Resilient Network Coding in the Presence of
暂无分享,去创建一个
Muriel Medard | Tracey Ho | Michael Langberg | Sidharth Jaggi | Michelle Effros | Sachin Katti | Dina Katabi | T. Ho | D. Katabi | S. Katti | M. Médard | M. Effros | S. Jaggi | M. Langberg
[1] Muriel Medard,et al. On Randomized Network Coding , 2003 .
[2] Andrzej Pelc,et al. Broadcasting with locally bounded Byzantine faults , 2005, Inf. Process. Lett..
[3] Christos Gkantsidis,et al. Network coding for large scale content distribution , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[4] Christos Gkantsidis,et al. Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[5] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[6] R. Koetter,et al. The benefits of coding over routing in a randomized setting , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[7] Tracey Ho,et al. Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[8] Muriel Médard,et al. Beyond routing: an algebraic approach to network coding , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[9] Moti Yung,et al. Perfectly secure message transmission , 1993, JACM.
[10] R. Yeung,et al. Network coding theory , 2006 .
[11] H. Wertz,et al. On the numerical inversion of a recurrent problem: The Vandermonde matrix , 1965 .
[12] Michael Langberg,et al. Resilient network codes in the presence of eavesdropping Byzantine adversaries , 2007, 2007 IEEE International Symposium on Information Theory.
[13] Sachin Katti,et al. The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments , 2005 .
[14] Frank R. Kschischang,et al. Coding for Errors and Erasures in Random Network Coding , 2008, IEEE Trans. Inf. Theory.
[15] Peter Sanders,et al. Polynomial time algorithms for multicast network code construction , 2005, IEEE Transactions on Information Theory.
[16] Kamal Jain,et al. Signatures for Network Coding , 2006 .
[17] R. Yeung,et al. Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.
[18] Muriel Médard,et al. XORs in the air: practical wireless network coding , 2008, TNET.
[19] Randy H. Katz,et al. Decentralized security mechanisms for routing protocols , 2005 .
[20] Muriel Medard,et al. Efficient Operation of Wireless Packet Networks Using Network Coding , 2005 .
[21] Fang Zhao,et al. Signatures for Content Distribution with Network Coding , 2007, 2007 IEEE International Symposium on Information Theory.
[22] Anxiao Jiang. Network Coding for Joint Storage and Transmission with Minimum Cost , 2006, 2006 IEEE International Symposium on Information Theory.
[23] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[24] Shuo-Yen Robert Li,et al. Linear network coding , 2003, IEEE Trans. Inf. Theory.
[25] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[26] Zhen Zhang,et al. Linear Network Error Correction Codes in Packet Networks , 2008, IEEE Transactions on Information Theory.
[27] Tracey Ho,et al. Correction of adversarial errors in networks , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[28] Anthony Ephremides,et al. Energy-Efficient Broadcast and Multicast Trees in Wireless Networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[29] Muriel Médard,et al. An algebraic approach to network coding , 2003, TNET.
[30] Jon Feldman,et al. On the Capacity of Secure Network Coding , 2004 .