[1] AHLSWEDE R, CAI N, LI S Y R, et al. Network information flow[J]. IEEE Transaction on Information Theory, 2000, 46(4): 1204-1216. [2] HO T, MEDARD M, KOETTER R. An information-theoretic view of network management[J]. IEEE Transactions on Information Theory, 2005, 51(4):1295-1312. [3] WU Y, CHOU P A, ZHANG Q, et al. Network planning in wireless Ad-Hoc network: across-layer approach[J]. IEEE Journal on Selected Areas in Communications, 2005, 23(1): 1997-1981. [4] CAI N, YEUNG R W. Secure network coding on a wiretap network[J]. IEEE Transactions on Information Theory, 2011, 57(1): 424-435. [5] CAI N, YEUNG R W. Secure network coding[C]// Proceedings of the 2002 IEEE International Symposium on Information Theory. Piscataway, NJ: IEEE, 2002: 323. [6] HARADA K, YAMAMOTO H. Strongly secure linear network coding[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2008, E91-A(10): 2720-2728. [7] BHATTAD K, NARAYANANK R. Weakly secure network coding[EB/OL].[2018-01-17]. https://www.researchgate.net/publication/248407006_Weakly_Secure_Network_Coding. [8] JAIN K. Security based on network topology against the wiretapping attack[J]. IEEE Wireless Communications, 2004, 11(1): 68-71. [9] VILELA J P, LIMA L, BARROS J. Lightweight security for network coding[C]// Proceedings of the 2008 IEEE International Conference on Communications. Piscataway, NJ: IEEE, 2008: 1750-1754. [10] FAN Y F, JIANG Y X, ZHU H J, et al. An efficient privacy-preserving scheme against traffic analysis attacks in network coding[C]// Proceedings of the 20098th IEEE International Conference on Computer Communication. Piscataway, NJ: IEEE, 2009: 2213-2221. [11] ZHANG P, JIANG Y X, LIN C, et al. P-coding: secure network coding against eavesdropping attacks[C]// Proceedings of the 29th Conference on Information Communications. Piscataway, NJ: IEEE, 2010: 1-9. [12] GUO Q, LUO M X, LI L X, et al. Secure network coding against wiretapping and Byzantine attacks[J]. EURASIP Journal on Wireless Communications and Networking, 2010, 2010: Article ID 216524. [13] WEI Y W, ZHEN Y, GUAN Y. Efficient weakly-secure network coding schemes against wiretapping attacks[C]// Proceedings of the 2010 IEEE International Symposium on Network Coding. Piscataway, NJ: IEEE, 2010: 1-6. [14] LIU G J, LIU X M, XIONG J B, et al. A lightweight secure network coding scheme against wiretapping[J]. Wuhan University Journal of Natural Sciences, 2014, 19(2): 156-160. [15] 徐光宪, 吴巍. 混沌序列在安全网络编码算法中的应用研究[J]. 计算机应用研究, 2014, 31(4): 1212-1214.(XU G X, WU W. Research on application of chaotic sequence in security of network coding[J]. Application Research of Computers, 2014, 31(4): 1212-1214.) [16] 徐光宪, 李晓彤, 罗荟荟. 一种基于混沌序列的安全网络编码设计与分析[J] 计算机科学, 2013, 40(5): 147-149. (XU G X,LI X T, LUO H H. Analysis and design of network coding based on chaotic sequence[J]. Computer Science, 2013, 40(5): 147-149.) [17] 徐光宪, 高嵩, 华一阳. 基于Cat-Logistic模型的安全网络编码方法研究[J]. 计算机工程, 2015,41(9): 150-154. (XU G X, GAO S, HUA Y Y. Research on secure network coding method based on Cat-Logistic model[J]. Computer Engineering, 2015, 41(9): 150-154.) |