Security overhead of random linear network coding in multicast relay networks
暂无分享,去创建一个
[1] Xinyu Liu,et al. TDMA-Based Cooperative NC MAC Scheme for Two-Way Relaying Networks , 2018, IEEE Access.
[2] Jinyong Chang,et al. General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding , 2019, Future Gener. Comput. Syst..
[3] Georgios Mantas,et al. Security Threats in Network Coding-Enabled Mobile Small Cells , 2018, BROADNETS.
[4] Daniel E. Lucani,et al. An Analytical Model for Sparse Network Codes: Field Size Considerations , 2020, IEEE Communications Letters.
[5] Christos Gkantsidis,et al. Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[6] Milica Stojanovic,et al. On Coding for Delay—Network Coding for Time-Division Duplexing , 2012, IEEE Transactions on Information Theory.
[7] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[8] Sung Hoon Lim,et al. Distributed Decode–Forward for Relay Networks , 2015, IEEE Transactions on Information Theory.
[9] Muriel Médard,et al. On Code Parameters and Coding Vector Representation for Practical RLNC , 2011, 2011 IEEE International Conference on Communications (ICC).
[10] Morten Videbæk Pedersen,et al. Kodo: An Open and Research Oriented Network Coding Library , 2011, Networking Workshops.
[11] Peyman Pahlevani,et al. Network coding for hop-by-hop communication enhancement in multi-hop networks , 2016, Comput. Networks.
[12] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[13] Peyman Pahlevani,et al. On the coded packet relay network in the presence of Neighbors: Benefits of speaking in a crowded room , 2014, 2014 IEEE International Conference on Communications (ICC).
[14] Dongning Guo,et al. Throughput and Stability for Relay-Assisted Wireless Broadcast with Network Coding , 2013, IEEE Journal on Selected Areas in Communications.
[15] Yong Guan,et al. An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks , 2009, IEEE INFOCOM 2009.
[16] Fei Wang,et al. RKA Security for Identity-Based Signature Scheme , 2020, IEEE Access.
[17] Yong Guan,et al. An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[18] Peyman Pahlevani,et al. An Analytical Model for Rank Distribution in Sparse Network Coding , 2019, IEEE Communications Letters.
[19] Dan Boneh,et al. Homomorphic MACs: MAC-Based Integrity for Network Coding , 2009, ACNS.
[20] Peyman Pahlevani,et al. On the Performance of the Cache Coding Protocol , 2018, Inf..
[21] Tracey Ho,et al. A Random Linear Network Coding Approach to Multicast , 2006, IEEE Transactions on Information Theory.
[22] Fang Zhao,et al. Signatures for Content Distribution with Network Coding , 2007, 2007 IEEE International Symposium on Information Theory.
[23] Alireza Esfahani,et al. Dual-Homomorphic Message Authentication Code Scheme for Network Coding-Enabled Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.
[24] Xuemin Shen,et al. Padding for orthogonality: Efficient subspace authentication for network coding , 2011, 2011 Proceedings IEEE INFOCOM.
[25] Mario Gerla,et al. A new approach to coding in content-based MANETs , 2014, ICNC.
[26] Alireza Esfahani,et al. An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks , 2016, International Journal of Information Security.
[27] Bilin Shao,et al. Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC , 2019, IEEE Access.
[28] Ioannis Chatzigeorgiou,et al. Decoding Delay Performance of Random Linear Network Coding for Broadcast , 2017, IEEE Transactions on Vehicular Technology.