-
1
-
-
36949027308
-
Trading structure for randomness in wireless opportunistic routing
-
S. Chachulski, M. Jennings, S. Katti, and D. Katabi, "Trading structure for randomness in wireless opportunistic routing," SIGCOMM Comput. Commun. Rev., vol. 37, pp. 169-180, 2007.
-
(2007)
SIGCOMM Comput. Commun. Rev.
, vol.37
, pp. 169-180
-
-
Chachulski, S.1
Jennings, M.2
Katti, S.3
Katabi, D.4
-
2
-
-
33745161352
-
Overcoming untuned radios in wireless networks with network coding
-
D. Petrovic, K. Ramchandran, and J. Rabaey, "Overcoming untuned radios in wireless networks with network coding," Information Theory, IEEE Transactions on, vol. 52, pp. 2649-2657, 2006.
-
(2006)
Information Theory, IEEE Transactions on
, vol.52
, pp. 2649-2657
-
-
Petrovic, D.1
Ramchandran, K.2
Rabaey, J.3
-
3
-
-
25644448947
-
Network coding for large scale file distribution
-
C. Gkantsidis and P. Rodriguez, "Network Coding for Large Scale File Distribution," in IEEE INFOCOM, 2005.
-
(2005)
IEEE INFOCOM
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
4
-
-
0034229404
-
Network information flow
-
Jul
-
R. Ahlswede, N. Cai, S. Y. R. Li, and R. W. Yeung, "Network information flow," IEEE TRANSACTIONS ON INFORMATION THEORY, vol. 46, pp. 1204-1216, Jul 2000.
-
(2000)
IEEE TRANSACTIONS on INFORMATIon THEORY
, vol.46
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.Y.R.3
Yeung, R.W.4
-
5
-
-
0037323073
-
Linear network coding
-
S. Y. R. Li, R. W. Yeung, and C. Ning, "Linear network coding," Information Theory, IEEE Transactions on, vol. 49, pp. 371-381, 2003.
-
(2003)
Information Theory, IEEE Transactions on
, vol.49
, pp. 371-381
-
-
Li, S.Y.R.1
Yeung, R.W.2
Ning, C.3
-
6
-
-
33947399169
-
A random linear network coding approach to multicast
-
T. Ho, M. Medard, R. Koetter, D. R. Karger, M. Effros, S. Jun, and B. Leong, "A Random Linear Network Coding Approach to Multicast," Information Theory, IEEE Transactions on, vol. 52, pp. 4413-4430, 2006.
-
(2006)
Information Theory, IEEE Transactions on
, vol.52
, pp. 4413-4430
-
-
Ho, T.1
Medard, M.2
Koetter, R.3
Karger, D.R.4
Effros, M.5
Jun, S.6
Leong, B.7
-
7
-
-
45249114824
-
Byzantine modification detection in multicast networks with random network coding
-
T. Ho, L. Ben, R. Koetter, M. Medard, M. Effros, and D. R. Karger, "Byzantine Modification Detection in Multicast Networks With Random Network Coding," Information Theory, IEEE Transactions on, vol. 54, pp. 2798-2803, 2008.
-
(2008)
Information Theory, IEEE Transactions on
, vol.54
, pp. 2798-2803
-
-
Ho, T.1
Ben, L.2
Koetter, R.3
Medard, M.4
Effros, M.5
Karger, D.R.6
-
8
-
-
45249101743
-
Resilient network coding in the presence of byzantine adversaries
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, M. Medard, and M. Effros, "Resilient Network Coding in the Presence of Byzantine Adversaries," Information Theory, IEEE Transactions on, vol. 54, pp. 2596-2603, 2008.
-
(2008)
Information Theory, IEEE Transactions on
, vol.54
, pp. 2596-2603
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Medard, M.6
Effros, M.7
-
9
-
-
3543050732
-
Onthe-fly verification of rateless erasure codes for efficient content distribution
-
2004 226-240
-
M. N. Krohn, M. J. Freedman, and D. Mazieres, "Onthe-fly verification of rateless erasure codes for efficient content distribution," in IEEE Symp. on Security and Privacy, pp. 226-240, 2004, 2004, pp. 226-240.
-
(2004)
IEEE Symp. on Security and Privacy
, pp. 226-240
-
-
Krohn, M.N.1
Freedman, M.J.2
Mazieres, D.3
-
11
-
-
84933587947
-
An efficient signature-based scheme for securing network coding against pollution attacks
-
Y. Zhen, W. Yawen, B. Ramkumar, and G. Yong, "An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks," in INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, 2008.
-
(2008)
INFOCOM 2008. the 27th Conference on Computer Communications. IEEE
-
-
Zhen, Y.1
Yawen, W.2
Ramkumar, B.3
Yong, G.4
-
12
-
-
51649125221
-
Signatures for content distribution with network coding
-
Z. Fang, T. Kalker, M. Medard, and K. J. Han, "Signatures for Content Distribution with Network Coding," in Information Theory, 2007. ISIT 2007. IEEE International Symposium on, 2007, pp. 556-560.
