Securing network coding against pollution attacks based on space and time properties
暂无分享,去创建一个
Lin Chen | Hong Wang | Zhihong Liu | Ming He | Zhenghu Gong | Fan Dai
[1] Reza Curtmola,et al. Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks , 2009, WiSec '09.
[2] Michael Langberg,et al. On the Hardness of Approximating the Network Coding Capacity , 2008, IEEE Transactions on Information Theory.
[3] Fumiyuki Adachi,et al. Power Efficient Adaptive Network Coding in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[4] Wanjiun Liao,et al. Congestion-Aware Network-Coding-Based Opportunistic Routing in Wireless Ad Hoc Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[5] Frank R. Kschischang,et al. Universal weakly secure network coding , 2009, 2009 IEEE Information Theory Workshop on Networking and Information Theory.
[6] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[7] Yong Guan,et al. An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks , 2009, IEEE INFOCOM 2009.
[8] Fang Zhao,et al. Signatures for Content Distribution with Network Coding , 2007, 2007 IEEE International Symposium on Information Theory.
[9] Baochun Li,et al. Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding , 2009, IEEE INFOCOM 2009.
[10] João Barros,et al. Lightweight Security for Network Coding , 2008, 2008 IEEE International Conference on Communications.
[11] Christos Gkantsidis,et al. Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[12] Minghua Chen,et al. RIPPLE Authentication for Network Coding , 2010, 2010 Proceedings IEEE INFOCOM.
[13] Peter Elias,et al. A note on the maximum flow through a network , 1956, IRE Trans. Inf. Theory.
[14] Tracey Ho,et al. Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[15] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.