Network information flow, IEEE Transactions on Information Theory, vol.46, issue.4, pp.1204-1216, 2000. ,
DOI : 10.1109/18.850663
Secure Network Coding, Proc. IEEE Int. Symp. on Information Theory, 2002. ,
Practical network coding, Proc. Annual Allerton Conference on Communication, Control, and Computing, 2003. ,
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks, Proceedings of the second ACM conference on Wireless network security, WiSec '09, 2009. ,
DOI : 10.1145/1514274.1514292
Secure network coding for wireless mesh networks: Threats, challenges, and directions, Computer Communications, vol.32, issue.17, pp.1790-1801, 2009. ,
DOI : 10.1016/j.comcom.2009.07.010
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.8221
Network coding, ACM SIGCOMM Computer Communication Review, vol.36, issue.1, pp.63-68, 2006. ,
DOI : 10.1145/1111322.1111337
Communication overhead of network coding schemes secure against pollution attacks, 2012. ,
Secure Network Coding over the Integers, Proc. PKC 2010, pp.142-160, 2010. ,
DOI : 10.1007/978-3-642-13013-7_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.4176
Cooperative Security for Network Coding File Distribution, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006. ,
DOI : 10.1109/INFOCOM.2006.233
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.3400
The benefits of coding over routing in a randomized setting, IEEE International Symposium on Information Theory, 2003. Proceedings., 2003. ,
DOI : 10.1109/ISIT.2003.1228459
Byzantine Modification Detection in Multicast Networks With Random Network Coding, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2798-2803, 2008. ,
DOI : 10.1109/TIT.2008.921894
Resilient network coding in the presence of byzantine adversaries, Proc. 26th Annual IEEE Conf. on Computer Commun., INFOCOM, pp.616-624, 2007. ,
Network coding security: Attacks and countermeasures. CoRR, abs/0809, 1366. ,
The TESLA broadcast authentication protocol, RSA CryptoBytes, vol.5, issue.2, pp.2-13, 2002. ,
DOI : 10.1007/978-1-4615-0229-6_3
Lightweight Security for Network Coding, 2008 IEEE International Conference on Communications, 2008. ,
DOI : 10.1109/ICC.2008.336
URL : http://arxiv.org/abs/0807.0610
Insecure " provably secure network coding " and homomorphic authentication schemes for network coding, 2010. ,
Information Theory and Network Coding, 2008. ,