Epidemic Attacks in Network-Coding-Enabled Wireless Mesh Networks: Detection, Identification, and Evaluation
暂无分享,去创建一个
[1] John C. S. Lui,et al. On the Performance Bounds of Practical Wireless Network Coding , 2010, IEEE Transactions on Mobile Computing.
[2] Jing Dong,et al. Toward secure network coding in wireless networks: Threats and challenges , 2008, 2008 4th Workshop on Secure Network Protocols.
[3] Baochun Li,et al. Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding , 2009, IEEE INFOCOM 2009.
[4] Reza Curtmola,et al. Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks , 2009, WiSec '09.
[5] Sachin Katti,et al. Trading structure for randomness in wireless opportunistic routing , 2007, SIGCOMM '07.
[6] Tracey Ho,et al. Byzantine Modification Detection in Multicast Networks With Random Network Coding , 2008, IEEE Transactions on Information Theory.
[7] Robert Tappan Morris,et al. Opportunistic routing in multi-hop wireless networks , 2004, Comput. Commun. Rev..
[8] Gregory W. Wornell,et al. Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.
[9] Robert Tappan Morris,et al. Link-level measurements from an 802.11b mesh network , 2004, SIGCOMM '04.
[10] C. Fragouli,et al. On Locating Byzantine Attackers , 2008, 2008 Fourth Workshop on Network Coding, Theory and Applications.
[11] Paramvir Bahl,et al. Opportunistic Use of Client Repeaters to Improve Performance of WLANs , 2008, IEEE/ACM Transactions on Networking.
[12] John C. S. Lui,et al. DCAR: Distributed Coding-Aware Routing in Wireless Networks , 2008, IEEE Transactions on Mobile Computing.
[13] T. Ho,et al. On Linear Network Coding , 2010 .
[14] Athina Markopoulou,et al. Locating Byzantine Attackers in Intra-Session Network Coding Using SpaceMac , 2010, 2010 IEEE International Symposium on Network Coding (NetCod).
[15] Tracey Ho,et al. On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.
[16] Robert Tappan Morris,et al. a high-throughput path metric for multi-hop wireless routing , 2003, MobiCom '03.
[17] John C. S. Lui,et al. On the Access Pricing and Network Scaling Issues of Wireless Mesh Networks , 2007, IEEE Transactions on Computers.
[18] Hari Balakrishnan,et al. Improving loss resilience with multi-radio diversity in wireless networks , 2005, MobiCom '05.
[19] Ian F. Akyildiz,et al. A survey on wireless mesh networks , 2005, IEEE Communications Magazine.
[20] Sachin Katti,et al. The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments , 2005 .
[21] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[22] Muriel Medard,et al. On Randomized Network Coding , 2003 .
[23] Christos Gkantsidis,et al. Multipath code casting for wireless mesh networks , 2007, CoNEXT '07.
[24] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.