An Efficient Dynamic Authentication Scheme for Secure Network Coding
暂无分享,去创建一个
Lin Chen | Hong Wang | Ming He | Zhenghu Gong | Fan Dai
[1] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[2] João Barros,et al. Lightweight Security for Network Coding , 2008, 2008 IEEE International Conference on Communications.
[3] Haider M. AlSabbagh,et al. Performance Analysis for Bit Error Rate of DS- CDMA Sensor Network Systems with Source Coding , 2012 .
[4] Hao Wu,et al. Efficient network coding-based multicast retransmission mechanism for mobile communication networks , 2012, IET Commun..
[5] Yong Guan,et al. An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks , 2009, IEEE INFOCOM 2009.
[6] Minghua Chen,et al. RIPPLE Authentication for Network Coding , 2010, 2010 Proceedings IEEE INFOCOM.
[7] Nipun Bansal,et al. Peer to Peer Networking and Applications , 2013 .
[8] Reza Curtmola,et al. Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks , 2009, WiSec '09.
[9] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[10] Tracey Ho,et al. Resilient Network Coding in the Presence of Byzantine Adversaries , 2007, INFOCOM.
[11] Frank R. Kschischang,et al. Universal weakly secure network coding , 2009, 2009 IEEE Information Theory Workshop on Networking and Information Theory.
[12] Mohammad Mehdi Ebadzadeh,et al. Dynamic Particle Swarm Optimization for Multimodal Function , 2012 .
[13] Fumiyuki Adachi,et al. Power Efficient Adaptive Network Coding in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[14] T. Ho,et al. On Linear Network Coding , 2010 .
[15] Fang Zhao,et al. Signatures for Content Distribution with Network Coding , 2007, 2007 IEEE International Symposium on Information Theory.
[16] Baochun Li,et al. Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding , 2009, IEEE INFOCOM 2009.
[17] Tracey Ho,et al. Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[18] Frank R. Kschischang,et al. Coding for Errors and Erasures in Random Network Coding , 2007, IEEE Transactions on Information Theory.
[19] Christos Gkantsidis,et al. Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.