-
1
-
-
0034229404
-
Network information flow
-
July
-
R. Ahlswede, N. Cai, S.-Y.R. Li, and R.W. Yeung, "Network Information Flow, " IEEE Trans. Information Theory, vol. 46, no. 4, pp. 1204-1216, July 2000.
-
(2000)
IEEE Trans. Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
2
-
-
0037323073
-
Linear network coding
-
Feb.
-
S.R. Li, R. Yeung, and N. Cai, "Linear Network Coding, " IEEE Trans. Information Theory, vol. 49, no. 2, pp. 371-381, Feb. 2003.
-
(2003)
IEEE Trans. Information Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.R.1
Yeung, R.2
Cai, N.3
-
3
-
-
33947399169
-
A random linear network coding approach to multicast
-
Oct.
-
T. Ho, M. Medard, R. Koetter, D.R. Karger, M. Effros, J. Shi, and B. Leong, "A Random Linear Network Coding Approach to Multicast, " IEEE Trans. Information Theory, vol. 52, no. 10, pp. 4413-4430, Oct. 2006.
-
(2006)
IEEE Trans. Information Theory
, vol.52
, Issue.10
, pp. 4413-4430
-
-
Ho, T.1
Medard, M.2
Koetter, R.3
Karger, D.R.4
Effros, M.5
Shi, J.6
Leong, B.7
-
4
-
-
45249101743
-
Resilient network coding in the presence of byzantine adversaries
-
June
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, M. Medard, and M. Effros, "Resilient Network Coding in the Presence of Byzantine Adversaries, " IEEE Trans. Information Theory, vol. 54, no. 6, pp. 2596-2603, June 2008.
-
(2008)
IEEE Trans. Information Theory
, vol.54
, Issue.6
, pp. 2596-2603
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Medard, M.6
Effros, M.7
-
5
-
-
77955178649
-
On homomorphic signatures for network coding
-
Mar
-
A. Yun, J. Cheon, and Y. Kim, "On Homomorphic Signatures for Network Coding, " IEEE Trans. Computers, vol. 59, no. 9, pp. 1295-1296, Mar. 2010.
-
(2010)
IEEE Trans. Computers
, vol.59
, Issue.9
, pp. 1295-1296
-
-
Yun, A.1
Cheon, J.2
Kim, Y.3
-
6
-
-
51349130622
-
An efficient signature-based scheme for securing network coding against pollution attacks
-
Apr.
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An Efficient Signature-Based Scheme for Securing Network Coding against Pollution Attacks, " Proc. IEEE INFOCOM, Apr. 2008.
-
(2008)
Proc. IEEE INFOCOM
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
7
-
-
84883435540
-
Secure network coding over the integers
-
May
-
R. Gennaro, J. Katz, H. Krawczyk, and T. Rabin, "Secure Network Coding over the Integers, " Proc. 13th Int'l Conf. Practice and Theory in Public Key Cryptography (PKC '10), May 2010.
-
(2010)
Proc. 13th Int'l Conf. Practice and Theory in Public Key Cryptography (PKC '10)
-
-
Gennaro, R.1
Katz, J.2
Krawczyk, H.3
Rabin, T.4
-
8
-
-
73449086635
-
An efficient dynamic-identity based signature scheme for secure network coding
-
Jan
-
Y. Jiang, H. Zhu, M. Shi, X. Shen, and C. Lin, "An Efficient Dynamic-Identity Based Signature Scheme for Secure Network Coding, " Computer Networks: The Int'l J. Computer and Telecomm. Networking, vol. 54, no. 1, pp. 28-40, Jan. 2010.
-
(2010)
Computer Networks: The Int'l J. Computer and Telecomm. Networking
, vol.54
, Issue.1
, pp. 28-40
-
-
Jiang, Y.1
Zhu, H.2
Shi, M.3
Shen, X.4
Lin, C.5
-
10
-
-
51649125221
-
Signatures for content distribution with network coding
-
June
-
F. Zhao, T. Kalker, M. Medard, and K.J. Han, "Signatures for Content Distribution with Network Coding, " Proc. IEEE Int'l Symp. Information Theory, June 2007.
-
(2007)
Proc. IEEE Int'l Symp. Information Theory
-
-
Zhao, F.1
Kalker, T.2
Medard, M.3
Han, K.J.4
-
11
-
-
39049090594
-
Cooperative security for network coding file distribution
-
Apr.
