[1] AHLSWEDE R, CAI N, LI S Y R, et al. Network information flow[J]. IEEE Transactions on Information Theory, 2000, 46(4):1204-1216. [2] 俞立峰,杨琼,于娟,等.防窃听攻击的安全网络编码[J].计算机应用研究,2012,29(3):813-818.(YU L F, YANG Q, YU J, et al. Secure network coding against wiretapping attacks[J]. Application Research of Computers, 2012, 29(3):813-818.) [3] CAI N, YEUNG R W. Secure network coding[C]//Proceedings of the 2002 IEEE International Symposium on Information Theory. Piscataway, NJ:IEEE, 2002:323. [4] YEUNG R W, CAI N. On the optimality of a construction of secure network codes[C]//ISIT 2008:Proceedings of the 2008 IEEE International Symposium on Information Theory. Piscataway, NJ:IEEE, 2008:166-170. [5] CAI N, YEUNG R W. Secure network coding on a wiretap network[J]. IEEE Transactions on Information Theory, 2011, 57(1):424-435. [6] HARADA K, YAMAMOTO H. Strongly secure linear network coding[J]. IEICE Transactions on Fundamentals of Electronics, Communications & Computer Sciences, 2008, E91-A(10):2720-2728. [7] BHATTAD K, NARAYANAN K R. Weakly secure network coding[C]//Proceedings of the 2005 First Workshop on Network Coding, Theory, and Applications. Piscataway, NJ:IEEE, 2005:281-285. [8] VILELA J P, LIMA L, BARROS J. Lightweight security for network coding[C]//Proceedings of the 2008 IEEE International Conference on Communications. Piscataway, NJ:IEEE, 2008:1750-1754. [9] FAN Y F, JIANG Y X, ZHU H J, et al. An efficient privacy-preserving scheme against traffic analysis attacks in network coding[C]//Proceedings of the 20098th IEEE International Conference on Computer Communications. Piscataway, NJ:IEEE, 2009:2213-2221. [10] ZHANG P, JIANG Y X, LIN C, et al. P-coding:secure network coding against eavesdropping attacks[C]//Proceedings of the 201029th Conference on Information Communications. Piscataway, NJ:IEEE, 2010:2249-2257. [11] LIU G J, LIU B Y, LIU X M, et al. Low-complexity secure network coding against wiretapping using intra/inter-generation coding[J]. China Communications, 2015, 12(6):116-125. [12] GUO Q, LUO MX, LI L X, et al. Secure network coding against wiretapping and Byzantine attacks[J]. EURASIP Journal on Wireless Communications and Networking, 2010, 2010:Article ID 216524. [13] 罗明星,杨义先,王励成,等.抗窃听的安全网络编码[J].中国科学:信息科学,2010,40(2):371-380.(LUO M X, YANG Y X, WANG L C, et al. Secure network coding against eavesdropping[J]. SCIENTIA SINICA Informationis, 2010, 40(2):371-380.) [14] 徐光宪,李晓彤,罗荟荟.一种基于混沌序列的安全网络编码设计与分析[J].计算机科学,2013,40(5):147-149.(XU G X, LI X T, LUO H H. Analysis and design of network coding based on chaotic sequence[J]. Computer Science, 2013, 40(5):147-149.) [15] 徐光宪,吴巍.混沌序列在安全网络编码算法中的应用研究[J].计算机应用研究,2014,31(4):1212-1214.(XU G X, WU W. Research on application of chaotic sequence in security of network coding[J]. Application Research of Computers, 2014, 31(4):1212-1214.) [16] 徐光宪,高嵩,华一阳.基于Cat-Logistic模型的安全网络编码方法研究[J].计算机工程,2015,41(9):150-154.(XU G X, GAO S, HUA Y Y. Research on secure network coding method based on Cat-Logistic model[J]. Computer Engineering, 2015, 41(9):150-154.) [17] 黎明.混沌序列及其在扩频通信中应用的研究[D].长春:吉林大学,2009:29.(LI M. Chaos sequences and its applications in spread spectrum communication[D]. Changchun:Jilin University, 2009:29.) [18] 何朗日,李萍,陈水华.基于m序列持续扰动Logistic混沌序列的视频加密及FPGA实现[J].激光杂志,2015,36(9):56-59.(HE L R, LI P, CHEN S H. The video encryption with Logistic chaotic sequence based on m sequence disturbance and its FPGA implementation[J]. Laser Journal, 2015, 36(9):56-59.) [19] 顾书斌.基于FPGA改进混沌序列方法研究及加密系统设计[D].哈尔滨:黑龙江大学,2015:13-14.(GU S B. Research on improved chaotic sequence method and its design of encryption system based on FPGA[D]. Harbin:Heilongjiang University, 2015:13-14.) |