepSky: Dependable and secure storage in a cloud-of-clouds," in Proc. EuroSys'11, Salzburg, Austria, Apr. 2011.
-
(2011)
Proc. EuroSys'11
-
-
Bessani, A.1
Correia, M.2
Quaresma, B.3
André, F.4
Sousa, P.5
-
28
-
-
4744370532
-
Systematic MDS erasure codes based on Vandermonde matrices
-
Sep
-
J. Lacan and J. Fimes, "Systematic MDS erasure codes based on Vandermonde matrices," IEEE Commun. Lett., vol. 8, no. 9, pp. 570-572, Sep. 2004.
-
(2004)
IEEE Commun. Lett
, vol.8
, Issue.9
, pp. 570-572
-
-
Lacan, J.1
Fimes, J.2
-
29
-
-
84861355529
-
On the security of index coding with side information
-
Jun.
-
S. H. Dau, V. Skachek, and Y. M. Chee, "On the security of index coding with side information," IEEE Trans. Inf. Theory, vol. 58, no. 6, pp. 3975-3988, Jun. 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.6
, pp. 3975-3988
-
-
Dau, S.H.1
Skachek, V.2
Chee, Y.M.3
-
30
-
-
33947399169
-
Arandom linear network coding approach to multicast
-
Oct
-
T. Ho, M. Médard, R. Koetter, D. R. Karger, M. Effros, J. Shi, and B. Leong, "A random linear network coding approach to multicast," IEEE Trans. Inf. Theory, vol. 52, no. 10, pp. 4413-4430, Oct. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.52
, Issue.10
, pp. 4413-4430
-
-
Ho, T.1
Médard, M.2
Koetter, R.3
Karger, D.R.4
Effros, M.5
Shi, J.6
Leong, B.7
-
31
-
-
0036953758
-
LT codes
-
Washington DC Nov IEEE Computer Society
-
M. Luby, "LT codes," in Proc. 43rd Symp. Found. Comput. Sci., Washington, DC, Nov. 2002, pp. 271-280, IEEE Computer Society.
-
(2002)
Proc. 43rd Symp. Found. Comput. Sci.
, pp. 271-280
-
-
Luby, M.1
-
32
-
-
0000376665
-
Fast algorithms with preprocessing for matrix-vector multiplication problems
-
Dec
-
I. Gohberg and V. Olshevsky, "Fast algorithms with preprocessing for matrix-vector multiplication problems," J. Complexity, vol. 10, no. 4, pp. 411-427, Dec. 1994.
-
(1994)
J. Complexity
, vol.10
, Issue.4
, pp. 411-427
-
-
Gohberg, I.1
Olshevsky, V.2
-
33
-
-
0017495724
-
A note onWyner's wiretap channel (Corresp.)
-
May
-
A. B. Carleial andM. E. Hellman, "A note onWyner's wiretap channel (Corresp.)," IEEE Trans. Inf. Theory, vol. 23, no. 3, pp. 387-390, May 1977.
-
(1977)
IEEE Trans. Inf. Theory
, vol.23
, Issue.3
, pp. 387-390
-
-
Carleial, A.B.1
Hellman, M.E.2
-
34
-
-
49549125198
-
A network coding approach to secret key distribution
-
Sep
-
P. F. Oliveira and J. Barros, "A network coding approach to secret key distribution," IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 414-423, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.3
, pp. 414-423
-
-
Oliveira, P.F.1
Barros, J.2
|