[1] |
AHLSWEDE R , CAI N , LI S . Network information flow[J]. IEEE Transactions on Information Flow, 2000,46(4): 1204-1216.
|
[2] |
曹张华, 唐元生 . 安全网络编码综述[J]. 计算机应用, 2010,30(2):499-505. CAO Z H , TANG Y S . Survey on secure network coding[J]. Journal of Computer Application, 2010,30(2):499-505.
|
[3] |
PERVAIZ M , CARDEI M , WU J . Routing security in ad hoc wireless networks[J]. Network Security, 2010, 117-142.
|
[4] |
HO T , LEONG B , KOETTER R . Byzantine modification detection in multicast networks using randomized network coding[A]. Proceedings of IEEE International Symposium on Information Theory(ISIT)[C]. Massachusetts,USA, 2008. 2798-2803.
|
[5] |
GKANTSIDIS C , RODRIGUEZ P . Cooperative security for network coding file distribution[A]. Proceedings of International Conference on Computer Communications(INFOCOM)[C]. Barcelona,Spain, 2006. 367-380.
|
[6] |
MENEZES A , OKAMOTO T , VANSTONE S . Reducing elliptic curve logorithms to logorithms in a finite field[J]. IEEE Transactions on Information Theory, 1993,39(5): 1639-1646.
|
[7] |
YU Z , WEI Y , RAMKUMAR B . An efficient signature-based scheme for securing network coding against pollution attacks[A]. Proceedings of International Conference on Computer Communications(INFOCOM)[C]. Arizona,USA, 2008. 1409-1417.
|
[8] |
GENNARO R , KATZ J , KRAWCZYK H . Secure network coding over the integers[J]. Public Key Cryptography, 2010,60(56): 142-160.
|
[9] |
LIM S H , KIM Y H . Noisy network coding[J]. IEEE Transactions on Information Theory, 2011,57(5): 3132-3152.
|
[10] |
LIM S H , GERLA M , KRAWCZYK H . Performance evaluation of secure network coding using homomorphic signature[A]. Proceedings of International Symposium on Network Coding(NetCod)[C]. Beijing,China, 2011. 1-6.
|
[11] |
SUTAR S G , PATILG A . Privacy management in cloud by making use of homomorphic functions[J]. International Journal of Computer Applications, 2012,37(2): 13-16.
|
[12] |
CAI N , SHI X , MEDARD M . Localized dimension growth in random network coding:a convolutional approach[A]. Proceedings of IEEE International Symposium on Information Theory(ISIT)[C]. St Petersburg,USA, 2011. 1156-1160.
|
[13] |
刘凤梅, 李世取, 黄晓英 . 取值于有限域上的独立随机变量和的极限分布定理[J]. 河北工业大学学报, 1999,1(28):98-102. LIU F M , LI S Q , HUANG X Y . Limit distribution theorem for a sum of independent random variables whose values belong to a inite field[J]. Journal of Hebei University of Technology, 1999,1(28):98-102.
|