[1] |
LIAN S . Multimedia Content Encryption: Techniques and Applications[M]. Auerbach Publications, 2008.
|
[2] |
LIU F , KOENIG H . A survey of video encryption algorithms[J]. Computers & Security, 2010,29(1):3-15.
|
[3] |
KULKARNI N , RAMAN B , GUPTA I . Multimedia encryption: a brief overview[J]. Recent Advances in Multimedia Signal Processing and Communications, 2009. 417-449.
|
[4] |
LI S Y R , YEUNG R W , CAI N . Linear network coding[J]. IEEE Transactions on Information Theory, 2003,49(2):371-381.
|
[5] |
ZHANG Z . Linear network error correction codes in packet networks[J]. IEEE Transactions on Information Theory, 2008,54(1):209-218.
|
[6] |
CAI N , YEUNG R W . Secure network coding[A]. Proc of International Symposium in Information Theory[C]. Lausanne,Switzerland, 2002.
|
[7] |
CAI N , YEUNG R W . Secure network coding on a wiretap network[J]. IEEE Transactions on Information Theory, 2011,57(1):424-435.
|
[8] |
曹张华, 唐元生 . 基于网络编码保密通信[J]. 通信学报, 2010,31(8):188-194.
|
[9] |
HO T , MEDARD M , KOETTER R , et al . A random linear network coding approach to multicast[J]. Information Theory IEEE Transactions, 2006,52(10):4413-4430.
|
[10] |
WIDMER J , LE BOUDEC J Y . Network coding for efficientcommunication in extreme networks[A]. Proc of the 2005 ACM SIGCOMM Workshop on Delay-tolerant Networking[C]. New York,NY,USA[C]. 2005. 284-291.
|
[11] |
WANG H , LIANG J , KUO C C J . Overview of robust video streaming with network coding[J]. Journal of Information Hiding and Multimedia Signal Processing, 2010,2073:36-50.
|
[12] |
MACLAREN WALSH J , WEBER S . A concatenated network coding scheme for multimedia transmission[A]. Fourth Workshop on Network Coding,Theory,and Applications[C]. Hong Kong,China, 2008. 1-6.
|
[13] |
NGUYEN K , NGUYEN T , CHEUNG S C . Video streaming with network coding[J]. Journal of Signal Processing Systems, 2010,59(3):319-333.
|
[14] |
TRAN T , NGUYEN T . Prioritized wireless transmissions using random linear codes[A]. EEE International Symposium on Network Coding[C]. Toronto, 2010. 1-6.
|
[15] |
LIMA L , BARROS J , MEDARD M , et al . Towards secure multiresolution network coding[A]. Networking and Information Theory[C]. Greece, 2009. 125-129.
|
[16] |
LIMA L , GHEORGHIU S , BARROS J , et al . Secure network coding for multi-resolution wireless video streaming[J]. IEEE Journal on Selected Areas in Communications, 2010,28(3):377-388.
|
[17] |
MENEZES A J , VAN OORSCHOT P C , VANSTONE S AC . Handbook of Applied Cryptography[M]. CRC Press, 1997.
|
[18] |
COPPERSMITH D , KRAWCZYK H , MANSOUR Y . The shrinking generator[A]. Advances in Cryptology- CRYPTO '93 (LNCS 773)[C]. 1994. 22-39.
|