-
1
-
-
77953319343
-
P-coding: Secure network coding against eavesdropping attacks
-
P. Zhang, Y. Jiang, C. Lin, Y. Fan, and X. Shen, "P-coding: Secure Network Coding Against Eavesdropping Attacks," in Proc. IEEE INFOCOM, Mar. 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM, Mar.
, pp. 1-9
-
-
Zhang, P.1
Jiang, Y.2
Lin, C.3
Fan, Y.4
Shen, X.5
-
2
-
-
2442593140
-
Power-aware broadcasting in mobile ad hoc networks
-
S. Singh, C. Raghavendra, and J. Stepanek, "Power-Aware Broadcasting in Mobile Ad Hoc Networks," in Proc. IEEE PIMRC, 1999, pp. 1-10.
-
(1999)
Proc. IEEE PIMRC
, pp. 1-10
-
-
Singh, S.1
Raghavendra, C.2
Stepanek, J.3
-
3
-
-
0035361135
-
Algorithms for energy-efficient multicasting in static ad hoc wireless networks
-
June
-
J. Wieselthier, G. Nguyen, and A. Ephremides, "Algorithms for Energy-Efficient Multicasting in Static Ad Hoc Wireless Networks," Mobile Netw. Appl., vol. 6, no. 3, pp. 251-263, June 2001.
-
(2001)
Mobile Netw. Appl.
, vol.6
, Issue.3
, pp. 251-263
-
-
Wieselthier, J.1
Nguyen, G.2
Ephremides, A.3
-
4
-
-
0036739784
-
Span: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks
-
Sept.
-
B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, "Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks," Wireless Netw., vol. 8, no. 5, pp. 481-494, Sept. 2002.
-
(2002)
Wireless Netw.
, vol.8
, Issue.5
, pp. 481-494
-
-
Chen, B.1
Jamieson, K.2
Balakrishnan, H.3
Morris, R.4
-
5
-
-
0034229404
-
Network information flow
-
July
-
R. Ahlswede, N. Cai, S.-Y.R. Li, and R.W. Yeung, "Network Information Flow," IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1204-1216, July 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
6
-
-
28844481518
-
Minimum-energy multicast in mobile ad hoc networks using network coding
-
Nov.
-
Y. Wu, P. Chou, and S. Kung, "Minimum-Energy Multicast in Mobile Ad Hoc Networks using Network Coding," IEEE Trans. Commun., vol. 53, no. 11, pp. 1906-1918, Nov. 2005.
-
(2005)
IEEE Trans. Commun.
, vol.53
, Issue.11
, pp. 1906-1918
-
-
Wu, Y.1
Chou, P.2
Kung, S.3
-
7
-
-
34548367677
-
A network coding approach to energy efficient broadcasting: From theory to practice
-
C. Fragouli, J. Widmer, and J. Boudec, "A Network Coding Approach to Energy Efficient Broadcasting: From Theory to Practice," in Proc. IEEE INFOCOM, 2006, pp. 1-11.
-
(2006)
Proc. IEEE INFOCOM
, pp. 1-11
-
-
Fragouli, C.1
Widmer, J.2
Boudec, J.3
-
8
-
-
34548314503
-
Network coding-based broadcast in mobile ad-hoc networks
-
L. Li, R. Ramjee, M. Buddhikot, and S.Miller, "Network Coding-Based Broadcast in Mobile Ad-Hoc Networks," in Proc. IEEE INFOCOM, 2007, pp. 1739-1747.
-
(2007)
Proc. IEEE INFOCOM
, pp. 1739-1747
-
-
Li, L.1
Ramjee, R.2
Buddhikot, M.3
Miller, S.4
-
9
-
-
33646382089
-
AStudy of the energy consumption characteristics of cryptographic algorithms and security protocols
-
Feb.
-
N.R. Potlapally, S. Ravi,A.Raghunathan, andN.K. Jha, "AStudy of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols," IEEE Trans. Mobile Comput., vol. 5, no. 2, pp. 128-143, Feb. 2006.
