Citation: | LIU Guangjun and XIAO Song, “Scalable Security Solution Against Wiretapping for Network Coding Based Priority Encoding Transmission,” Chinese Journal of Electronics, vol. 27, no. 1, pp. 191-197, 2018, doi: 10.1049/cje.2017.09.017 |
K.K.R. Kambhatla, S. Kumar, S. Paluri, et al., "Wireless H. 264 video quality enhancement through optimal prioritized packet fragmentation", IEEE Transactions on Multimedia, Vol.14, No.5, pp.1480-1495, 2012.
|
X. Shao, R. Wang, H. Huang, et al., "Load balanced coding aware multipath routing for wireless mesh networks", Chinese Journal of Electronics, Vol.24, No.1, pp.8-12, 2015.
|
T. Ho, M. Médard, R. Koetter, et al., "A random linear network coding approach to multicast", IEEE Transactions on Information Theory, Vol.52, No.10, pp.4413-4430, 2006.
|
E. Magli, M. Wang, P. Frossard, et al., "Network coding meets multimedia:A review", IEEE Transactions on Multimedia, Vol.15, No.5, pp.1195-1212, 2013.
|
P.A. Chou, Y. Wu and K. Jain, "Practical network coding", Proc. of Allerton Conference on Communication, Control, and Computing, Monticello, IL, 2003.
|
S. Xiao, H. Wang and C-C. Kuo, "Priority ordering and packetization for scalable video multicast with network coding", Proc. of the 8th Pacific Rim Conference on Multimedia:Advances in Multimedia Information Processing, Hong Kong, China, pp.520-529, 2007.
|
N. Thomos, E. Kurdoglu, P. Frossard, et al., "Adaptive prioritized random linear coding and scheduling for layered data delivery from multiple servers", IEEE Transactions on Multimedia, Vol.17, No.6, pp.893-906, 2015.
|
S. Xiao, H. Wang and C. Wu, "A new network coding design for reliable video multicast", Chinese Journal of Electronics, Vol.20, No.2, pp.361-364, 2011.
|
H. Wang, S. Xiao and C-C. Kuo, "Random linear network coding with ladder-shaped global coding matrix for robust video transmission", Journal of Visual Communication and Image Representation, Vol.22, No.4, pp.203-212, 2011.
|
S. Lian, Multimedia Content Encryption:Techniques and Applications, Auerbach Publications, Boston, MA, USA, 2008.
|
N.S. Kulkarni, B. Raman and I. Gupta, "Multimedia encryption:A brief overview", Recent Advances in Multimedia Signal Processing and Communications, Studies in Computational Intelligence, Vol.231, pp.417-449, 2009.
|
J. Zhang and X. Gao, "A hybrid encryption scheme for scalable video coding based on H. 264", Proc. of the 5th IEEE International Conference on Intelligent Networking and Collaborative Systems, Xi'an, China, pp.708-711, 2013.
|
L.M. Varlakshmi, G.F. Sudha and G. Jaikishan, "An efficient scalable video encryption scheme for real time applications", Procedia Engineering, Vol.30, pp.852-860, 2012.
|
S. Mehdian and B. Liang, "Jointly optimal selection and scheduling for lossy transmission of dependent frames with delay constraint", Proc. of the 22nd IEEE International Symposium of Quality of Service, Hong Kong, China, pp.168-177, 2014.
|
H. Yao, D. Silva, S. Jaggi, et al., "Network codes resilient to jamming and eavesdropping", IEEE/ACM Transactions on Networking (TON), Vol.22, No.6, pp.1978-1987, 2014.
|
V.N. Talooki, R. Bassoli, D.E. Lucani, et al., "Security concerns and countermeasures in network coding based communication systems:A survey", Computer Networks, Vol.83, pp.422-445, 2015.
|
J. Liu, Y. Liu, H. Liu, et al., "Network coding anti-eavesdropping algorithm for ad hoc networks", Chinese Journal of Electronics, Vol.24, No.3, pp.639-641, 2015.
|
N. Cai and T. Chan, "Theory of secure network coding", Proceedings of the IEEE, Vol.99, No.3, pp.421-437, 2011.
|
T.T. Tran, H. Li, L. Liu, et al., "Secure network-coded wireless multicast for delay-sensitive data", Proc. of the 2012 IEEE International Conference on Communications, Ottawa, ON, Canada, pp.1943-1947, 2012.
|
C. Cheng, T. Jiang and Q. Zhang, "TESLA-based homomorphic MAC for authentication in P2P system for live streaming with network coding", IEEE Journal on Selected Areas in Communications, Vol.31, No.9, pp.291-298, 2013.
|
C-C. Wang, J-L. Li, T-Y. Wang, et al., "Robust video transmission for H. 264 scalable video coding using unequal error protection", Proc. of the 2th IEEE International Conference on Digital Information and Communication Technology and it's Applications, Bangkok, Thailand, pp.77-81, 2012.
|
J. Overbey, W. Traves and J. Wojdylo, "On the keyspace of the Hill cipher", Cryptologia, Vol.29, No.1, pp.59-72, 2005.
|