-
G. Gkantsidisand and P. Rodriguez, "Cooperative Security for Network Coding File Distribution, " Proc. IEEE INFOCOM, Apr. 2006.
-
(2006)
Proc. IEEE INFOCOM
-
-
Gkantsidisand, G.1
Rodriguez, P.2
-
12
-
-
79959817037
-
Practical defenses against pollution attacks in wireless network coding
-
May
-
J. Dong, R. Curtmola, and C. Nita-Rotaru, "Practical Defenses Against Pollution Attacks in Wireless Network Coding, " ACM Trans. Information and System Security, vol. 14, no. 1, article 7, May 2011.
-
(2011)
ACM Trans. Information and System Security
, vol.14
, Issue.1
-
-
Dong, J.1
Curtmola, R.2
Nita-Rotaru, C.3
-
14
-
-
70349664122
-
An efficient scheme for securing xor network coding against pollution attacks
-
Apr.
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks, " Proc. IEEE INFOCOM, Apr. 2009.
-
(2009)
Proc. IEEE INFOCOM
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
15
-
-
79960873240
-
Padding for orthogonality : Efficient subspace authentication for network coding
-
Apr.
-
P. Zhang, Y. Jiang, C. Lin, H. Yao, A. Wasef, and X.S. Shen, "Padding for Orthogonality : Efficient Subspace Authentication for Network Coding, " Proc. IEEE INFOCOM, Apr. 2011.
-
(2011)
Proc. IEEE INFOCOM
-
-
Zhang, P.1
Jiang, Y.2
Lin, C.3
Yao, H.4
Wasef, A.5
Shen, X.S.6
-
16
-
-
77953301246
-
Ripple authentication for network coding
-
Mar.
-
Y. Li, H. Yao, M. Chen, S. Jaggi, and A. Rosen, "RIPPLE Authentication for Network Coding, " Proc. IEEE INFOCOM, Mar. 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Li, Y.1
Yao, H.2
Chen, M.3
Jaggi, S.4
Rosen, A.5
-
17
-
-
84856294814
-
Cooperative defense against pollution attacks in network coding using spacemac
-
Feb
-
A. Le and A. Markopoulou, "Cooperative Defense against Pollution Attacks in Network Coding Using SpaceMac, " IEEE J. Selected Areas in Comm. on Cooperative Networking Challenges and Applications, vol. 30, no. 2, pp. 442-449, Feb. 2012.
-
(2012)
IEEE J. Selected Areas in Comm. on Cooperative Networking Challenges and Applications
, vol.30
, Issue.2
, pp. 442-449
-
-
Le, A.1
Markopoulou, A.2
-
18
-
-
77957830620
-
Identifying malicious nodes in network-coding-based peer-to-peer streaming networks
-
Mar.
-
Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana, "Identifying Malicious Nodes in Network-Coding-Based Peer-to-Peer Streaming Networks, " Proc. IEEE INFOCOM, Mar. 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Wang, Q.1
Vu, L.2
Nahrstedt, K.3
Khurana, H.4
-
19
-
-
48849089497
-
Coding for errors and erasures in random network coding
-
Aug.
-
R. Koetter and F.R. Kschischang, "Coding for Errors and Erasures in Random Network Coding, " IEEE Trans. Information Theory, vol. 54, no. 8, pp. 3579-3591, Aug. 2008.
-
(2008)
IEEE Trans. Information Theory
, vol.54
, Issue.8
, pp. 3579-3591
-
-
Koetter, R.1
Kschischang, F.R.2
-
20
-
-
20544449877
-
Practical network coding
-
Oct.
-
P. Chou, Y. Wu, and K. Jain, "Practical Network Coding, " Proc. Allerton Conf. Comm., Control, and Computing, Oct. 2003.
-
(2003)
Proc. Allerton Conf. Comm., Control, and Computing
-
-
Chou, P.1
Wu, Y.2
Jain, K.3
-
22
-
-
80053034503
-
TESLA-based defense against pollution attacks in p2p systems with network coding
-
July
-
A. Le and A. Markopoulou, "TESLA-Based Defense against Pollution Attacks in P2P Systems with Network Coding, " Proc. IEEE Int'l Symp. Network Coding (NetCod), July 2011.