-
(2006)
IEEE Trans. Mobile Comput.
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
10
-
-
51249125036
-
Lightweight security for network coding
-
May
-
J.P. Vilela, L. Lima, and J. Barros, "Lightweight Security for Network Coding," in Proc. IEEE ICC, May 2008, pp. 1750-1754.
-
(2008)
Proc. IEEE ICC
, pp. 1750-1754
-
-
Vilela, J.P.1
Lima, L.2
Barros, J.3
-
11
-
-
70349682315
-
An efficient privacy-preserving scheme against traffic analysis in network coding
-
Apr.
-
Y. Fan, Y. Jiang, H. Zhu, and X. Shen, "An Efficient Privacy-Preserving Scheme Against Traffic Analysis in Network Coding," in Proc. IEEE INFOCOM, Apr. 2009, pp. 2213-2221.
-
(2009)
Proc. IEEE INFOCOM
, pp. 2213-2221
-
-
Fan, Y.1
Jiang, Y.2
Zhu, H.3
Shen, X.4
-
13
-
-
33947399169
-
A random linear network coding approach to multicast
-
Oct.
-
T. Ho, M. Médard, R. Koetter, D.R. Karger, M. Effros, J. Shi, and B. Leong, "A Random Linear Network Coding Approach to Multicast," IEEE Trans. Inf. Theory, vol. 52, no. 10, pp. 4413-4430, Oct. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.10
, pp. 4413-4430
-
-
Ho, T.1
Médard, M.2
Koetter, R.3
Karger, D.R.4
Effros, M.5
Shi, J.6
Leong, B.7
-
14
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C.E. Shannon, "Communication Theory of Secrecy Systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
15
-
-
84944878354
-
-
Boca Raton FL USA: CRC Press, Oct.
-
A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC Press, Oct. 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
16
-
-
0036353798
-
Secure network coding
-
June
-
N. Cai and R.W. Yeung, "Secure Network Coding," in Proc. IEEE ISIT, June 2002, pp. 323-329.
-
(2002)
Proc. IEEE ISIT
, pp. 323-329
-
-
Cai, N.1
Yeung, R.W.2
-
18
-
-
25644448947
-
Network coding for large scale file distribution
-
Mar.
-
C. Gkantsidis and P. Rodriguez, "Network Coding for Large Scale File Distribution," in Proc. IEEE INFOCOM, Mar. 2005, pp. 2235-2245.
-
(2005)
Proc. IEEE INFOCOM
, pp. 2235-2245
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
21
-
-
0028755308
-
Automated cryptanalysis of transposition ciphers
-
J. Giddy and R. Safavi-Naini, "Automated Cryptanalysis of Transposition Ciphers," Comput. J., vol. 37, no. 5, pp. 429-436, 1994.
-
(1994)
Comput. J.
, vol.37
, Issue.5
, pp. 429-436
-
-
Giddy, J.1
Safavi-Naini, R.2
-
22
-
-
84872385561
-
Making the most of two heuristics: Breaking transposition ciphers with ants
-
M.D. Russell, J.A. Clark, and S. Stepney, "Making the Most of Two Heuristics: Breaking Transposition Ciphers with Ants," in Proc. Congr. Evol. Comput., 2003, pp. 2653-2658.
-
(2003)
Proc. Congr. Evol. Comput.
, pp. 2653-2658
-
-
Russell, M.D.1
Clark, J.A.2
Stepney, S.3
-
23
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuocity classes
-
May
-
P. Paillier, "Public-Key Cryptosystems based on Composite Degree Residuocity Classes," in Proc. EUROCRYPT, May 1999, pp. 233-238.
-
(1999)
Proc. EUROCRYPT
, pp. 233-238
-
-
Paillier, P.1
-
24
-
-
84873848488
-
-
[Online]. Available
-
The OpenSSL project. [Online]. Available: http://www.openssl.org/
-
The OpenSSL Project
-
-
-
25
-
-
0010461175
-
Constraints and approaches for distributed sensor network security (Final)
-
Glenwood, MD, USA, DARPA Proj. Rep.
