-
1
-
-
0034229404
-
Network information flow
-
R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, "Network information flow," IEEE Transactions on Information Theory, 2000, pp. 1204-1216.
-
(2000)
IEEE Transactions on Information Theory
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
2
-
-
0037323073
-
Linear network coding
-
S.-Y. R. Li, R. W. Yeung, and N. Cai, "Linear network coding,", IEEE Transactions on Information Theory, vol. 49, pp. 371-381, 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, pp. 371-381
-
-
Li, S.-Y.R.1
Yeung, R.W.2
Cai, N.3
-
3
-
-
79952170359
-
Survey of network coding and its applications
-
T. Matsuda, T. Noguchi, and T. Takine, "Survey of network coding and its applications," IEICE transactions on communications, vol. 94, pp. 698-717, 2011.
-
(2011)
IEICE Transactions on Communications
, vol.94
, pp. 698-717
-
-
Matsuda, T.1
Noguchi, T.2
Takine, T.3
-
6
-
-
77953301246
-
RIPPLE authentication for network coding
-
Y. Li, H. Yao, M. Chen, S. Jaggi, and A. Rosen, "RIPPLE authentication for network coding," in INFOCOM, 2010 Proceedings IEEE, 2010, pp. 1-9.
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-9
-
-
Li, Y.1
Yao, H.2
Chen, M.3
Jaggi, S.4
Rosen, A.5
-
7
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in Advances in cryptology, 1984, pp. 47-53.
-
(1984)
Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
10
-
-
77953307858
-
MIS: Malicious nodes identification scheme in network-coding-based peer-to-peer streaming
-
Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana, "MIS: malicious nodes identification scheme in network-coding-based peer-to-peer streaming," in INFOCOM, 2010 Proceedings IEEE,2010, pp. 1-5.
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-5
-
-
Wang, Q.1
Vu, L.2
Nahrstedt, K.3
Khurana, H.4
-
11
-
-
39049090594
-
Cooperative security for network coding file distribution
-
C. Gkantsidis and P. Rodriguez, "Cooperative Security for Network Coding File Distribution," in INFOCOM, 2006, p. 5.
-
(2006)
INFOCOM
, pp. 5
-
-
Gkantsidis, C.1
Rodriguez, P.2
-
12
-
-
79959817037
-
Practical defenses against pollution attacks in wireless network coding
-
J. Dong, R. Curtmola, and C. Nita-Rotaru, "Practical defenses against pollution attacks in wireless network coding," ACM Transactions on Information and System Security (TISSEC), vol. 14, p. 7, 2011.
-
(2011)
ACM Transactions on Information and System Security (TISSEC)
, vol.14
, pp. 7
-
-
Dong, J.1
Curtmola, R.2
Nita-Rotaru, C.3
-
13
-
-
84923202070
-
A tag encoding scheme against pollution attack to linear network coding
-
X. Wu, Y. Xu, C. Yuen, and L. Xiang, "A tag encoding scheme against pollution attack to linear network coding," IEEE Transactions on Parallel and Distributed Systems, vol. 25, pp. 33-42, 2014.
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, pp. 33-42
-
-
Wu, X.1
Xu, Y.2
Yuen, C.3
Xiang, L.4
-
14
-
-
84947749781
-
A null space-based MAC scheme against pollution attacks to Random linear network coding
-
A. Esfahani, G. Mantas, J. Rodriguez, A. Nascimento, and J. C. Neves, "A null space-based MAC scheme against pollution attacks to Random linear Network Coding," in 2015 IEEE International Conference on Communication Workshop (ICCW), 2015, pp. 1521-1526.
-
(2015)
2015 IEEE International Conference on Communication Workshop (ICCW)
, pp. 1521-1526
-
-
Esfahani, A.1
Mantas, G.2
Rodriguez, J.3
Nascimento, A.4
Neves, J.C.5
-
15
-
-
47949101718
-
On network coding for security
-
K. Han, T. Ho, R. Koetter, M. Medard, and F. Zhao, "On network coding for security," in IEEE MILCOM, 2007.
-
(2007)
IEEE MILCOM
-
-
Han, K.1
Ho, T.2
Koetter, R.3
Medard, M.4
Zhao, F.5
-
16
-
-
51349130622
-
An efficient signaturebased scheme for securing network coding against pollution attacks
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient signaturebased scheme for securing network coding against pollution attacks," in INFOCOM. The 27th Conference on Computer Communications., 2008.
-
(2008)
INFOCOM. The 27th Conference on Computer Communications
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
19
-
-
73449086635
-
An efficient dynamicidentity based signature scheme for secure network coding
-
Y. Jiang, H. Zhu, M. Shi, X. S. Shen, and C. Lin, "An efficient dynamicidentity based signature scheme for secure network coding," Computer Networks, vol. 54, pp. 28-40, 2010.
-
(2010)
Computer Networks
, vol.54
, pp. 28-40
-
-
Jiang, Y.1
Zhu, H.2
Shi, M.3
Shen, X.S.4
Lin, C.5
-
20
-
-
33745142955
-
Network coding: An instant primer
-
C. Fragouli, J.-Y. Le Boudec, and J. Widmer, "Network coding: an instant primer," ACM SIGCOMM Computer Communication Review, vol. 36, pp. 63-68, 2006.
-
(2006)
ACM SIGCOMM Computer Communication Review
, vol.36
, pp. 63-68
-
-
Fragouli, C.1
Le Boudec, J.-Y.2
Widmer, J.3
|