Authentication for two-way relay channel with Physical-Layer Network coding
暂无分享,去创建一个
[1] Soung Chang Liew,et al. Hot topic: physical-layer network coding , 2006, MobiCom '06.
[2] Wei-Ho Chung,et al. Diffie-Hellman key distribution in wireless multi-way relay networks , 2013, 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference.
[3] Ueli Maurer,et al. Authentication theory and hypothesis testing , 2000, IEEE Trans. Inf. Theory.
[4] H. Vincent Poor,et al. Message Authentication: Information Theoretic Bounds , 2009 .
[5] Reza Curtmola,et al. Practical defenses against pollution attacks in wireless network coding , 2011, TSEC.
[6] Gustavus J. Simmons,et al. Authentication Theory/Coding Theory , 1985, CRYPTO.
[7] Ute Rosenbaum. A lower bound on authentication after having observed a sequence of messages , 2004, Journal of Cryptology.
[8] Cédric Lauradoux,et al. Energy Friendly Integrity for Network Coding in Wireless Sensor Networks , 2010, 2010 Fourth International Conference on Network and System Security.
[9] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[10] Muriel Médard,et al. XORs in the Air: Practical Wireless Network Coding , 2006, IEEE/ACM Transactions on Networking.
[11] Dingyi Pei. Information-theoretic bounds for authentication codes and block designs , 2004, Journal of Cryptology.
[12] Benxiong Huang,et al. Survey of network coding-aware routing protocols in wireless networks , 2011, J. Netw. Comput. Appl..
[13] Reza Curtmola,et al. Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems , 2012, IEEE Transactions on Dependable and Secure Computing.