Citation: | LIU Jun, LIU Yi'nan, LIU Hui, WANG Yingmei. Network Coding Anti-eavesdropping Algorithm for Ad hoc Networks[J]. Chinese Journal of Electronics, 2015, 24(3): 639-641. DOI: 10.1049/cje.2015.07.034 |
N. Cai, R.W. Yeung, "Secure network coding", Proceeding of 2002 IEEE International Symposium, pp.323-333, 2002.
|
J. Feldman, T. Malkin, C. Stein, et al., "On the capacity of secure network coding", 42nd Annual Allerton Conference on Communication, Control and Computing, pp.666-671,2004.
|
T. Ho, B. Leong, R. Koetter, et al., "Byzantine modification detection in multicast networks with random network coding", IEEE Transactions on Information Theory, Vol.54, No.6, pp.2798-2803, 2008.
|
N. Cai, R.W. Yeung, "A security condition for multi-source linear network coding", IEEE International Symposium on Information Theory, pp.561-565, 2007.
|
R.W. Yeung, N. Cai, "On the optimality of a construction of secure network codes", IEEE International Symposium on Information Theory, pp.166-170, 2008.
|
D. Silva, F.R. Kschischang, "Security for wiretap networks via rank-metric codes", IEEE International Symposium on Information Theory, pp.176-180, 2008.
|
K. Bhattad, K.R. Narayanan, "Weakly secure network coding", NetCod, Vol.4, No.2, pp.199-209, 2005.
|
Hengli Pei, Tao Shang, Jianwei Liu, "Secure network coding method merged with timestamp and homomorphic signature", Journal on Communications, Vol.4, pp.28-35, 2013.
|
Guangxian Xu, Xiao Fu, "Low complexity secure network coding algorithm based on sparse matrix", Computer Engineering, Vol.38, No.9, pp.13-19, 2012.
|
Lianxiang Zhu, et al., "Research on network security route and secure network coding in wiretapping", Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), Vol.24, No.1, pp.25-37, 2012.
|
[1] | PENG Yuhuai, DENG Qingxu, GUO Lei, WANG Fanzhao. A New Network Coding Based Routing Protocol for Enhancing Throughput Capacity in Wireless Mesh Networks[J]. Chinese Journal of Electronics, 2019, 28(2): 416-422. DOI: 10.1049/cje.2019.01.015 |
[2] | NING Zuoting, ZHANG Dafang, LIU Xuchong. A Novel Approach of Network Coding in Wireless Networks Overhearing[J]. Chinese Journal of Electronics, 2018, 27(6): 1297-1304. DOI: 10.1049/cje.2018.06.010 |
[3] | LIU Guangjun, XIAO Song. Scalable Security Solution Against Wiretapping for Network Coding Based Priority Encoding Transmission[J]. Chinese Journal of Electronics, 2018, 27(1): 191-197. DOI: 10.1049/cje.2017.09.017 |
[4] | LIU Jun, YANG Jingyu, CHENG Zijing, WANG Mengyuan. Anti-eavesdropping Network Coding Algorithm Based on T-N Threshold[J]. Chinese Journal of Electronics, 2017, 26(2): 372-376. DOI: 10.1049/cje.2017.01.029 |
[5] | WANG Gang, LENG Jie, YUAN Cangzhou. Repeated Inter-Session Network Coding Games with an Average Cost Share Pricing Mechanism in Congested Networks[J]. Chinese Journal of Electronics, 2015, 24(2): 398-401. DOI: 10.1049/cje.2015.04.029 |
[6] | SHANG Tao, FAN Yong, WANG Chao, LIU Jianwei. Performance Analysis of Wireless Network Coding via Percolation[J]. Chinese Journal of Electronics, 2014, 23(1): 179-185. |
[7] | XIAO Song, WANG Hui, WU Chengke. A New Network Coding Design for Reliable Video Multicast[J]. Chinese Journal of Electronics, 2011, 20(2): 361-364. |
[8] | GUANG Xuan, FU Fangwei. On Random Linear Network Coding for Butterfly Network[J]. Chinese Journal of Electronics, 2011, 20(2): 283-286. |
[9] | DU Bing and ZHANG Jun. Parity Check Network Coding for WirelessCooperative Communications[J]. Chinese Journal of Electronics, 2010, 19(2): 339-344. |
[10] | ZHOU Yejun, LI Hui, MA Jianfeng. Secure Network Coding Against the Contamination and Eavesdropping Adversaries[J]. Chinese Journal of Electronics, 2009, 18(3): 411-416. |