Secure Error-Correcting Network Codes with Side Information from Source
暂无分享,去创建一个
[1] Frank R. Kschischang,et al. Coding for Errors and Erasures in Random Network Coding , 2008, IEEE Trans. Inf. Theory.
[2] Victor K.-W. Wei,et al. Generalized Hamming weights for linear codes , 1991, IEEE Trans. Inf. Theory.
[3] Raymond W. Yeung,et al. Network generalized hamming weight , 2009 .
[4] Raymond W. Yeung,et al. Secure error-correcting (SEC) network codes , 2009, 2009 Workshop on Network Coding, Theory, and Applications.
[5] Emina Soljanin,et al. On Wiretap Networks II , 2007, 2007 IEEE International Symposium on Information Theory.
[6] Kefei Chen,et al. Some new characters on the wire-tap channel of type II , 2005, IEEE Transactions on Information Theory.
[7] Tracey Ho,et al. Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[8] Peter Sanders,et al. Polynomial time algorithms for multicast network code construction , 2005, IEEE Transactions on Information Theory.
[9] Frank R. Kschischang,et al. Security for wiretap networks via rank-metric codes , 2007, 2008 IEEE International Symposium on Information Theory.
[10] R. Yeung,et al. NETWORK ERROR CORRECTION, PART II: LOWER BOUNDS , 2006 .
[11] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Laboratories Technical Journal.
[12] R. Yeung,et al. NETWORK ERROR CORRECTION , PART I : BASIC CONCEPTS AND UPPER BOUNDS , 2006 .
[13] R. Yeung,et al. Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.
[14] Zhixue Zhang. Wiretap networks II with partial information leakage , 2009, 2009 Fourth International Conference on Communications and Networking in China.
[15] R. Yeung,et al. Characterizations of Network Error Correction / Detection and Erasure Correction , 2007 .
[16] Ning Cai,et al. Network Error Correction, I: Basic Concepts and Upper Bounds , 2006, Commun. Inf. Syst..