-
1
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret, " Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
2
-
-
0002531104
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation, " in ACM STOC, 1988.
-
(1988)
ACM STOC
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
T. Pedersen, "A threshold cryptosystem without a trusted party, " in Advances in Cryptology-EUROCRYPT, 1991, pp. 522-526.
-
(1991)
Advances in Cryptology-EUROCRYPT
, pp. 522-526
-
-
Pedersen, T.1
-
4
-
-
67651039764
-
Potshards: A secure, recoverable, long-term archival storage system
-
M. Storer, K. Greenan, E. Miller, and K. Voruganti, "Potshards: A secure, recoverable, long-term archival storage system, " ACM Trans. on Storage, 2009.
-
(2009)
ACM Trans. on Storage
-
-
Storer, M.1
Greenan, K.2
Miller, E.3
Voruganti, K.4
-
5
-
-
0027341860
-
Perfectly secure message transmission
-
D. Dolev, C. Dwork, O. Waarts, and M. Yung, "Perfectly secure message transmission, " Journal of the ACM, vol. 40, no. 1, pp. 17-47, 1993.
-
(1993)
Journal of the ACM
, vol.40
, Issue.1
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
6
-
-
78650893906
-
Secure network coding on a wiretap network
-
Jan
-
N. Cai and R. Yeung, "Secure network coding on a wiretap network, " IEEE Trans. on Inf. Th., Jan. 2011.
-
(2011)
IEEE Trans. on Inf. Th.
-
-
Cai, N.1
Yeung, R.2
-
7
-
-
33750025166
-
On the capacity of secure network coding
-
J. Feldman, T. Malkin, C. Stein, and R. Servedio, "On the capacity of secure network coding, " in Allerton Conf., 2004.
-
(2004)
Allerton Conf.
-
-
Feldman, J.1
Malkin, T.2
Stein, C.3
Servedio, R.4
-
8
-
-
77957857386
-
Network codes resilient to jamming and eavesdropping
-
H. Yao, D. Silva, S. Jaggi, and M. Langberg, "Network codes resilient to jamming and eavesdropping, " in NetCod, 2010.
-
(2010)
NetCod
-
-
Yao, H.1
Silva, D.2
Jaggi, S.3
Langberg, M.4
-
9
-
-
77950848164
-
Secure error-correcting (sec) network codes
-
C. Ngai and R. Yeung, "Secure error-correcting (sec) network codes, " in NetCod, 2009.
-
(2009)
NetCod
-
-
Ngai, C.1
Yeung, R.2
-
10
-
-
33947399169
-
A random linear network coding approach to multicast
-
Oct
-
T. Ho, M. Ḿedard, R. Koetter, D. Karger, M. Effros, J. Shi, and B. Leong, "A random linear network coding approach to multicast, " IEEE Trans. Inf. Th., Oct. 2006.
-
(2006)
IEEE Trans. Inf. Th.
-
-
Ho, T.1
Medard, M.2
Koetter, R.3
Karger, D.4
Effros, M.5
Shi, J.6
Leong, B.7
-
11
-
-
20544473127
-
Polynomial time algorithms for multicast network code construction
-
Jun
-
S. Jaggi, P. Sanders, P. Chou, M. Effros, S. Egner, K. Jain, and L. Tolhuizen, "Polynomial time algorithms for multicast network code construction, " IEEE Trans. Inf. Th., Jun. 2005.
-
(2005)
IEEE Trans. Inf. Th.
-
-
Jaggi, S.1
Sanders, P.2
Chou, P.3
Effros, M.4
Egner, S.5
Jain, K.6
Tolhuizen, L.7
-
13
-
-
79961002025
-
Optimal exact-regenerating codes for the MSR and MBR points via a product-matrix construction
-
Aug
-
K. V. Rashmi, N. B. Shah, and P. V. Kumar, "Optimal exact-regenerating codes for the MSR and MBR points via a product-matrix construction, " IEEE Trans. Inf. Th., Aug. 2011.
-
(2011)
IEEE Trans. Inf. Th.
-
-
Rashmi, K.V.1
Shah, N.B.2
Kumar, P.V.3
|