메뉴 건너뛰기




Volumn , Issue , 2015, Pages 1521-1526

A null space-based MAC scheme against pollution attacks to Random linear Network Coding

Author keywords

data pollution attack; homomorphic message authentication code; Network coding; security; tag pollution attack

Indexed keywords

AUTHENTICATION; LINEAR NETWORKS; POLLUTION; WIRELESS NETWORKS;

EID: 84947749781     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCW.2015.7247395     Document Type: Conference Paper
Times cited : (8)

References (25)
  • 1
  • 3
    • 25644448947 scopus 로고    scopus 로고
    • Network coding for large scale file distribution
    • C. Gkantsidis and P. Rodriguez, "Network Coding for Large Scale File Distribution," in IEEE INFOCOM, 2005.
    • (2005) IEEE INFOCOM
    • Gkantsidis, C.1    Rodriguez, P.2
  • 9
    • 3543050732 scopus 로고    scopus 로고
    • Onthe-fly verification of rateless erasure codes for efficient content distribution
    • 2004 226-240
    • M. N. Krohn, M. J. Freedman, and D. Mazieres, "Onthe-fly verification of rateless erasure codes for efficient content distribution," in IEEE Symp. on Security and Privacy, pp. 226-240, 2004, 2004, pp. 226-240.
    • (2004) IEEE Symp. on Security and Privacy , pp. 226-240
    • Krohn, M.N.1    Freedman, M.J.2    Mazieres, D.3
  • 14
    • 70349664122 scopus 로고    scopus 로고
    • An efficient scheme for securing XOR network coding against pollution attacks
    • y. Zhen, W. Yawen, B. Ramkumar, and G. Yong, "An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks," in INFOCOM 2009, IEEE, 2009, pp. 406-414.
    • (2009) INFOCOM 2009, IEEE , pp. 406-414
    • Zhen, Y.1    Yawen, W.2    Ramkumar, B.3    Yong, G.4
  • 17
    • 70349653419 scopus 로고    scopus 로고
    • Null keys: Limiting malicious attacks via null space properties of network coding
    • E. Kehdi and L. Baochun, "Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding," in INFOCOM 2009, IEEE, 2009, pp. 1224-1232.
    • (2009) INFOCOM 2009, IEEE , pp. 1224-1232
    • Kehdi, E.1    Baochun, L.2
  • 21
    • 77951474210 scopus 로고    scopus 로고
    • Timed efficient stream loss-tolerant authentication (TESLA): Multicast source authentication transform introduction
    • A. Perrig, D. Song, R. Canetti, J. Tygar, and B. Briscoe, "Timed efficient stream loss-tolerant authentication (TESLA): Multicast source authentication transform introduction," Request For Comments, vol. 4082, 2005.
    • (2005) Request for Comments , vol.4082
    • Perrig, A.1    Song, D.2    Canetti, R.3    Tygar, J.4    Briscoe, B.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.