[1]YANG L, ZHENG G, HU X. Research on network coding: a survey [J]. Journal of Computer Research and Development, 2008, 45(3): 400-407.(杨林,郑刚,胡晓慧.网络编码的研究进展[J].计算机研究与发展,2008,45(3):400-407.)
[2]GABIDULIN E M, PILIPCHUK N I, HONARY B, et al. Information security in a random network coding network [J]. Problems of Information Transmission, 2013, 49(2): 179-191.
[3]MOHAMMED A H, DAI B, HUANG B, et al. A survey and tutorial of wireless relay network protocols based on network coding [J]. Journal of Network and Computer Applications, 2013, 36(2): 593-610.
[4]SATTARI P, MARKOPOULOU A, FRAGOULI C, et al. A network coding approach to loss tomography [J]. IEEE Transactions on Information Theory, 2013, 59(3): 1532-1562.
[5]ALIREZA S, FARAMARZ H, FARAMARZ F. Network coding for multiple unicast sessions in multi-channel/interface wireless networks [J]. Wireless Networks, 2013, 19(5): 891-911.
[6]LEI Y, CHENG S, WU C, et al. P2P content distribution with network coding [J]. Journal of Computer Research and Development, 2009, 46(1): 108-119.(雷迎春,程实,吴产乐,等.应用网络编码的P2P内容分发[J].计算机研究与发展,2009,46(1):108-119.)
[7]CHACHULSKI S, JENNINGS M, KATTI S, et al. Trading struc-ture for randomness in wireless opportunistic routing [C]// Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. New York: ACM Press, 2007. 169-180.
[8]LIU Z, WU C, LI B, et al. UUSee: large-scale operational on-demand streaming with random network coding [C]// INFOCOM 2010: Proceedings of the 29th IEEE International Conference on Computer Communications. Piscataway: IEEE Press, 2010: 2070-2078.
[9]ZHANG P, JIANG Y, LIN C, et al. P-Coding: secure network coding against eavesdropping attacks [C]// INFOCOM 2010: Proceedings of the 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies. Piscataway: IEEE Press, 2010: 2249-2257.
[10]FAN Y, JIANG Y, ZHU H, et al. An efficient privacy-preserving scheme against traffic analysis attacks in network coding [C]// INFOCOM 2009: Proceedings of the 28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies. Piscataway: IEEE Press, 2009: 2213-2221.
[11]YU Z, WEI Y, RAMKUMAR B, et al. An efficient signature-based scheme for securing network coding against pollution attacks [C]// INFOCOM 2008: Proceedings of the 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies. Piscataway: IEEE Press, 2008: 1409-1417.
[12]ADELI M, LIU H P. On the inherent security of linear network coding [J]. Communications Letters, 2013, 17(8): 1668-1671.
[13]BHATTAD K, NARAYANAN K. Weakly secure network coding [C]// Proceedings of the 1st Workshop on Network Coding, Theory, and Applications. Riva del Garda: [s.n.], 2005. 1-6.
[14]FAN Y, JIANG Y, ZHU H, et al. Network coding based privacy preservation against traffic analysis in multi-hop wireless networks [J]. IEEE Transactions on Wireless Communication, 2011, 10(3): 834-842.
[15]ATKINSON M. Generalized stack permutations [J]. Journal of Combinations, Probability, and Computing, 1998, 7(3): 239-246.
[16]ZHAO X, HAO L. Overview of digital watermark [J]. Computer Engineering and Design, 2006, 27(11): 1946-1950.(赵翔,郝林.数字水印综述[J].计算机工程与设计,2006,27(11):1946-1950.)
[17]ZHANG Y, CAI Y, LI Z, et al. Homomorphic MAC-based scheme against pollution attacks in network coding [J]. Wuhan University Journal of Natural Sciences, 2013, 18(5): 435-442.
[18]YU Z, WEI Y, RAMKUMAR B, et al. An efficient scheme for securing XOR network coding against pollution attacks [C]// INFOCOM 2009: Proceedings of the 28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies. Piscataway: IEEE Press, 2009: 406-414.
[19]STEFAN S, WETHERALL D, KARLIN A, et al. Network support for IP traceback [J]. IEEE/ACM Transactions on Networking, 2001, 9(3): 226-237. |