Byzantine modification detection in multicast networks using randomized network coding
暂无分享,去创建一个
Tracey Ho | Muriel Médard | David R. Karger | Michelle Effros | Ben Leong | Ralf Koetter | R. Koetter | T. Ho | B. Leong | M. Médard | M. Effros | David R Karger
[1] Fang Zhao,et al. Minimum-cost multicast over coded packet networks , 2005, IEEE Transactions on Information Theory.
[2] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[3] Gustavus J. Simmons,et al. Contemporary Cryptology: The Science of Information Integrity , 1994 .
[4] Moti Yung,et al. Perfectly secure message transmission , 1993, JACM.
[5] Babak Hassibi,et al. Capacity of wireless erasure networks , 2006, IEEE Transactions on Information Theory.
[6] Baochun Li,et al. How Practical is Network Coding? , 2006, 200614th IEEE International Workshop on Quality of Service.
[7] Radia J. Perlman,et al. Network layer protocols with Byzantine robustness , 1988 .
[8] Yvo Desmedt. Unconditionally private and reliable communication in an untrusted network , 2005, IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005..
[9] Muriel Medard,et al. On Randomized Network Coding , 2003 .
[10] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[11] Yoram Moses,et al. Fully Polynomial Byzantine Agreement for n > 3t Processors in t + 1 Rounds , 1998, SIAM J. Comput..
[12] Muriel Médard,et al. An algebraic approach to network coding , 2003, TNET.
[13] R. Koetter,et al. The benefits of coding over routing in a randomized setting , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[14] Michael K. Reiter,et al. A high-throughput secure reliable multicast protocol , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[15] Muriel Médard,et al. On coding for reliable communication over packet networks , 2005, Phys. Commun..
[16] Louise E. Moser,et al. The SecureRing protocols for securing group communication , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.
[17] R. Yeung,et al. Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.
[18] Krishna R. Narayanan,et al. Weakly Secure Network Coding , 2005 .
[19] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[20] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[21] K. Jain,et al. Practical Network Coding , 2003 .
[22] K. K. Chi,et al. Analysis of network error correction based on network coding , 2005 .
[23] Jon Feldman,et al. On the Capacity of Secure Network Coding , 2004 .