1 |
J. Barros, "Mixing Packets: Pros and Cons of Network Coding," The 11th WPMC, Sep. 2008
|
2 |
G. Peralta, R. Fuentes, J. Bilbao and P. Crespo, "Homomorphic Encryption and Network Coding in IoT Architectures: Advantages and Future Challenges," Electronics, vol. 8, no. 827, July 2019
|
3 |
A. Fuqaha, M. Guizani, M.Mohammadi, M. Aledhari and M. Ayyash, "Internet of Things:A Survey on Enabling Technologies, Protocols and Applications," IEEE Communication Surveys and Tutorials, vol. 17, no. 4, pp.2347-2376, June 2015
DOI
|
4 |
J. Li, Y. Liu, Z. Zhang, J. Ren and N. Zhao, "Towards Green IoT Networking: Performance Optimization of Network Coding Based Communication and Reliable Storage," IEEE Access, vol. 5, pp. 8780-8791, May 2017
DOI
|
5 |
D. Boneh, D. Freeman and J. Katz, "Signing a Linear Subspace: Signatures for Network Coding," PKC 2009, Mar. 2009
|
6 |
R. Ahlswede, N. Cai, S. Li, W. Yeung, "Network Information Flow," IEEE Trans. Information Theory, vol. 46, no. 4. pp. 1204-1216, July 2000
DOI
|
7 |
Z. Yu, Y. Wei, B. Ramkumar and Y. Guan, "An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks", IEEE INFOCOM 2009, pp. 406-414, 2009
|
8 |
T. Li, W. Chen, Y. Tang and H. Yan, "A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT," Security and Communication Networks, vol. 2018, June 2018
|
9 |
G. Wu, J. Wang, Y. Wang and L. Yao, "Pollution Attack Resistance Dissemination in VANETs Based on Network Coding," Procedia Computer Science, vol. 83, pp. 131-138, 2016
DOI
|
10 |
C. Cheng, J. Lee, T. Jiang and T. Takagi, "Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding", IEEE Trans. on Information Forensics and Security, vol. 11, no. 5, pp. 993-1002, May 2016
DOI
|
11 |
J. Li, T. Li, J. Ren and H. Chao, "Enjoy the Benefit of Network Coding: Combat Pollution Attacks in 5G Multihop Networks," Wireless Communications and Mobile Computing, vol. 2018, Dec. 2018
|
12 |
N. Mamidwar and D. Gothawal, "Schemes against Pollution Attack in Network Coding: A Survey," Intl. Journal of Computer Science and Information Technologies, vol. 6, no. 6, pp. 5085-5089, 2015
|
13 |
W. Cheng, L. Yu, F. Xiong and W. Wang, "Trusted Network Coding in Wireless Ad Hoc Networks," IEEE Globecom 2010, Oct. 2010
|
14 |
C. Oliveira, Y. Doudane, C. Brito and S. Lohier, "Optimal Network Coding-Based In-Network Data Storage and Data Retrieval for IoT/WSNs," IEEE 14th NCA, Sep. 2015
|
15 |
K. Lei, S. Zhong, K. Xu and H. Zhang, "An NDN IoT Content Distribution Model With Network Coding Enhanced Forwarding Strategy for 5G," IEEE Trans. on Industrial Informatics, vol. 14, no. 6, pp. 2725-2735, Jun. 2018
DOI
|
16 |
M. Rabin, "Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance," Journal of the ACM, vol. 36, no. 2, Apr. 1989
|