-
1
-
-
0034229404
-
Network information flow
-
July
-
R. Ahlswede, N. Cai, S.-Y.R. Li, and R.W. Yeung, "Network Information Flow," IEEE Trans. Information Theory, vol. 46, no. 4, pp. 1204-1216, July 2000.
-
(2000)
IEEE Trans. Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
2
-
-
45749150357
-
Xors in the air: Practical wireless network coding
-
June
-
S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, and J. Crowcroft, "XORs in the Air: Practical Wireless Network Coding," IEEE/ACM Trans. Networking, vol. 16, no. 3, pp. 497-510, June 2008.
-
(2008)
IEEE/ACM Trans. Networking
, vol.16
, Issue.3
, pp. 497-510
-
-
Katti, S.1
Rahul, H.2
Hu, W.3
Katabi, D.4
Medard, M.5
Crowcroft, J.6
-
3
-
-
25644448947
-
Network coding for large scale content distribution
-
Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
-
C. Gkantsidis and P.R. Rodriguez, "Network Coding for Large Scale Content Distribution," Proc. IEEE INFOCOM, pp. 2235-2245, 2005. (Pubitemid 41382341)
-
(2005)
Proceedings - IEEE INFOCOM
, vol.4
, pp. 2235-2245
-
-
Gkantsidis, C.1
Rodriguez, P.R.2
-
4
-
-
34548321654
-
Network coding for distributed storage systems
-
DOI 10.1109/INFCOM.2007.232, 4215814, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
A.G. Dimakis, P.B. Godfrey, M.J. Wainwright, and K. Ramchandran, "Network Coding for Distributed Storage Systems," Proc. IEEE INFOCOM, pp. 2000-2008, 2007. (Pubitemid 47334432)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 2000-2008
-
-
Dimakis, A.G.1
Godfrey, P.B.2
Wainwright, M.J.3
Ramchandran, K.4
-
5
-
-
82055199252
-
On counteracting byzantine attacks in network coded peer-to-peer networks
-
June
-
M. Kim, L. Lima, F. Zhao, J. Barros, M. Medard, R. Koetter, T. Kalkert, and K.J. Han, "On Counteracting Byzantine Attacks in Network Coded Peer-To-Peer Networks," IEEE J. Selected Areas in Comm., vol. 28, no. 5, pp. 692-702, June 2010.
-
(2010)
IEEE J. Selected Areas in Comm
, vol.28
, Issue.5
, pp. 692-702
-
-
Kim, M.1
Lima, L.2
Zhao, F.3
Barros, J.4
Medard, M.5
Koetter, R.6
Kalkert, T.7
Han, K.J.8
-
6
-
-
79959817037
-
Practical defenses against pollution attacks in wireless network coding
-
May 2011
-
J. Dong, R. Curtmola, and C. Nita-Rotaru, "Practical Defenses against Pollution Attacks in Wireless Network Coding," ACM Trans. Information and System Security, vol. 14, no. 1, pp. 7:1-7:31, May 2011.
-
ACM Trans. Information and System Security
, vol.14
, Issue.1
, pp. 71-731
-
-
Dong, J.1
Curtmola, R.2
Nita-Rotaru, C.3
-
7
-
-
3543050732
-
On-The-fly verification of rateless erasure codes for efficient content distribution
-
M. Krohn, M. Freedman, and D. Mazieres, "On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution," Proc. IEEE Symp. Security and Privacy, pp. 226-240, 2004.
-
(2004)
Proc IEEE Symp. Security and Privacy
, pp. 226-240
-
-
Krohn, M.1
Freedman, M.2
Mazieres, D.3
-
8
-
-
44049100993
-
Signatures for network coding
-
DOI 10.1109/CISS.2006.286587, 4067928, 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings
-
D. Charles, K. Jain, and K. Lauter, "Signatures for Network Coding," Proc. 40th Ann. Conf. Information Sciences and Systems, pp. 857-863, 2006. (Pubitemid 351710133)
-
(2007)
2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings
, pp. 857-863
-
-
Charles, D.1
Jain, K.2
Lauter, K.3
-
9
-
-
51649125221
-
Signatures for content distribution with network coding
-
F. Zhao, T. Kalker, M. Medard, and K.J. Han, "Signatures for Content Distribution with Network Coding," Proc. IEEE Int'l Symp. Information Theory (ISIT), pp. 556-560, 2007.
-
(2007)
Proc IEEE Int'l Symp. Information Theory (ISIT)
, pp. 556-560
-
-
Zhao, F.1
Kalker, T.2
Medard, M.3
Han, K.J.4
-
10
-
-
77955178649
-
On homomorphic signatures for network coding
-
Mar. 2010
-
A. Yun, J.H. Cheon, and Y. Kim, "On Homomorphic Signatures for Network Coding," IEEE Trans. Computers, vol. 59, no. 9, pp. 1295-1296, Mar. 2010.
-
IEEE Trans. Computers
, vol.59
, Issue.9
, pp. 1295-1296
-
-
Yun, A.1
Cheon, J.H.2
Kim, Y.3
-
11
-
-
84655169995
-
An authentication code against pollution attacks in network coding
-
June
-
F. Oggier and H. Fathi, "An Authentication Code against Pollution Attacks in Network Coding," IEEE/ACM Trans. Networking, vol. 16, no. 3, pp. 497-510, June 2011.
