Compact Signatures for Network Coding
暂无分享,去创建一个
[1] K. Jain,et al. Practical Network Coding , 2003 .
[2] Tracey Ho,et al. Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[3] Tracey Ho,et al. A Random Linear Network Coding Approach to Multicast , 2006, IEEE Transactions on Information Theory.
[4] Muriel Medard,et al. On network coding for security , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[5] Dawn Xiaodong Song,et al. Homomorphic Signature Schemes , 2002, CT-RSA.
[6] Sidharth Jaggi,et al. Design and analysis of network codes , 2005 .
[7] Jon Feldman,et al. On the Capacity of Secure Network Coding , 2004 .
[8] Ning Cai,et al. Network error correction , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[9] Christos Gkantsidis,et al. Network coding for large scale content distribution , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[10] R. Koetter,et al. The benefits of coding over routing in a randomized setting , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[11] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[12] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[13] Tracey Ho,et al. Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[14] R. Yeung,et al. NETWORK ERROR CORRECTION , PART I : BASIC CONCEPTS AND UPPER BOUNDS , 2006 .
[15] Kamal Jain,et al. Signatures for Network Coding , 2006 .
[16] R. Yeung,et al. Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.
[17] Fang Zhao,et al. Signatures for Content Distribution with Network Coding , 2007, 2007 IEEE International Symposium on Information Theory.
[18] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[19] Shuo-Yen Robert Li,et al. Linear network coding , 2003, IEEE Trans. Inf. Theory.
[20] Muriel Médard,et al. XORs in the Air: Practical Wireless Network Coding , 2006, IEEE/ACM Transactions on Networking.
[21] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[22] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.