[1]代青. 浅谈网络编码技术[J]. 电脑知识与技术,2009, 5(26): 7383-7384, 7389.[2]AHLSWEDE R, NING CAI, LI S Y R, et al. Network information flow[J]. IEEE Transactions on Information Theory, 2000, 46(4): 1204-1216.[3]陶少国,黄佳庆,杨宗凯,等. 网络编码研究综述[J]. 小型微型计算机系统,2008, 29(4): 583-592.[4]BONEH D, FREEMAN D, KATZ J, et al. Signing a linear subspace: Signature schemes for network coding[C]// PKC’09:Public-key Cryptography, LNCS 5443. Berlin: Springer, 2009: 68-87. [5]NAM J, HAN S, PARK M, et al. Enhancing security of a group key exchange protocol for user with individual passwords[C]// The 2009 International Conference on Computational Science and Applications 2009, LNCS 5593. Berlin: Springer, 2009: 173-181.[6]WU Y, CHOU P A, JAIN K, et al. A comparison of network coding and tree packing[C]// IEEE International Symposium on Information Theory. New York: IEEE, 2004: 143.[7]HO T, MEDARD M, KOETTER R, et al. An information-theoretic view of network management[J]. IEEE Transactions on Information Theory, 2005, 51(4):1295-1312. [8]HO T,LEOND B,CHANG YU-HAN, et al. Network monitoring in multicast networks using network coding[C]// IEEE International Symposium on Information Theory. New York: IEEE, 2005: 1977-1981.[9]YUN A, CHEON J, KIM Y. On homomorphic signatures for network coding[J].IEEE Transactions on Computers, 2010, 59(9): 1295-1296.[10]YAN WEN-JIE, YANG MING-XI, LI LA-YUAN, et al. Short signatures for multi-source network coding[C]// 2009 International Conference on Multimedia Information Networking and Security. Washington, DC: IEEE Computer Society, 2009:458-462. |