Citation: | LIU Jun, LIU Yi'nan, LIU Hui, et al., “Network Coding Anti-eavesdropping Algorithm for Ad hoc Networks,” Chinese Journal of Electronics, vol. 24, no. 3, pp. 639-641, 2015, doi: 10.1049/cje.2015.07.034 |
N. Cai, R.W. Yeung, "Secure network coding", Proceeding of 2002 IEEE International Symposium, pp.323-333, 2002.
|
J. Feldman, T. Malkin, C. Stein, et al., "On the capacity of secure network coding", 42nd Annual Allerton Conference on Communication, Control and Computing, pp.666-671,2004.
|
T. Ho, B. Leong, R. Koetter, et al., "Byzantine modification detection in multicast networks with random network coding", IEEE Transactions on Information Theory, Vol.54, No.6, pp.2798-2803, 2008.
|
N. Cai, R.W. Yeung, "A security condition for multi-source linear network coding", IEEE International Symposium on Information Theory, pp.561-565, 2007.
|
R.W. Yeung, N. Cai, "On the optimality of a construction of secure network codes", IEEE International Symposium on Information Theory, pp.166-170, 2008.
|
D. Silva, F.R. Kschischang, "Security for wiretap networks via rank-metric codes", IEEE International Symposium on Information Theory, pp.176-180, 2008.
|
K. Bhattad, K.R. Narayanan, "Weakly secure network coding", NetCod, Vol.4, No.2, pp.199-209, 2005.
|
Hengli Pei, Tao Shang, Jianwei Liu, "Secure network coding method merged with timestamp and homomorphic signature", Journal on Communications, Vol.4, pp.28-35, 2013.
|
Guangxian Xu, Xiao Fu, "Low complexity secure network coding algorithm based on sparse matrix", Computer Engineering, Vol.38, No.9, pp.13-19, 2012.
|
Lianxiang Zhu, et al., "Research on network security route and secure network coding in wiretapping", Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), Vol.24, No.1, pp.25-37, 2012.
|