Preventing Pollution Attacks in Multi-Source Network Coding
暂无分享,去创建一个
[1] Muriel Médard,et al. XORs in the Air: Practical Wireless Network Coding , 2006, IEEE/ACM Transactions on Networking.
[2] Jon Feldman,et al. On the Capacity of Secure Network Coding , 2004 .
[3] Mihir Bellare,et al. Incremental Cryptography: The Case of Hashing and Signing , 1994, CRYPTO.
[4] Kamal Jain,et al. Signatures for Network Coding , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[5] R. Yeung,et al. Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.
[6] Fang Zhao,et al. Signatures for Content Distribution with Network Coding , 2007, 2007 IEEE International Symposium on Information Theory.
[7] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[8] B. Cohen,et al. Incentives Build Robustness in Bit-Torrent , 2003 .
[9] Paulo S. L. M. Barreto,et al. Pairing-Friendly Elliptic Curves of Prime Order , 2005, Selected Areas in Cryptography.
[10] Tracey Ho,et al. Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[11] Jörg Widmer,et al. Network coding: an instant primer , 2006, CCRV.
[12] Jonathan Katz,et al. Signing a Linear Subspace: Signature Schemes for Network Coding , 2009, IACR Cryptol. ePrint Arch..
[13] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[14] Christina Fragouli,et al. Network Coding Fundamentals , 2007, Found. Trends Netw..
[15] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[16] Minghua Chen,et al. RIPPLE Authentication for Network Coding , 2010, 2010 Proceedings IEEE INFOCOM.
[17] Dan Boneh,et al. Homomorphic MACs: MAC-Based Integrity for Network Coding , 2009, ACNS.
[18] Muriel Médard,et al. An algebraic approach to network coding , 2003, TNET.
[19] Tracey Ho,et al. Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[20] Muriel Medard,et al. On network coding for security , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[21] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.