-
2
-
-
84927589445
-
Exploiting rateless codes in cloud storage systems
-
May
-
C. Anglano, R. Gaeta, and M. Grangetto, "Exploiting rateless codes in cloud storage systems," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 5, pp. 1313-1322, May 2015
-
(2015)
IEEE Trans. Parallel Distrib. Syst
, vol.26
, Issue.5
, pp. 1313-1322
-
-
Anglano, C.1
Gaeta, R.2
Grangetto, M.3
-
3
-
-
80052878696
-
Detection, and recovery from pollution attacks in coding-based distributed storage schemes
-
Nov./Dec
-
L. Buttyan, L. Czap, and I. Vajda, "Detection, and recovery from pollution attacks in coding-based distributed storage schemes," IEEE Trans. Depend. Secure Comput., vol. 8, no. 6, pp. 824-838, Nov./Dec. 2011
-
(2011)
IEEE Trans. Depend. Secure Comput
, vol.8
, Issue.6
, pp. 824-838
-
-
Buttyan, L.1
Czap, L.2
Vajda, I.3
-
4
-
-
84861630520
-
LT codes-based secure, and reliable cloud storage service
-
N. Cao, S. Yu, Z. Yang, W. Lou, and Y. Hou, "LT codes-based secure, and reliable cloud storage service," in Proc. IEEE INFOCOM, 2012, pp. 693-701
-
(2012)
Proc. IEEE Infocom
, pp. 693-701
-
-
Cao, N.1
Yu, S.2
Yang, Z.3
Lou, W.4
Hou, Y.5
-
5
-
-
77958529104
-
Pollution attack defense for coding based sensor storage
-
L. Buttyn, L. Czap, and I. Vajda, "Pollution attack defense for coding based sensor storage," in Proc. IEEE Int. Conf. Sensor Netw. Ubiquitous Trustworthy Comput., 2010, pp. 66-73
-
(2010)
Proc. IEEE Int. Conf. Sensor Netw. Ubiquitous Trustworthy Comput
, pp. 66-73
-
-
Buttyn, L.1
Czap, L.2
Vajda, I.3
-
6
-
-
3543050732
-
On-the-fly verification of rateless erasure codes for efficient content distribution
-
M. N. Krohn, M. J. Freedman, and D. Mazieres, "On-the-fly verification of rateless erasure codes for efficient content distribution," in Proc. IEEE Symp. Secur. Privacy, 2004, pp. 226-240
-
(2004)
Proc. IEEE Symp. Secur. Privacy
, pp. 226-240
-
-
Krohn, M.N.1
Freedman, M.J.2
Mazieres, D.3
-
8
-
-
51349130622
-
An efficient signaturebased scheme for securing network coding against pollution attacks
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient signaturebased scheme for securing network coding against pollution attacks," in Proc. 27th Conf. Comput. Commun., 2008, pp. 2083-2091
-
(2008)
Proc. 27th Conf. Comput. Commun
, pp. 2083-2091
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
9
-
-
70349653419
-
Null keys: Limiting malicious attacks via null space properties of network coding
-
E. Kehdi, and B. Li, "Null keys: Limiting malicious attacks via null space properties of network coding," in Proc. IEEE INFOCOM, 2009, pp. 1224-1232
-
(2009)
Proc. IEEE INFOCOM
, pp. 1224-1232
-
-
Kehdi, E.1
Li, B.2
-
10
-
-
70349664122
-
An efficient scheme for securing XOR network coding against pollution attacks
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient scheme for securing XOR network coding against pollution attacks," in Proc. IEEE INFOCOM, 2009, pp. 406-414
-
(2009)
Proc. IEEE INFOCOM
, pp. 406-414
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
11
-
-
84923202070
-
A tag encoding scheme against pollution attack to linear network coding
-
Jan
-
X. Wu, Y. Xu, C. Yuen, and L. Xiang, "A tag encoding scheme against pollution attack to linear network coding," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 33-42, Jan. 2014
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, Issue.1
, pp. 33-42
-
-
Wu, X.1
Xu, Y.2
Yuen, C.3
Xiang, L.4
-
12
-
-
84904431009
-
Secure cloud storage meets with secure network coding
-
F. Chen, T. Xiang, Y. Yang, and S. Chow, "Secure cloud storage meets with secure network coding," in Proc. IEEE INFOCOM, 2014, pp. 673-681
-
(2014)
Proc. IEEE INFOCOM
, pp. 673-681
-
-
Chen, F.1
Xiang, T.2
Yang, Y.3
Chow, S.4
-
13
-
-
84866669823
-
Nc-Audit: Auditing for network coding storage
-
A. Le, and A. Markopoulou, "Nc-Audit: Auditing for network coding storage," in Proc. Int. Symp. Netw. Coding, 2012, pp. 155-160
-
(2012)
Proc. Int. Symp. Netw. Coding
, pp. 155-160
-
-
Le, A.1
Markopoulou, A.2
-
14
-
-
85027916843
-
