Citation: | LIU Jun, YANG Jingyu, CHENG Zijing, et al., “Anti-eavesdropping Network Coding Algorithm Based on T-N Threshold,” Chinese Journal of Electronics, vol. 26, no. 2, pp. 372-376, 2017, doi: 10.1049/cje.2017.01.029 |
N. Cai and R.W. Yeung, "Secure network coding", IEEE Intl. Symp. Inf. Theory. Lausanne, Switzerland, Press, pp.323, 2012.
|
N. Cai and R.W. Yeung, "Secure network coding on a wiretap network", IEEE Trans on Inform. Theory, Vol.57, No.1, pp.424-435, 2011.
|
L.X. Zhu, Y.Y. Zhu and Z. Cao, "Research of network safety path and secure network coding under wiretapping", Journal Of Chongqing University Of Posts And Telecommunications Natural Science Edition, Vol.24, No.1, pp.39-44, 2012.
|
Y.J. Zhou, H. LI, J.F. Ma, "Random network coding against the eavesdropping adversaries", Journal Of Xidian University, Vol.36, No.4, pp.696-701, 2009.
|
M.X. Luo, Y.X. Yang, L.C. Wang and X.X. Niu, "The secure network coding against the wiretapping attack", Scientia Sinica Informations, Vol.40, No.2, pp.371-380, 2010.
|
M.N. Krohn, M.J. Freedman and D. Mazieres, "On-the-fly verification of rateless erasure codesfor efficient content distribution", IEEE Symposium on Security and Privacy, Oakland, CA, pp.226-240, 2004.
|
Y.J. Zhou, H. LI and J.F. Ma, "Secure network coding against the contamination and eavesdropping adversaries", Chinese Journal of Electronics, Vol.18, No.3, pp.411-416, 2009.
|
Subhash Lakshminarayana, Atilla Eryilmaz, "Multirate multicasting with intralayer network coding", IEEE/ACM Transactions on Networking (TON), Vol.21, No.4, pp.1256-1269, 2013.
|
Z.H. Cao, X.D. Ji and M. Liu, "The application of network coding in eavesdropping network", Computer Science, Vol.42, No.2, pp.261-263, 2013.
|
Christina Fragouli, Jorg Widmer and Jean-Yves Le Boudec, "Efficient broadcasting using network coding", IEEE/ACM Transactions on Networking (TON), Vol.16, No.2, pp.450-463, 2014.
|
Y.X. Jiang, H.J. Zhu, M.H. Shi, X.M. Shen and C. Lin, "An efficient dynamic-identity based signature scheme for secure network coding", Computer Networks, Vol.54, No.1, pp.28-40, 2012.
|
R. Gennaro, J. Katz and H. Krawczyk, T. Rabiv, "Secure network coding over the integers", Public Key Cryp-tography, pp.142-160, 2014.
|