-
(2011)
IEEE/ACM Trans. Networking
, vol.16
, Issue.3
, pp. 497-510
-
-
Oggier, F.1
Fathi, H.2
-
12
-
-
78649897589
-
Secure network coding over the integers
-
R. Gennaro, J. Katz, H. Krawczyk, and T. Rabin, "Secure Network Coding over the Integers," Proc. Int'l Conf. Practice and Theory in Public Key Cryptography (PKC), pp. 142-160, 2010.
-
(2010)
Proc. Int'l Conf. Practice and Theory in Public Key Cryptography (PKC)
, pp. 142-160
-
-
Gennaro, R.1
Katz, J.2
Krawczyk, H.3
Rabin, T.4
-
13
-
-
80052878696
-
Detection and recovery from pollution attacks in coding based distributed storage schemes
-
Dec
-
L. Buttyan, L. Czap, and I. Vajda, "Detection and Recovery from Pollution Attacks in Coding Based Distributed Storage Schemes," IEEE Trans. Dependable and Secure Computing, vol. 8, no 6, pp. 824-838, Dec. 2011.
-
(2011)
IEEE Trans. Dependable and Secure Computing
, vol.8
, Issue.6
, pp. 824-838
-
-
Buttyan, L.1
Czap, L.2
Vajda, I.3
-
15
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
A. Perrig, R. Canetti, D. Song, and J.D. Tygar, "Efficient and Secure Source Authentication for Multicast," Proc. Network and Distributed System Security Symp. (NDSS), pp. 35-46, 2001.
-
(2001)
Proc. Network and Distributed System Security Symp. (NDSS)
, pp. 35-46
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, J.D.4
-
16
-
-
77953301246
-
Ripple authentication for network coding
-
Y. Li, H. Yao, M. Chen, S. Jaggi, and A. Rosen, "RIPPLE Authentication for Network Coding," Proc. IEEE INFOCOM, pp. 2258-2266, 2010.
-
Proc IEEE INFOCOM
, vol.2010
, pp. 2258-2266
-
-
Li, Y.1
Yao, H.2
Chen, M.3
Jaggi, S.4
Rosen, A.5
-
18
-
-
84856294814
-
Cooperative defense against pollution attacks in network coding using spaceMac
-
A. Le and A. Markopoulou, "Cooperative Defense against Pollution Attacks in Network Coding Using SpaceMac," IEEE J. Selected Areas in Communications, vol. 30, no. 2, pp. 442-449, 2012.
-
(2012)
IEEE J. Selected Areas in Communications
, vol.30
, Issue.2
, pp. 442-449
-
-
Markopoulou, A.1
-
19
-
-
79960873240
-
Padding for orthogonality: Efficient subspace authentication for network coding
-
P. Zhang, Y. Jiang, C. Lin, H. Yao, A. Wasef, and X. Shen, "Padding for Orthogonality: Efficient Subspace Authentication for Network Coding," Proc. IEEE INFOCOM, pp. 1026-1034, 2011.
-
(2011)
Proc IEEE INFOCOM
, pp. 1026-1034
-
-
Zhang, P.1
Jiang, Y.2
Lin, C.3
Yao, H.4
Wasef, A.5
Shen, X.6
-
20
-
-
20544449877
-
Practical network coding
-
P. Chou, Y. Wu, and K. Jain, "Practical Network Coding," Proc. Allerton Conf. Comm., Control, and Computing, 2003.
-
(2003)
Proc. Allerton Conf. Comm., Control, and Computing
-
-
Chou, P.1
Wu, Y.2
Jain, K.3
-
21
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast Security: A Taxonomy and Some Efficient Constructions," Proc. IEEE INFOCOM, Mar. 1999.
-
(1999)
Proc IEEE INFOCOM, Mar
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
22
-
-
33751508709
-
Recommendation for key management
-
Revision 3, NIST
-
E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, "Recommendation for Key Management," Special Publication 800-57 Part 1, Revision 3, NIST, 2011.
-
(2011)
Special Publication 800-57 Part 1
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
23
-
-
82155162441
-
A novel homomorphic mac scheme for authentication in network coding
-
Nov. 2011
-
C. Cheng and T. Jiang, "A Novel Homomorphic MAC Scheme for Authentication in Network Coding," IEEE Comm. Letters, vol. 15, no. 11, pp. 1228-1230, Nov. 2011.
-
IEEE Comm. Letters
, vol.15
, Issue.11
, pp. 1228-1230
-
-
Cheng, C.1
Jiang, T.2
-
25
-
-
63149146072
-
Fast galois field arithmetic library in c/c++
-
Univ. of Tennessee Mar
-
J.S. Plank, "Fast Galois Field Arithmetic Library in C/C++," Technical Report UT-CS-07-593, Univ. of Tennessee, Mar. 2007.
-
(2007)
Technical Report UT-CS-07-593
-
-
Plank, J.S.1
|