Performance Evaluation of Secure Network Coding Using Homomorphic Signature
暂无分享,去创建一个
[1] Hugo Krawczyk,et al. Quantitative Evaluation of Secure Network Coding using Homomorphic Signature / Hashing , 2011 .
[2] Christos Gkantsidis,et al. Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[3] Athina Markopoulou,et al. Locating Byzantine Attackers in Intra-Session Network Coding Using SpaceMac , 2010, 2010 IEEE International Symposium on Network Coding (NetCod).
[4] Paulo S. L. M. Barreto,et al. Pairing-Friendly Elliptic Curves of Prime Order , 2005, Selected Areas in Cryptography.
[5] Ning Cai,et al. Network error correction , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[6] Ethan L. Miller,et al. An experimental analysis of cryptographic overhead in performance-critical systems , 1999, MASCOTS '99. Proceedings of the Seventh International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[7] Dan Boneh,et al. Homomorphic MACs: MAC-Based Integrity for Network Coding , 2009, ACNS.
[8] Ning Cai,et al. Network coding and error correction , 2002, Proceedings of the IEEE Information Theory Workshop.
[9] Tommy Färnqvist. Number Theory Meets Cache Locality – Efficient Implementation of a Small Prime FFT for the GNU Multiple Precision Arithmetic Library , 2005 .
[10] Fang Zhao,et al. Signatures for Content Distribution with Network Coding , 2007, 2007 IEEE International Symposium on Information Theory.
[11] Muriel Médard,et al. Codecast: a network-coding-based ad hoc multicast protocol , 2006, IEEE Wireless Communications.
[12] K. Jain,et al. Practical Network Coding , 2003 .
[13] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[14] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[16] Donald F. Towsley,et al. Bounds on the Gain of Network Coding and Broadcasting in Wireless Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[17] Baochun Li,et al. How Practical is Network Coding? , 2006, 200614th IEEE International Workshop on Quality of Service.
[18] Sachin Katti,et al. Trading structure for randomness in wireless opportunistic routing , 2007, SIGCOMM 2007.
[19] Reza Curtmola,et al. Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks , 2009, WiSec '09.
[20] Jonathan Katz,et al. Signing a subspace: Signatures for network coding , 2009 .
[21] Frank Mueller,et al. Analyzing and modeling encryption overhead for sensor network nodes , 2003, WSNA '03.
[22] Rong Luo,et al. Cryptography Overhead Evaluation and Analysis for Wireless Sensor Networks , 2009, 2009 WRI International Conference on Communications and Mobile Computing.
[23] Dawn Xiaodong Song,et al. Homomorphic Signature Schemes , 2002, CT-RSA.
[24] Jonathan Katz,et al. Secure Network Coding Over the Integers , 2010, IACR Cryptol. ePrint Arch..
[25] Christos Gkantsidis,et al. Network coding for large scale content distribution , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[26] Joong Bum Rhim,et al. Fountain Codes , 2010 .
[27] M. Gerla,et al. Network Coding Multicast Performance When Some Nodes Do Not Code , 2009 .
[28] Kamal Jain,et al. Signatures for Network Coding , 2006 .
[29] Giovanni Pau,et al. Code torrent: content distribution using network coding in VANET , 2006, MobiShare '06.