Resilient network coding in the presence of Byzantine adversaries
暂无分享,去创建一个
Tracey Ho | Michael Langberg | Muriel Médard | Sidharth Jaggi | Michelle Effros | Sachin Katti | Dina Katabi | T. Ho | D. Katabi | S. Katti | M. Médard | M. Effros | S. Jaggi | M. Langberg
[1] Muriel Médard,et al. XORs in the Air: Practical Wireless Network Coding , 2006, IEEE/ACM Transactions on Networking.
[2] Muriel Médard,et al. Beyond routing: an algebraic approach to network coding , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[3] Moti Yung,et al. Perfectly secure message transmission , 1993, JACM.
[4] R. Yeung,et al. Network coding theory , 2006 .
[5] Journal of the Association for Computing Machinery , 1961, Nature.
[6] R. Koetter,et al. The benefits of coding over routing in a randomized setting , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[7] Sidharth Jaggi,et al. Design and analysis of network codes , 2005 .
[8] Jon Feldman,et al. On the Capacity of Secure Network Coding , 2004 .
[9] Muriel Médard,et al. An algebraic approach to network coding , 2003, TNET.
[10] Andrzej Pelc,et al. Broadcasting with locally bounded Byzantine faults , 2005, Inf. Process. Lett..
[11] Christos Gkantsidis,et al. Network coding for large scale content distribution , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[12] Muriel Medard,et al. On Randomized Network Coding , 2003 .
[13] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[14] Christos Gkantsidis,et al. Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[15] Zhen Zhang,et al. Linear Network Error Correction Codes in Packet Networks , 2008, IEEE Transactions on Information Theory.
[16] Tracey Ho,et al. Correction of adversarial errors in networks , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[17] Anxiao Jiang. Network Coding for Joint Storage and Transmission with Minimum Cost , 2006, 2006 IEEE International Symposium on Information Theory.
[18] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[19] R. Yeung,et al. NETWORK ERROR CORRECTION, PART II: LOWER BOUNDS , 2006 .
[20] Anthony Ephremides,et al. On the construction of energy-efficient broadcast and multicast trees in wireless networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[21] Muriel Médard,et al. XORs in the air: practical wireless network coding , 2008, TNET.
[22] Muriel Médard,et al. Achieving minimum-cost multicast: a decentralized approach based on network coding , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[23] R. Yeung,et al. NETWORK ERROR CORRECTION , PART I : BASIC CONCEPTS AND UPPER BOUNDS , 2006 .
[24] R. Yeung,et al. Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.
[25] Peter Sanders,et al. Polynomial time algorithms for multicast network code construction , 2005, IEEE Transactions on Information Theory.
[26] Tracey Ho,et al. Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[27] Christina Fragouli,et al. Network Coding Fundamentals , 2007, Found. Trends Netw..
[28] Kamal Jain,et al. Signatures for Network Coding , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[29] Fang Zhao,et al. Signatures for Content Distribution with Network Coding , 2007, 2007 IEEE International Symposium on Information Theory.
[30] Ning Cai,et al. Network error correction , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[31] Frank R. Kschischang,et al. Coding for Errors and Erasures in Random Network Coding , 2007, IEEE Transactions on Information Theory.
[32] H. Wertz,et al. On the numerical inversion of a recurrent problem: The Vandermonde matrix , 1965 .
[33] Tracey Ho,et al. Network Coding with a Cost Criterion , 2004 .
[34] Randy H. Katz,et al. Decentralized security mechanisms for routing protocols , 2005 .
[35] Muriel Medard,et al. Efficient Operation of Wireless Packet Networks Using Network Coding , 2005 .
[36] Tracey Ho,et al. A Random Linear Network Coding Approach to Multicast , 2006, IEEE Transactions on Information Theory.
[37] Sachin Katti,et al. The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments , 2005 .
[38] Michael Langberg,et al. Resilient network codes in the presence of eavesdropping Byzantine adversaries , 2007, 2007 IEEE International Symposium on Information Theory.
[39] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.