Secure efficient routing based on network coding in the delay tolerant networks
暂无分享,去创建一个
[1] Meng Wu,et al. Secure multipath routing based on secret sharing in mobile ad hoc networks , 2009, 2009 IEEE International Conference on Network Infrastructure and Digital Content.
[2] Jonathan Katz,et al. Signing a Linear Subspace: Signature Schemes for Network Coding , 2009, IACR Cryptol. ePrint Arch..
[3] Tracey Ho,et al. Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[4] B. Sundar Rajan,et al. Convolutional Codes for Network-Error Correction , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[5] Muriel Médard,et al. Random Linear Network Coding: A free cipher? , 2007, 2007 IEEE International Symposium on Information Theory.
[6] Boleslaw K. Szymanski,et al. On Secure Multi-Copy Based Routing in Compromised Delay Tolerant Networks , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).
[7] George Danezis,et al. Introducing Traffic Analysis , 2007 .
[8] Kevin R. Fall,et al. A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.
[9] Yong Guan,et al. An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.