-
(2011)
Proc. IEEE Int'l Symp. Network Coding (NetCod)
-
-
Le, A.1
Markopoulou, A.2
-
23
-
-
38349083344
-
Network error correction, part 2: Lower bounds
-
N. Cai and R.W. Yeung, "Network Error Correction, Part 2: Lower Bounds, " Comm. in Information and Systems, vol. 6, no. 1, pp. 37-54, 2006.
-
(2006)
Comm. in Information and Systems
, vol.6
, Issue.1
, pp. 37-54
-
-
Cai, N.1
Yeung, R.W.2
-
24
-
-
46749115942
-
Network error correction coding in packetized networks
-
Oct.
-
Z. Zhang, "Network Error Correction Coding in Packetized Networks, " Proc. IEEE Information Theory Workshop, Oct. 2006.
-
(2006)
Proc. IEEE Information Theory Workshop
-
-
Zhang, Z.1
-
25
-
-
84655169995
-
An authentication code against pollution attacks in network coding
-
Mar
-
F. Oggier and H. Fathi, "An Authentication Code against Pollution Attacks in Network Coding, " IEEE/ACM Trans. Networking, vol. 19, no. 6, pp. 1587-1596, Mar. 2011.
-
(2011)
IEEE/ACM Trans. Networking
, vol.19
, Issue.6
, pp. 1587-1596
-
-
Oggier, F.1
Fathi, H.2
-
26
-
-
33745161352
-
Overcoming untuned radios in wireless networks with network coding
-
June
-
D. Petrovic, K. Ramchandran, and J. Rabaey, "Overcoming Untuned Radios in Wireless Networks with Network Coding, " IEEE Trans. Information Theory, vol. 52, no. 6, pp. 2649-2657, June 2006.
-
(2006)
IEEE Trans. Information Theory
, vol.52
, Issue.6
, pp. 2649-2657
-
-
Petrovic, D.1
Ramchandran, K.2
Rabaey, J.3
-
27
-
-
25644448947
-
Network coding for large scale file distribution
-
Mar.
-
C. Gkantsidis and P. Rodriguez, "Network Coding for Large Scale File Distribution, " Proc. IEEE INFOCOM, Mar. 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
28
-
-
0742286696
-
Multicast with network coding in application layer overlay networks
-
Jan.
-
Y. Zhu, B. Li, and J. Guo, "Multicast with Network Coding in Application Layer Overlay Networks, " IEEE J. Selected Areas in Comm. on Recent Advances in Service Overlay Networks, vol. 22, no. 1, pp. 107-120, Jan. 2004.
-
(2004)
IEEE J. Selected Areas in Comm. on Recent Advances in Service Overlay Networks
, vol.22
, Issue.1
, pp. 107-120
-
-
Zhu, Y.1
Li, B.2
Guo, J.3
-
29
-
-
84863048699
-
On the security and efficiency of content distribution via network coding
-
Jan
-
Q. Li, J.C.S. Lui, and D.-M. Chiu, "On the Security and Efficiency of Content Distribution via Network Coding, " IEEE Trans. Dependable and Secure Computing, vol. 9, no. 2, pp. 211-221, Jan. 2011.
-
(2011)
IEEE Trans. Dependable and Secure Computing
, vol.9
, Issue.2
, pp. 211-221
-
-
Li, Q.1
Lui, J.C.S.2
Chiu, D.-M.3
-
30
-
-
80052981050
-
A hybrid scheme against pollution attack in network coding
-
July
-
X. Wu, Y. Xu, L. Xiang, and W. Xu, "A Hybrid Scheme against Pollution Attack in Network Coding, " Proc. IEEE Int'l Symp. Network Coding (NetCod), July 2011.
-
(2011)
Proc. IEEE Int'l Symp. Network Coding (NetCod)
-
-
Wu, X.1
Xu, Y.2
Xiang, L.3
Xu, W.4
-
32
-
-
77953904148
-
Recommendation for key management-part 1: General
-
Mar.
-
E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, "Recommendation for Key Management-Part 1: General, " NIST Special Publication 800-57, Mar. 2007.
-
(2007)
NIST Special Publication
, vol.800
, Issue.57
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
|