-
D.W. Carman, P.S. Kruus, and B.J. Matt, "Constraints and approaches for distributed sensor network security (Final)," NAI Labs, Glenwood, MD, USA, DARPA Proj. Rep., 2000.
-
(2000)
NAI Labs
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
27
-
-
0036948878
-
Minimum-energy broadcast in all-wireless networks: Np-completeness and distribution issues
-
M. Cagalj, J. Hubaux, and C. Enz, "Minimum-Energy Broadcast in All-Wireless Networks: Np-Completeness and Distribution Issues," in Proc. ACM MobiCom, 2002, pp. 172-182.
-
(2002)
Proc. ACM MobiCom
, pp. 172-182
-
-
Cagalj, M.1
Hubaux, J.2
Enz, C.3
-
28
-
-
51649118865
-
Random linear network coding: A free cypher?
-
June
-
L. Lima, M. Médard, and J. Barros, "Random Linear Network Coding: A Free Cypher?," in Proc. IEEE ISIT, June 2007, pp. 546-550.
-
(2007)
Proc. IEEE ISIT
, pp. 546-550
-
-
Lima, L.1
Médard, M.2
Barros, J.3
-
29
-
-
77953316768
-
Optimal linear network coding design for secure unicast with multiple streams
-
Mar.
-
J. Wang, J. Wang, K. Lu, B. Xiao, and N. Gu, "Optimal Linear Network Coding Design for Secure Unicast with Multiple Streams," in Proc. IEEE INFOCOM, Mar. 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Wang, J.1
Wang, J.2
Lu, K.3
Xiao, B.4
Gu, N.5
-
31
-
-
4143131440
-
Distributed symmetric key management for mobile ad hoc networks
-
A.-F. Chan, "Distributed Symmetric Key Management for Mobile Ad Hoc Networks," in Proc. IEEE INFOCOM, 2004, pp. 2414-2424.
-
(2004)
Proc. IEEE INFOCOM
, pp. 2414-2424
-
-
Chan, A.-F.1
-
32
-
-
34147173361
-
A survey on peerto-peer key management for mobile ad hoc networks
-
J.V.D. Merwe, D. Dawoud, and S. McDonald, "A Survey on Peerto-Peer Key Management for Mobile Ad Hoc Networks," ACM Comput. Surveys, vol. 39, no. 1, pp. 3-45, 2007.
-
(2007)
ACM Comput. Surveys
, vol.39
, Issue.1
, pp. 3-45
-
-
Merwe, J.V.D.1
Dawoud, D.2
McDonald, S.3
-
33
-
-
36749056448
-
R2: Random push with random network coding in live peer-to-peer streaming
-
Dec.
-
M. Wang and B. Li, "R2: Random Push with Random Network Coding in Live Peer-to-Peer Streaming," IEEE J. Sel. Areas Commun., vol. 25, no. 9, pp. 1655-1666, Dec. 2007.
-
(2007)
IEEE J. Sel. Areas Commun.
, vol.25
, Issue.9
, pp. 1655-1666
-
-
Wang, M.1
Li, B.2
-
34
-
-
85077127142
-
NCCloud: Applying network coding for the storage repair in a cloud-of-clouds
-
Y. Hu, H.C. Chen, P.P. Lee, and Y. Tang, "NCCloud: Applying Network Coding for the Storage Repair in a Cloud-Of-Clouds," in Proc. USENIX FAST, 2012, p. 21.
-
(2012)
Proc. USENIX FAST
, pp. 21
-
-
Hu, Y.1
Chen, H.C.2
Lee, P.P.3
Tang, Y.4
-
35
-
-
0003897447
-
-
New York, NY, USA: Academic
-
S. Ross, Introduction to Probability Models, 9th ed., New York, NY, USA: Academic, 2007.
-
(2007)
Introduction to Probability Models, 9th Ed.
-
-
Ross, S.1
|