[1] AHLSWEDE R, CAI N, LI S Y R, et al. Network information flow[J]. IEEE Transactions on Information Theory, 2000, 46(4):1204-1216. [2] HO T, MEDARD M, KOETTER R, et al. A random linear network coding approach to multicast[J]. IEEE Transactions on Information Theory, 2006, 52(10):4413-4430. [3] HO T, MÉDARD M, SHI J, et al. On randomized network coding[C]//Proceedings of the 200341st Annual Allerton Conference on Communication Control and Computing. New York:Allerton Press, 2003:11-20. [4] CAI N, YEUNG R W. Secure network coding[C]//Proceedings of the 2002 IEEE International Symposium on Information Theory. Piscataway, NJ:IEEE, 2002:323. [5] BHATTAD K, NARAYANAN K R. Weakly secure network coding[EB/OL].[2016-03-22]. http://tamuweb.tamu.edu/faculty/commtheory/papers/weaklysecure_netcod05.pdf. [6] CAO Z H, ZHANG S B, JI X D, et al. Secure random linear network coding on a wiretap network[J]. AEU-International Journal of Electronics and Communications, 2015, 69(1):467-472. [7] GUANG X, LU J Y, FU F W. On the optimality of secure network coding[J]. IEEE Communications Letters, 2015, 19(7):1165-1168. [8] GUANG X, LU J Y, FU F W. Small field size for secure network coding[J]. IEEE Communication Letters, 2015, 19(3):375-378. [9] VILELA J P, LIMA L, BARROS J. Lightweight security for network coding[C]//ICC 2008:Proceedings of the 2008 IEEE International Conference on Communications. Piscataway, NJ:IEEE,2008:1750-1754. [10] LIMA L, BARROS J, MÉDARD M, et al. Towards secure multiresolution network coding[C]//ITW 2009:Proceedings of the 2009 IEEE Information Theory Workshop on Networking and Information Theory. Piscataway, NJ:IEEE, 2009:125-129. [11] FAN Y F, JIANG Y X, ZHU H J, et al. An efficient privacy-preserving scheme against traffic analysis attacks in network coding[C]//Proceedings of the 2009 International Conference on Computer Communications. Piscataway, NJ:IEEE, 2009:2213-2221. [12] ZHANG P, JIANG Y X, LIN C, et al. P-coding:secure network coding against eavesdropping attacks[C]//Proceedings of the 2010 IEEE INFOCOM. Piscataway, NJ:IEEE, 2010:1-9. [13] GUO Q, LUO M X, LI L X, et al. Secure network coding against wiretapping and Byzantine attacks[J]. EURASIP Journal on Wireless Communications and Networking, 2010, 2010:216524. [14] STINSON D R. Something about all or nothing (transforms)[J]. Designs, Codes, and Cryptography, 2001, 22(2):133-138. [15] LIU G J, ZHOU H. Efficient schemes for securing network coding against wiretapping[J].Wuhan University Journal of Natural Sciences, 2013, 18(4):355-362. [16] LIU G J, LIU X M, XIONG J B, et al. A lightweight secure network coding scheme against wiretapping[J]. Wuhan University Journal of Natural Sciences, 2014, 19(2):156-160. [17] LIU G J, LIU B Y, LIU X M, et al. Low-complexity secure network coding against wiretapping using intra/inter-generation coding[J]. China Communications 2015, 12(6):116-125. [18] CHOU P A, WU Y, JAIN K. Practical network coding[C]//Proceedings of the 200341st Annual Allerton Conference on Communication Control and Computing. New York:Allerton Press, 2003:40-49. |