An effective integrity check scheme for secure erasure code-based storage systems
-
Sep
-
S. T. Shen, H. Y. Lin, and W. G. Tzeng, "An effective integrity check scheme for secure erasure code-based storage systems," IEEE Trans. Rel., vol. 64, no. 3, pp. 840-851, Sep. 2015
-
(2015)
IEEE Trans. Rel
, vol.64
, Issue.3
, pp. 840-851
-
-
Shen, S.T.1
Lin, H.Y.2
Tzeng, W.G.3
-
15
-
-
45249114824
-
Byzantine modification detection in multicast networks with random network coding
-
Jun
-
T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and D. Karger, "Byzantine modification detection in multicast networks with random network coding," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2798-2803, Jun. 2008
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2798-2803
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Medard, M.4
Effros, M.5
Karger, D.6
-
16
-
-
45249101743
-
Resilient network coding in the presence of Byzantine adversaries
-
Jun
-
S. Jaggi, et al., "Resilient network coding in the presence of Byzantine adversaries," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2596-2603, Jun. 2008
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2596-2603
-
-
Jaggi, S.1
-
17
-
-
48849089497
-
Coding for errors, and erasures in random network coding
-
Aug
-
R. Koetter, and F. Kschischang, "Coding for errors, and erasures in random network coding," IEEE Trans. Inf. Theory, vol. 54, no. 8, pp. 3579-3591, Aug. 2008
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.8
, pp. 3579-3591
-
-
Koetter, R.1
Kschischang, F.2
-
18
-
-
78650081896
-
Remote data checking for network coding-based distributed storage systems
-
B. Chen, R. Curtmola, G. Ateniese, and R. Burns, "Remote data checking for network coding-based distributed storage systems," in Proc. ACM Workshop Cloud Comput. Secur. Workshop, 2010, pp. 31-42
-
(2010)
Proc. ACM Workshop Cloud Comput. Secur. Workshop
, pp. 31-42
-
-
Chen, B.1
Curtmola, R.2
Ateniese, G.3
Burns, R.4
-
20
-
-
73449141839
-
On the fly Gaussian elimination for LT codes
-
Dec
-
V. Bioglio, R. Gaeta, M. Grangetto, and M. Sereno, "On the fly Gaussian elimination for LT codes," IEEE Commun. Lett., vol. 13, no. 12, pp. 953-955, Dec. 2009
-
(2009)
IEEE Commun. Lett
, vol.13
, Issue.12
, pp. 953-955
-
-
Bioglio, V.1
Gaeta, R.2
Grangetto, M.3
Sereno, M.4
-
21
-
-
80054811296
-
An optimal partial decoding algorithm for rateless codes
-
V. Bioglio, M. Grangetto, R. Gaeta, and M. Sereno, "An optimal partial decoding algorithm for rateless codes," in Proc. IEEE Int. Symp. Inf. Theory Proc., 2011, pp. 2731-2735
-
(2011)
Proc. IEEE Int. Symp. Inf. Theory Proc
, pp. 2731-2735
-
-
Bioglio, V.1
Grangetto, M.2
Gaeta, R.3
Sereno, M.4
-
22
-
-
84883400280
-
Identification of malicious nodes in peer-to-peer streaming: A belief propagation based technique
-
Oct
-
R. Gaeta, and M. Grangetto, "Identification of malicious nodes in peer-to-peer streaming: A belief propagation based technique," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 10, pp. 1994-2003, Oct. 2013
-
(2013)
IEEE Trans. Parallel Distrib. Syst
, vol.24
, Issue.10
, pp. 1994-2003
-
-
Gaeta, R.1
Grangetto, M.2
-
24
-
-
77249133687
-
Measurement-based analysis, modeling, and synthesis of the Internet delay space
-
Feb
-
B. Zhang, T. S. E. Ng, A. Nandi, R. H. Riedi, P. Druschel, and G. Wang, "Measurement-based analysis, modeling, and synthesis of the Internet delay space," IEEE/ACM Trans. Netw., vol. 18, no. 1, pp. 229-242, Feb. 2010
-
(2010)
IEEE/ACM Trans. Netw
, vol.18
, Issue.1
, pp. 229-242
-
-
Zhang, B.1
Ng, T.S.E.2
Nandi, A.3
Riedi, R.H.4
Druschel, P.5
Wang, G.6
-
25
-
-
84893388109
-
Band codes for energy-efficient network coding with application to P2P mobile streaming
-
Feb
-
A. Fiandrotti, V. Bioglio, M. Grangetto, R. Gaeta, and E. Magli, "Band codes for energy-efficient network coding with application to P2P mobile streaming," IEEE Trans. Multimedia, vol. 16, no. 2, pp. 521-532, Feb. 2014
-
(2014)
IEEE Trans. Multimedia
, vol.16
, Issue.2
, pp. 521-532
-
-
Fiandrotti, A.1
Bioglio, V.2
Grangetto, M.3
Gaeta, R.4
Magli, E.5
|