On the Performance of the Cache Coding Protocol
暂无分享,去创建一个
[1] Milica Stojanovic,et al. On Coding for Delay—Network Coding for Time-Division Duplexing , 2012, IEEE Transactions on Information Theory.
[2] Muriel Medard,et al. On network coding for security , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[3] R. Koetter,et al. An algebraic approach to network coding , 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).
[4] Tracey Ho,et al. A Random Linear Network Coding Approach to Multicast , 2006, IEEE Transactions on Information Theory.
[5] Mario Gerla,et al. A new approach to coding in content-based MANETs , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[6] Peyman Pahlevani,et al. On Optimal Policies for Network-Coded Cooperation: Theory and Implementation , 2015, IEEE Journal on Selected Areas in Communications.
[7] Robert J. Piechocki,et al. Novel Performance Analysis of Network Coded Communications in Single-Relay Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[8] Yuguang Fang,et al. Throughput-Delay Tradeoffs in Large-Scale MANETs with Network Coding , 2009, IEEE INFOCOM 2009.
[9] Robert J. Piechocki,et al. Reliability of Multicast Under Random Linear Network Coding , 2017, IEEE Transactions on Communications.
[10] Dan Boneh,et al. Homomorphic MACs: MAC-Based Integrity for Network Coding , 2009, ACNS.
[11] Peyman Pahlevani,et al. On the coded packet relay network in the presence of Neighbors: Benefits of speaking in a crowded room , 2014, 2014 IEEE International Conference on Communications (ICC).
[12] Reza Curtmola,et al. Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks , 2009, WiSec '09.
[13] Fang Zhao,et al. Signatures for Content Distribution with Network Coding , 2007, 2007 IEEE International Symposium on Information Theory.
[14] Peyman Pahlevani,et al. Network-Coded Cooperation Over Time-Varying Channels , 2014, IEEE Transactions on Communications.
[15] Daniel E. Lucani,et al. A Markov Chain Model for the Decoding Probability of Sparse Network Coding , 2016, ArXiv.
[16] Hugo Krawczyk,et al. Performance Evaluation of Secure Network Coding Using Homomorphic Signature , 2011, 2011 International Symposium on Networking Coding.
[17] Milica Stojanovic,et al. Broadcasting in time-division duplexing: A random linear network coding approach , 2009, 2009 Workshop on Network Coding, Theory, and Applications.
[18] Morten Videbæk Pedersen,et al. Kodo: An Open and Research Oriented Network Coding Library , 2011, Networking Workshops.
[19] Jonathan Katz,et al. Secure Network Coding Over the Integers , 2010, IACR Cryptol. ePrint Arch..
[20] Jonathan Katz,et al. Signing a Linear Subspace: Signature Schemes for Network Coding , 2009, IACR Cryptol. ePrint Arch..
[21] John G. Kemeny,et al. Finite Markov chains , 1960 .
[22] Alireza Esfahani,et al. An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks , 2016, International Journal of Information Security.
[23] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.