Efficient and Universal Corruption Resilient Fountain Codes
暂无分享,去创建一个
Shlomi Dolev | Asaf Cohen | Nir Tzachar | S. Dolev | A. Cohen | Nir Tzachar
[1] Shlomi Dolev,et al. Smooth and adaptive forward erasure correcting , 2001, Comput. Networks.
[2] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[3] Edoardo Amaldi,et al. The Complexity and Approximability of Finding Maximum Feasible Subsystems of Linear Relations , 1995, Theor. Comput. Sci..
[4] Tracey Ho,et al. Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[5] Sidharth Jaggi,et al. Multiple-Access Network Information-Flow and Correction Codes , 2010, IEEE Transactions on Information Theory.
[6] Frank R. Kschischang,et al. Coding for Errors and Erasures in Random Network Coding , 2007, IEEE Transactions on Information Theory.
[7] A. Beimel,et al. RT Oblivious Erasure Correcting , 2004, IEEE/ACM Transactions on Networking.
[8] Moti Yung,et al. Secret Swarm UnitReactive k-Secret Sharing , 2007, INDOCRYPT.
[9] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[10] Colin Cooper,et al. On the distribution of rank of a random matrix over a finite field , 2000, Random Struct. Algorithms.
[11] Frank R. Kschischang,et al. Fast encoding and decoding of Gabidulin codes , 2009, 2009 IEEE International Symposium on Information Theory.
[12] Douglas H. Wiedemann. Solving sparse linear equations over finite fields , 1986, IEEE Trans. Inf. Theory.
[13] Fang Zhao,et al. Signatures for Content Distribution with Network Coding , 2007, 2007 IEEE International Symposium on Information Theory.
[14] Michael Luby,et al. LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[15] Michael Luby,et al. A digital fountain approach to reliable distribution of bulk data , 1998, SIGCOMM '98.
[16] Moti Yung,et al. Secret swarm unit: Reactive k-secret sharing , 2012, Ad Hoc Networks.
[17] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[18] Shenghao Yang,et al. Coding for a network coded fountain , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.