Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
暂无分享,去创建一个
[1] Tracey Ho,et al. Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[2] Tracey Ho,et al. Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[3] Muriel Médard,et al. An algebraic approach to network coding , 2003, TNET.
[4] Kamal Jain,et al. Signatures for Network Coding , 2006 .
[5] R. Koetter,et al. The benefits of coding over routing in a randomized setting , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[6] Frank R. Kschischang,et al. Capacity of random network coding under a probabilistic error model , 2008, 2008 24th Biennial Symposium on Communications.
[7] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[8] Frank R. Kschischang,et al. Coding for Errors and Erasures in Random Network Coding , 2008, IEEE Trans. Inf. Theory.
[9] Frank R. Kschischang,et al. Using Rank-Metric Codes for Error Correction in Random Network Coding , 2007, 2007 IEEE International Symposium on Information Theory.
[10] Randall Dougherty,et al. Insufficiency of linear coding in network information flow , 2005, IEEE Transactions on Information Theory.
[11] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.