참고문헌
- R. Ahlswede et al., "Network Information Flow," IEEE Trans. Inf. Theory, vol. 46, no. 4, 2000, pp. 1204-1216. https://doi.org/10.1109/18.850663
- S.-Y.R. Li, R.W. Yeung, and N. Cai, "Linear Network Coding," IEEE Trans. Inf. Theory, vol. 49, no. 2, 2003, pp. 371-381. https://doi.org/10.1109/TIT.2002.807285
- T. Ho et al., "Byzantine Modification Detection in Multicast Networks Using Randomized Network Coding," IEEE Trans. Inf. Theory, vol. 54, no. 6, 2008, pp. 2798-2803. https://doi.org/10.1109/TIT.2008.921894
- D. Boneh et al., "Signing a Linear Subspace: Signature Schemes for Network Coding," Proc. 12th Int. Conf. Practice Theory Public Key Cryptography, 2009, pp. 68-87.
- F. Zhao et al., "Signatures for Content Distribution with Network Coding," Proc. IEEE Int. Symp. Inf. Theory, 2007, pp. 556-560.
- Z. Yu et al., "An Efficient Scheme for Securing XOR Network Coding Against Pollution Attacks," Proc. IEEE INFOCOM, Apr. 2009, pp. 406-414.
- S. Agrawal and D. Boneh, "Homomorphic MACs: MAC-Based Integrity for Network Coding," Proc. Appl. Cryptography Netw. Security, 2009, pp. 292-305.
- P. Zhang et al., "Padding for Orthogonality: Efficient Subspace Authentication for Network Coding," Proc. IEEE INFOCOM, Apr. 2011, pp. 1026-1034.
- Y. Li et al., "RIPPLE Authentication for Network Coding," Proc. IEEE INFOCOM, Mar. 2010, pp. 1-9.
- J. Dong, R. Curtmola, and C. Nita-Rotaru, "Practical Defenses against Pollution Attacks in Intra-flow Network Coding for Wireless Mesh Networks," Proc. 2nd ACM Conf. Wireless Netw. Security, 2009, pp. 111-122.
- E. Kehdi and B. Li, "Null Keys: Limiting Malicious Attacks via Null Space Properties of Network Coding," Proc. IEEE INFOCOM, Apr. 2009, pp. 1224-1232.
- N. Cai and R.W. Yeung, "Secure Network Coding," Proc. Int. Symp. Inf. Theory, 2002, p. 323.
피인용 문헌
- Efficient schemes for securing network coding against wiretapping vol.18, pp.4, 2013, https://doi.org/10.1007/s11859-013-0942-8
- MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats vol.6, pp.4, 2013, https://doi.org/10.3390/sym6040997
- Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size vol.60, pp.12, 2013, https://doi.org/10.1093/comjnl/bxx055