1 |
R. Ahlswede, N. Cai, S.-Y. R. Li, R. W. Yeung, "Network information flow," IEEE Transactions on Information Theory, vol.46, no.4, pp.1204-1216, 2000.
DOI
|
2 |
R. Koetter, M. Medard, "An algebraic approach to network coding," IEEE/ACM Transactions on Networking, vol.11, no.5, pp.782-795, 2003.
DOI
|
3 |
Y. Chen, G. Feng, L. Zhou, "Using network coding to improve robustness and persistence for data transmission in sensor networks," in Proc. of 6th International ICST Conference on Communications and Networking in China (CHINACOM), pp.1170-1175 , 2011.
|
4 |
T. Ho, M. Medard, R. Koetter, D. Karger, M. Effros, J. Shi, B. Leong, "A random linear network coding approach to multicast," IEEE Transactions on Information Theory, vol.52, no.10, pp.4413-4430, 2006.
DOI
|
5 |
C. Fragouli, E. Soljanin, "Network Coding Applications," Journal of Foundations and Trends in Networking, vol.2, no.2, pp.135-269, 2007.
DOI
|
6 |
R. Du, C. Zhao, F. Zhao, S. Li, "Strategies of network coding against nodes conspiracy attack," Security and Communication Networks, 2013.
|
7 |
J. Feldman, T. Malkin, C. Stein, R. A. Servedio, "On the capacity of secure network coding," in Proc. of 42nd Annual Allerton Conference on Communication, Control, and Computing, 2004. http://people.csail.mit.edu/jonfeld/pubs/sflow_Allerton04_final.pdf.
|
8 |
L. H. Ozarow, A. D. Wyner, "Wire-tap channel II," AT&T Bell Labs. Tech. J., vol.63, pp.2135-2157, 1984.
DOI
|
9 |
S. Y. E. Rouayheb, E. Soljanin, A. Sprintson, "Secure network coding for wiretap networks of type II," IEEE Transactions on Information Theory, vol.58, no.3, pp.1361-1371, 2012.
DOI
|
10 |
D. Silva, F.R. Kschischang, "Universal Secure Network Coding via Rank-Metric Codes," IEEE Transactions on Information Theory, vol.57, no.2, pp.1124-1135, 2011.
DOI
|
11 |
F. Cheng, R. W. Yeung, "Performance Bounds on a Wiretap Network with Arbitrary Wiretap Sets," IEEE Transactions on Information Theory, vol 60, no.6, 2014.
|
12 |
K. Bhattad and K. R. Narayanan, "Weakly secure network coding," in Proc. of 1st Workshop on Network Coding, Theory, and Applications (NetCod05), 2005. http://netcod.org/papers/06BhattadN-final.pdf.
|
13 |
D. Silva, F. R. Kschischang, "Universal weakly secure network coding," in Proc. of IEEE Information Theory Workshop on Networking and Information Theory, pp.281-285, 2009.
|
14 |
Y. Fan, Y. Jiang, H. Zhu, X. Shen, "An efficient privacy-preserving scheme against traffic analysis in network coding," in Proc. of IEEE INFOCOM'09, pp.2213-2221, 2009.
|
15 |
P. F. Oliveira, L. Lima, T. T. V. Vinhoza, M. Medard, J. Barros, "Trusted Storage over Untrusted Networks," in Proc. of IEEE Global Telecommunications Conference (GLOBECOM), pp.1-5, 2010.
|
16 |
F. Cheng, R. W. Yeung, K. W. Shum, "Imperfect Secrecy in Wiretap Channel II," in Proc. of IEEE International Information Theory (ISIT), 2012.
|
17 |
J. P. Vilela, L. Lima, J. Barros, "Lightweight Security for Network Coding," in Proc. of the IEEE International Conference on Communications (ICC), pp.1750-1754, 2008.
|
18 |
L. Lima, J. Barros, M. Medard, A. Toledo, "Towards Secure Multiresolution Network Coding," in Proc. of IEEE Information Theory Workshop on Networking and Information Theory (ITW), pp.125-129, Jun.10-12, 2009.
|
19 |
P. Zhang, Y. Jiang, C. Lin, Y Fan, X. Shen, "P-Coding: Secure Network Coding against Eavesdropping Attacks," in Proc. of IEEE INFOCOM'10, pp.1-9, 2010.
|
20 |
J. Lacan, J. Fimes, "A construction of matrices with no singular square submatrices," in Proc. of the 7th International Conference on Finite Fields and Applications, Lecture Notes in Computer Science, vol.2948, pp.145-147, 2003.
|
21 |
J. Lacan, J. Fimes, "Systematic MDS erasure codes based on Vandermonde matrices," IEEE Communications Letters, vol.8, no.9, pp.570-572, 2004.
DOI
|
22 |
I. Gohberg, V. Olshevsky, "Fast algorithms with preprocessing for matrix-vector multiplication problems," Journal of Complexity, vol.10, no.4, pp.411-427, 1994.
DOI
|
23 |
R. A. Mollin, "An Introduction to Cryptography," CRC Press, 2006.
|
24 |
P. Zhang, Y. Jiang, C. Lin, H. Yao, A. Wasef, and X. Shen, "Padding for orthogonality: Efficient subspace authentication for network coding," in Proc. of IEEE INFOCOM, pp.1026-1034, 2011.
|
25 |
M. Bellare, A. Desai, E. Jokipii, P. Rogaway, "A concrete security treatment of symmetric encryption," in Proc. of the 38th Annual Symposium on Foundations of Computer Science, pp.394-403, 1997.
|
26 |
M. J. Moyer, J. R. Rao, P. Rohatgi, "A survey of security issues in multicast communications," IEEE Network, vol.13, no.6, pp.12-23, 1999.
DOI
|
27 |
C. Cheng, T. Jiang, "An efficient homomorphic MAC with small key size for authentication in network coding," IEEE Transactions on Computers, vol.2, no.10, pp.2096-2100, 2013.
|
28 |
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, M. Medard, "Resilient Network Coding in the Presence of Byzantine Adversaries," in Proc. of IEEE INFOCOM, pp.616-624, 2007.
|
29 |
Z. Zhang, "Linear network error correction codes in packet networks," IEEE Transactions on Information Theory, vol.54, no.1, pp.209-218, 2008.
DOI
|
30 |
C. K. Ngai, "Network Coding for Security and Error Correction," Ph.D. Thesis, 2008. http://iest2.ie.cuhk.edu.hk/-whyeung/post/thesis/Ngai.pdf.
|
31 |
F. J. MacWilliams, N. J. A. Sloane, "The Theory of Error-Correcting Codes," New York: North-Holland, 1977.
|
32 |
N. Cai, R. W. Yeung, "Secure network coding," in Proc. of International Symposium in Information Theory, 2002.
|
33 |
T. M. Cover, J. A. Thomas, "Elements of Information Theory," 2009.
|