Security in mobile ad hoc networks: challenges and solutions, IEEE Wireless Communications, vol.11, issue.1, pp.38-47, 2004. ,
DOI : 10.1109/MWC.2004.1269716
Constructing Free-Energy Approximations and Generalized Belief Propagation Algorithms, IEEE Transactions on Information Theory, vol.51, issue.7, pp.2282-2312, 2005. ,
DOI : 10.1109/TIT.2005.850085
Codecast: a network-coding-based ad hoc multicast protocol, IEEE Wireless Communications, vol.13, issue.5, pp.76-81, 2006. ,
DOI : 10.1109/WC-M.2006.250362
Wireless Broadcast Using Network Coding, IEEE Transactions on Vehicular Technology, vol.58, issue.2, pp.914-925, 2009. ,
DOI : 10.1109/TVT.2008.927729
MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming, 2010 Proceedings IEEE INFOCOM, pp.1-5, 2010. ,
DOI : 10.1109/INFCOM.2010.5462226
On-thefly verification of rateless erasure codes for efficient content distribution, Security and Privacy, IEEE Symposium on, 2004. ,
Cooperative Security for Network Coding File Distribution, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006. ,
DOI : 10.1109/INFOCOM.2006.233
An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, 2008. ,
DOI : 10.1109/INFOCOM.2008.199
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding, IEEE INFOCOM 2009, The 28th Conference on Computer Communications ,
DOI : 10.1109/INFCOM.2009.5062036
An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks, IEEE INFOCOM 2009, The 28th Conference on Computer Communications ,
DOI : 10.1109/INFCOM.2009.5061945
LT codes, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings., pp.271-280, 2002. ,
DOI : 10.1109/SFCS.2002.1181950
Improved low-density parity-check codes using irregular graphs Information Theory, IEEE Transactions on, vol.47, issue.2, pp.585-598, 2001. ,
Byzantine modification detection in multicast networks with random network coding Information Theory, IEEE Transactions on, vol.54, issue.6, pp.2798-2803, 2008. ,
Resilient network coding in the presence of byzantine adversaries Information Theory, IEEE Transactions on, vol.54, issue.6, pp.2596-2603, 2008. ,
Coding for errors and erasures in random network coding Information Theory, IEEE Transactions on, vol.54, issue.8, pp.3579-3591, 2008. ,
Stochastic analysis of a randomized detection algorithm for pollution attack in P2P live streaming systems, Performance Evaluation, vol.67, issue.11, pp.1273-1288, 2010. ,
DOI : 10.1016/j.peva.2010.08.005
Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring, ACM Transactions on Multimedia Computing, Communications, and Applications, vol.6, issue.2, pp.1-918, 2010. ,
DOI : 10.1145/1671962.1671965