ERSS-RLNC: Efficient and robust secure scheme for random linear network coding
暂无分享,去创建一个
[1] M. Medard,et al. An information-theoretic cryptanalysis of network coding - is protecting the code enough? , 2008, 2008 International Symposium on Information Theory and Its Applications.
[2] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[3] M. Gerla,et al. Performance of Network Coding in Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[4] Yuansheng Tang,et al. Secure Communication with Network Coding , 2012 .
[5] Tracey Ho,et al. Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[6] Tracey Ho,et al. A Random Linear Network Coding Approach to Multicast , 2006, IEEE Transactions on Information Theory.
[7] Dan Boneh,et al. Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures , 2011, Public Key Cryptography.
[8] Dirk Westhoff,et al. Data obfuscation with network coding , 2012, Comput. Commun..
[9] Moustafa Youssef,et al. A source authentication scheme using network coding , 2011, Int. J. Secur. Networks.
[10] Muriel Médard,et al. An algebraic approach to network coding , 2003, TNET.
[11] Xuemin Shen,et al. A scalable and robust key pre-distribution scheme with network coding for sensor data storage , 2011, Comput. Networks.
[12] C. Siva Ram Murthy,et al. On enhancing the random linear network coding , 2011, 2011 17th IEEE International Conference on Networks.
[13] Tracey Ho,et al. Resilient Network Coding in the Presence of Byzantine Adversaries , 2007, INFOCOM.
[14] Helena Handschuh,et al. Security Analysis of SHA-256 and Sisters , 2003, Selected Areas in Cryptography.
[15] J. Rodgers,et al. Thirteen ways to look at the correlation coefficient , 1988 .
[16] Tracey Ho,et al. Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[17] Xuemin Shen,et al. P-Coding: Secure Network Coding against Eavesdropping Attacks , 2010, 2010 Proceedings IEEE INFOCOM.
[18] Zhiwei Li,et al. Node localization through physical layer network coding: Bootstrap, security, and accuracy , 2012, Ad Hoc Networks.
[19] Baochun Li,et al. How Practical is Network Coding? , 2006, 200614th IEEE International Workshop on Quality of Service.
[20] Xuemin Shen,et al. An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding , 2009, IEEE INFOCOM 2009.
[21] Muriel Médard,et al. Random Linear Network Coding: A free cipher? , 2007, 2007 IEEE International Symposium on Information Theory.
[22] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[23] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[24] J. Heide,et al. Network Coding for Mobile Devices - Systematic Binary Random Rateless Codes , 2009, 2009 IEEE International Conference on Communications Workshops.
[25] Xuemin Shen,et al. A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding , 2009, Comput. Networks.
[26] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[27] Krishna R. Narayanan,et al. Weakly Secure Network Coding , 2005 .
[28] Carl B. Bates,et al. BI-CHI: A COMPUTER PROGRAM FOR THE CHI-SQUARE GOODNESS OF FIT TEST FOR A BIVARIATE NORMAL DISTRIBUTION , 1967 .
[29] D. E. Rutherford. Inverses of Boolean matrices , 1963 .
[30] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .