메뉴 건너뛰기




Volumn , Issue , 2012, Pages

A multiple-MAC-based protocol to identify misbehaving nodes in network coding

Author keywords

Car to car; OFDM; Radar

Indexed keywords

CAR-TO-CAR; CRYPTOGRAPHIC OPERATIONS; EXECUTION TIME; INTERMEDIATE NODE; KEY ASSIGNMENT; MESSAGE AUTHENTICATION CODES; MISBEHAVING NODES; MULTICAST NETWORK;

EID: 84878955145     PISSN: 15502252     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/VTCFall.2012.6399271     Document Type: Conference Paper
Times cited : (3)

References (15)
  • 1
    • 79959817037 scopus 로고    scopus 로고
    • Practical defenses against pollution attacks in wireless network coding
    • June
    • J. Dong, R. Curtmola, and C. Nita-Rotaru, "Practical defenses against pollution attacks in wireless network coding, " ACM Trans. Inf. Syst. Secur., vol. 14, pp. 7:1-7:31, June 2011.
    • (2011) ACM Trans. Inf. Syst. Secur. , vol.14 , pp. 71-731
    • Dong, J.1    Curtmola, R.2    Nita-Rotaru, C.3
  • 2
    • 79960873240 scopus 로고    scopus 로고
    • Padding for orthogonality: Efficient subspace authentication for network coding
    • april
    • P. Zhang, Y. Jiang, C. Lin, H. Yao, A. Wasef, and X. Shen, "Padding for orthogonality: Efficient subspace authentication for network coding, " in INFOCOM, 2011 Proceedings IEEE, april 2011, pp. 1026 -1034.
    • (2011) INFOCOM, 2011 Proceedings IEEE , pp. 1026-1034
    • Zhang, P.1    Jiang, Y.2    Lin, C.3    Yao, H.4    Wasef, A.5    Shen, X.6
  • 4
    • 84878908921 scopus 로고    scopus 로고
    • Cooperative defense against pollution attacks in network coding using spacemac
    • abs/1102. 3504
    • A. Le and A. Markopoulou, "Cooperative defense against pollution attacks in network coding using spacemac, " CoRR, vol. abs/1102. 3504, 2011.
    • (2011) CoRR
    • Le, A.1    Markopoulou, A.2
  • 5
    • 77953307858 scopus 로고    scopus 로고
    • Mis: Malicious nodes identification scheme in network-coding-based peer-to-peer streaming
    • Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana, "Mis: Malicious nodes identification scheme in network-coding-based peer-to-peer streaming, " in INFOCOM, 2010 Proceedings IEEE, 2010, pp. 1-5.
    • (2010) INFOCOM, 2010 Proceedings IEEE , pp. 1-5
    • Wang, Q.1    Vu, L.2    Nahrstedt, K.3    Khurana, H.4
  • 10
    • 84976664565 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • January
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems, " Commun. ACM, vol. 26, pp. 96-99, January 1983.
    • (1983) Commun. ACM , vol.26 , pp. 96-99
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.