-
(2007)
Information Theory, 2007. ISIT 2007. IEEE International Symposium on
, pp. 556-560
-
-
Fang, Z.1
Kalker, T.2
Medard, M.3
Han, K.J.4
-
13
-
-
67049095592
-
Signing a linear subspace: Signature schemes for network coding
-
D. Boneh, D. Freeman, J. Katz, and B. Waters, "Signing a Linear Subspace: Signature Schemes for Network Coding," presented at the Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09, CA, 2009.
-
(2009)
Presented at the Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09, CA
-
-
Boneh, D.1
Freeman, D.2
Katz, J.3
Waters, B.4
-
14
-
-
70349664122
-
An efficient scheme for securing XOR network coding against pollution attacks
-
y. Zhen, W. Yawen, B. Ramkumar, and G. Yong, "An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks," in INFOCOM 2009, IEEE, 2009, pp. 406-414.
-
(2009)
INFOCOM 2009, IEEE
, pp. 406-414
-
-
Zhen, Y.1
Yawen, W.2
Ramkumar, B.3
Yong, G.4
-
16
-
-
77953301246
-
RIPPLE authentication for network coding
-
L. Yaping, Y. Hongyi, C. Minghua, S. Jaggi, and A. Rosen, "RIPPLE Authentication for Network Coding," in INFOCOM, 2010 Proceedings IEEE, 2010, pp. 1-9.
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-9
-
-
Yaping, L.1
Hongyi, Y.2
Minghua, C.3
Jaggi, S.4
Rosen, A.5
-
17
-
-
70349653419
-
Null keys: Limiting malicious attacks via null space properties of network coding
-
E. Kehdi and L. Baochun, "Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding," in INFOCOM 2009, IEEE, 2009, pp. 1224-1232.
-
(2009)
INFOCOM 2009, IEEE
, pp. 1224-1232
-
-
Kehdi, E.1
Baochun, L.2
-
18
-
-
79960873240
-
Padding for orthogonality: Efficient subspace authentication for network coding
-
Z. Peng, J. Yixin, L. Chuang, Y. Hongyi, A. Wasef, and S. Xuemin, "Padding for orthogonality: Efficient subspace authentication for network coding," in INFOCOM, 2011 Proceedings IEEE, 2011, pp. 1026-1034.
-
(2011)
INFOCOM, 2011 Proceedings IEEE
, pp. 1026-1034
-
-
Peng, Z.1
Yixin, J.2
Chuang, L.3
Hongyi, Y.4
Wasef, A.5
Xuemin, S.6
-
19
-
-
77956567551
-
Signatures for network coding
-
D. Charles, K. Jain, and K. Lauter, "Signatures for network coding," International Journal of Information and Coding Theory, vol. 1, pp. 3-14, 2009.
-
(2009)
International Journal of Information and Coding Theory
, vol.1
, pp. 3-14
-
-
Charles, D.1
Jain, K.2
Lauter, K.3
-
21
-
-
77951474210
-
Timed efficient stream loss-tolerant authentication (TESLA): Multicast source authentication transform introduction
-
A. Perrig, D. Song, R. Canetti, J. Tygar, and B. Briscoe, "Timed efficient stream loss-tolerant authentication (TESLA): Multicast source authentication transform introduction," Request For Comments, vol. 4082, 2005.
-
(2005)
Request for Comments
, vol.4082
-
-
Perrig, A.1
Song, D.2
Canetti, R.3
Tygar, J.4
Briscoe, B.5
-
23
-
-
33947399169
-
A random linear network coding approach to multicast
-
T. HO, M. Medard, R. Koetter, D. Karger, M. Effros, S. Jun, and B. Leong, "A random linear network coding approach to multicast," IEEE Transactions on Information Theory 52, pp. 4413-4430, 2004.
-
(2004)
IEEE Transactions on Information Theory
, vol.52
, pp. 4413-4430
-
-
Ho, T.1
Medard, M.2
Koetter, R.3
Karger, D.4
Effros, M.5
Jun, S.6
Leong, B.7
-
24
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast security: a taxonomy and some efficient constructions," in INFOCOM '99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, 1999, pp. 708-716 vol. 2.
-
(1999)
INFOCOM '99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE
, vol.2
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
25
-
-
84923202070
-
A tag encoding scheme against pollution attack to linear network coding
-
W. Xiaohu, X. Yinlong, Y. Chau, and X. Liping, "A Tag Encoding Scheme against Pollution Attack to Linear Network Coding," Parallel and Distributed Systems, IEEE Transactions on, vol. 25, pp. 33-42, 2014.
-
(2014)
Parallel and Distributed Systems, IEEE Transactions on
, vol.25
, pp. 33-42
-
-
Xiaohu, W.1
Yinlong, X.2
Chau, Y.3
Liping, X.4
|