Performance Bounds on a Wiretap Network With Arbitrary Wiretap Sets
暂无分享,去创建一个
[1] Raymond W. Yeung,et al. Information Theory and Network Coding , 2008 .
[2] Ning Cai,et al. A Security Condition for Multi-Source Linear Network Coding , 2007, 2007 IEEE International Symposium on Information Theory.
[3] Richard M. Wilson,et al. A course in combinatorics , 1992 .
[4] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[5] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..
[6] Raymond W. Yeung,et al. Secure error-correcting (SEC) network codes , 2009, 2009 Workshop on Network Coding, Theory, and Applications.
[7] Raymond W. Yeung,et al. Symmetrical multilevel diversity coding , 1997, IEEE Trans. Inf. Theory.
[8] Krishna R. Narayanan,et al. Weakly Secure Network Coding , 2005 .
[9] Emina Soljanin,et al. On Wiretap Networks II , 2007, 2007 IEEE International Symposium on Information Theory.
[10] R. Curtis. A course in combinatorics (2nd edn), by J. H. van Lint and R. M. Wilson. Pp. 602. £24.95. 2001. ISBN 0 521 00601 5 (Cambridge University Press). , 2003, The Mathematical Gazette.
[11] Kunihiko Harada,et al. Strongly Secure Linear Network Coding , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[12] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[13] Shenghao Yang,et al. Deterministic Secure Error-Correcting (SEC) Network Codes , 2007, 2007 IEEE Information Theory Workshop.
[14] Adi Shamir,et al. How to share a secret , 1979, CACM.
[15] Te Sun Han. Nonnegative Entropy Measures of Multivariate Symmetric Correlations , 1978, Inf. Control..
[16] Frank R. Kschischang,et al. Security for wiretap networks via rank-metric codes , 2007, 2008 IEEE International Symposium on Information Theory.
[17] Tracey Ho,et al. Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[18] Ning Cai,et al. Secure Network Coding on a Wiretap Network , 2011, IEEE Transactions on Information Theory.
[19] Jianlong Tan,et al. Secure Network Coding with a Cost Criterion , 2006, 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks.
[20] Tie Liu,et al. Symmetrical multilevel diversity coding with an all-access encoder , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[21] Muriel Médard,et al. Secure network coding for multi-resolution wireless video streaming , 2010, IEEE Journal on Selected Areas in Communications.
[22] John N. Tsitsiklis,et al. Introduction to linear optimization , 1997, Athena scientific optimization and computation series.
[23] Jon Feldman,et al. On the Capacity of Secure Network Coding , 2004 .
[24] Xin-She Yang,et al. Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.
[25] Muriel Médard,et al. Random Linear Network Coding: A free cipher? , 2007, 2007 IEEE International Symposium on Information Theory.
[26] Tracey Ho,et al. Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[27] Tracey Ho,et al. On Secure Network Coding With Nonuniform or Restricted Wiretap Sets , 2009, IEEE Transactions on Information Theory.
[28] Mokshay M. Madiman,et al. Information Inequalities for Joint Distributions, With Interpretations and Applications , 2008, IEEE Transactions on Information Theory.
[29] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..