|
[1]
|
Ahlswede, R., Cai, N. and Yeung, R.W. (2000) Network Information Flow. IEEE Transactions on Information Theory, 46, 1204-1216. http://dx.doi.org/10.1109/18.850663 [Google Scholar] [CrossRef]
|
|
[2]
|
Yao, S.X., Chen, J., et al. (2014) A Survey of Security Network Coding toward Various Attacks. 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, 24-26 September 2014, 252-259. http://dx.doi.org/10.1109/TrustCom.2014.35 [Google Scholar] [CrossRef]
|
|
[3]
|
He, M., Chen, L., et al. (2012) Survey on Secure Transmission of Network Coding in Wireless Networks. 2012 International Conference on Computer Science and Service System, Nanjing, 11-13 August 2012, 1216-1219.
http://dx.doi.org/10.1109/CSSS.2012.308 [Google Scholar] [CrossRef]
|
|
[4]
|
Christos, G. and Pablo, R. (2006) Cooperative Security for Net-work Coding File Distribution. Infocom, 3, 5.
|
|
[5]
|
Jiang, Y.-X., Fan, Y.-F., Xue, M., et al. (2009) A Self-Adaptive Probabilistic Packet Filter Scheme against Entropy Attacks in Network Coding. Computer Networks, 53, 3089-3101. http://dx.doi.org/10.1016/j.comnet.2009.08.002 [Google Scholar] [CrossRef]
|
|
[6]
|
Newell, A.J., Curtmola, R. and Nita-Rotaru, C. (2012) En-tropy Attacks and Countermeasures in Wireless Network Coding. Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, New York, 16-18 April 2012, 185-196. http://dx.doi.org/10.1145/2185448.2185473 [Google Scholar] [CrossRef]
|
|
[7]
|
Cai, N. and Yeung, R.W. (2002) Network Coding and Error Correction. IEEE Information Theory Workshop, Bangalore, 20-25 October 2002, 119-122.
|
|
[8]
|
Zhang, Z. (2006) Network Error Correction Coding in Packetized Networks. IEEE Information Theory Workshop, Chengdu, 433-437. http://dx.doi.org/10.1109/itw2.2006.323836 [Google Scholar] [CrossRef]
|
|
[9]
|
Zhang, Z. (2008) Linear Network Error Correction Codes in Packet Networks. IEEE Transactions on Information Theory, 54, 209-218. http://dx.doi.org/10.1109/TIT.2007.909139 [Google Scholar] [CrossRef]
|
|
[10]
|
Jaggi, S., Langberg, M., Katti, S., Ho, T., Katabi, D. and Medard, M. (2007) Resilient Network Coding in the Presence of Byzantine Adversaries. 26th IEEE International Conference on Computer Communications, Anchorage, 6-12 May 2007, 616-624. http://dx.doi.org/10.1109/INFCOM.2007.78 [Google Scholar] [CrossRef]
|
|
[11]
|
Pandit, V., Jun, J.H. and Agrawal, D.P. (2011) Inherent Security Benefits of Analog Network Coding for the Detection of Byzantine Attacks in Multi-Hop Wireless Networks. Pro-ceedings of the 2011 IEEE 8th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Valencia, 17-21 October 2011, 697-702.
|
|
[12]
|
Li, Q., Lui, J.C.S. and Chiu, D.-M. (2012) On the Security and Efficiency of Content Distribution via Network Coding. IEEE Transactions on Dependable and Secure Computing, 9, 211-221.
|
|
[13]
|
Bin, D., Zhang, S., Qu, Y., Yang, J. and Wang, F. (2010) Orthogonal Vector Based Network Coding against Pollution Attacks in n-Layer Combination Networks. Proceedings of the 5th International ICST Conference on Communications and Networking in China (CHINACOM), Beijing, 22-25 August 2010, 1-5.
|
|
[14]
|
Cai, N. and Yeung, R.W. (2002) Secure Network Coding. Proceedings of the IEEE International Symposium on Information Theory, Lausanne, 30 June-5 July 2002, 323.
|
|
[15]
|
Cai, N. and Yeung, R.W. (2011) Secure Network Coding on a Wiretap Network. IEEE Transactions on Information Theory, 57, 424-435. http://dx.doi.org/10.1109/TIT.2010.2090197 [Google Scholar] [CrossRef]
|
|
[16]
|
Cai, N. and Chan, T. (2011) Theory of Secure Network Coding. Proceedings of the IEEE, 99, 421-437.
http://dx.doi.org/10.1109/JPROC.2010.2094592 [Google Scholar] [CrossRef]
|
|
[17]
|
Bhattad, K. and Narayanan, K.R. (2005) Weakly Secure Network Coding. Proceedings of the First Workshop on Network Coding, Theory, and Applications, Riva del Garda, 7 April 2005, 281-285.
|
|
[18]
|
Capar, C. and Goeckel, D. (2012) Network Coding for Facilitating Secrecy in Large Wireless Networks. Proceedings of the 46th Annual Conference on Information Sciences and Systems (CISS), Princeton, 21-23 March 2012, 1-6.
|
|
[19]
|
Zhang, P., Jiang, Y., Lin, C., Fan, Y. and Shen, X. (2010) P-Coding: Secure Network Coding against Eavesdropping Attacks. Proceedings of the IEEE INFOCOM, San Diego, 14-19 March 2010, 1-9.
|
|
[20]
|
武萌, 吴蒙. 防窃听的弱安全网络编码[J]. 计算机技术与发展, 2014, 24(10): 167-169.
|
|
[21]
|
赵佳佳, 任平安. 基于抗窃听和拜占庭攻击的随机网络编码[J]. 计算机科学, 2014, 41(9): 174-177.
|
|
[22]
|
徐光宪, 付晓. 抗万能攻击的安全网络编码[J]. 计算机科学, 2012, 39(8): 88-91.
|
|
[23]
|
杨柳, 钟诚. 一种高效的安全数据包过滤算法[J]. 兰州大学学报(自然科学版), 2012, 48(4): 105-108.
|