暂无分享,去创建一个
Lang Tong | Oliver Kosut | L. Tong | O. Kosut
[1] Lang Tong,et al. Distributed Inference in the Presence of Byzantine Sensors , 2006, 2006 Fortieth Asilomar Conference on Signals, Systems and Computers.
[2] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[3] Radia J. Perlman,et al. Network layer protocols with Byzantine robustness , 1988 .
[4] Jack K. Wolf,et al. Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.
[5] Tracey Ho,et al. Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[6] Danny Dolev,et al. The Byzantine Generals Strike Again , 1981, J. Algorithms.
[7] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[8] Lang Tong,et al. Capacity of Cooperative Fusion in the Presence of Byzantine Sensors , 2006, ArXiv.
[9] Toby Berger,et al. The CEO problem [multiterminal source coding] , 1996, IEEE Trans. Inf. Theory.
[10] Giuseppe Longo,et al. The information theory approach to communications , 1977 .
[11] Tracey Ho,et al. Correction of adversarial errors in networks , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[12] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[13] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[14] Helmut Kurth,et al. Certifying open source - the Linux experience , 2004, IEEE Security & Privacy Magazine.