Ahlswede R, Cai N, Li S Y R. Network information flow[J]. IEEE Trans Inform Theory, 2000, 46(4): 1204-1216.
[2]
Li S Y R, Yeung R W, Cai N. Linear network coding[J]. IEEE Trans Inform Theory, 2003, 49(2): 371-381.
[3]
Jaggi S, Sanders Peter, Chou P A. Polynomial time algorithms for multicast network code construction[J]. IEEE Trans Inform Theory, 2005, 51(6): 1973-1982.
[4]
Cai N, Yeung R W. Secure network coding//IEEE International Symposium on Information Theory (ISIT2002). Lausanne: IEEE Press, 2002: 323.
[5]
Shannon C E. Communication theory of secrecy systems[J]. Bell Sys Tech Journal, 1949(28): 656-715.
[6]
Shamir A. How to share a secret[J]. Commun of the ACM, 1979(22): 612-613.