[1] |
ADRIAN B , BONDY J A , MURTY U S R . Graph Theory: An Ad-vanced Course[M]. London: Springer London Ltd, 2008.
|
[2] |
AHLSWEDE R , CAI N , LI S R . Network information flow[J]. IEEE Transactions on Information Theory, 2000,46: 1204-1216.
|
[3] |
SHWE H Y , ADACHI F . Power efficient adaptive network coding in wireless sensor networks[A]. Proceedings of IEEE Inter ional Con-ference on Communications (ICC)[C]. Kyoto, 2011.1-5.
|
[4] |
WU H , ZHENG J . Efficient network coding-based multicast retrans-mission mechanism for mobile communication networks[J]. IET Communications, 2012,6 (2): 187-193.
|
[5] |
XU J B , WANG X , ZHAO J . Iswifter: improving chunked network coding for peer-to-peer content distribution[J]. Peer-to-Peer Network-ing and Applications, 2012,5 (1): 30-39.
|
[6] |
LI S R , YEUNG RW , CAI N . Linear network coding[J]. IEE Trans-actions on Information Theory, 2003,49 (2): 371-381.
|
[7] |
CAI N , CHAN T . Theory of secure network coding[J]. Proceedings of the IEEE, 2011,99 (3): 421-437.
|
[8] |
CAI N , YEUNG R W . Secure network coding on a wiretap network[J]. IEEE Transactions on Information Theory, 2011,57 (1): 424-435.
|
[9] |
YEUNG R W , CAI N . Network error correction, part I: basic concepts and upper bounds[J]. Communications in Information and Systems, 2006,6 (1): 19-36.
|
[10] |
CAI N , YEUNG R W . Network error correction, part II: lower bounds[J]. Communications in Information and Systems, 2006,6 (1): 37-54.
|
[11] |
SILVA D , KSCHISCHANG F R , KOETTER R . A rank-metric ap-proach to error control in random network coding[A]. Proceedings of IEEE Information Theory Workshop on Information Theory for Wire-less Networks[C]. Solstrand, 2007.1-5.
|
[12] |
ELIAS K , BAOCHUN L . Null keys: limiting malicious attacks via null space properties of network coding[A]. Proceedings of IEEE Interna-tional Conference on Computer Communications (INFOCOM)[C]. An-chorage, 2009.1224-1232.
|
[13] |
KROHN M N , FREEDMAN M J , MAZIERES D . On-the-fly verifica-tion of rateless erasure codes for efficient content distribution[A]. Proceed-ings of IEEE Symposium on Security and Privacy[C]. Oakland, 2004.226-240.
|
[14] |
LI Y P , YAO H Y , CHEN M H . RIPPLE authentication for network coding[A]. Proceedings of IEEE International Conference on Com-puter Communications (INFOCOM)[C]. San Diego, 2010.2258-2266.
|
[15] |
JING D , REZA C , CRISTINA N R . Practical defenses against pollu-tion attacks in intra-flow network coding for wireless mesh net-works[A]. Proceedings of ACM Conference on Wireless Network Se-curity[C]. Zurich, 2009.111-122.
|
[16] |
ADRIAN P , RAN C , TYGAR J D . The TESLA broadcast authentica-tion protocol[J]. RSA CryptoBytes, 2002,5: 1-13.
|
[17] |
KUN S , PENG N . Secure and resilient clock synchronizat on in wire-less sensor networks[J]. IEEE Journal on Selected Areas in Commu-nications, 2006,24 (3): 395-408.
|
[18] |
DAN B , DAVID F , JONATHAN K . Signing a linear subspace: signa-ture schemes for network coding[A]. Proceedings of International Conference on Practice and Theory in Public Key Crypto hy[C]. Orange County, California, 2009.68-87.
|
[19] |
CHARLES D , JAIN K , LAUTER K . Signatures for network cod-ing[A]. Proceedings of Annual Conference on the Information Sciences and Systems[C]. Princeton, 2006.857-863.
|
[20] |
CHRISTOS G , PABLO R . Cooperative security for network coding file distribution[A]. Proceedings of IEEE Internationa Conference on Computer Communications (INFOCOM)[C]. Barcelona, 2006.1-13.
|