On Wiretap Networks II
暂无分享,去创建一个
[1] Jon Feldman,et al. On the Capacity of Secure Network Coding , 2004 .
[2] Krishna R. Narayanan,et al. Weakly Secure Network Coding , 2005 .
[3] Ryutaroh Matsumoto. Construction algorithm for network error-correcting codes attaining the Singleton bound , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[4] R. Yeung,et al. Characterizations of Network Error Correction / Detection and Erasure Correction , 2007 .
[5] Peter Sanders,et al. Polynomial time algorithms for multicast network code construction , 2005, IEEE Transactions on Information Theory.
[6] Kamal Jain. Security based on network topology against the wiretapping attack , 2004, IEEE Wireless Communications.
[7] Muriel Medard,et al. Resilient Network Coding in the Presence of , 2007 .
[8] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[9] Shuo-Yen Robert Li,et al. Linear network coding , 2003, IEEE Trans. Inf. Theory.
[10] Zhen Zhang,et al. Network Error Correction Coding in Packetized Networks , 2006, 2006 IEEE Information Theory Workshop - ITW '06 Chengdu.
[11] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..
[12] Tracey Ho,et al. Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[13] Michael Langberg,et al. The encoding complexity of network coding , 2005, ISIT.
[14] R. Yeung,et al. Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.
[15] Michael Langberg,et al. Network Coding: A Computational Perspective , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[16] Tracey Ho,et al. Resilient Network Coding in the Presence of Byzantine Adversaries , 2007, INFOCOM.
[17] Christina Fragouli,et al. Information flow decomposition for network coding , 2006, IEEE Transactions on Information Theory.