|
网络编码的安全性综述
|
Abstract:
[1] | Ahlswede, R., Cai, N. and Yeung, R.W. (2000) Network Information Flow. IEEE Transactions on Information Theory, 46, 1204-1216. http://dx.doi.org/10.1109/18.850663 |
[2] | Yao, S.X., Chen, J., et al. (2014) A Survey of Security Network Coding toward Various Attacks. 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, 24-26 September 2014, 252-259. http://dx.doi.org/10.1109/TrustCom.2014.35 |
[3] | He, M., Chen, L., et al. (2012) Survey on Secure Transmission of Network Coding in Wireless Networks. 2012 International Conference on Computer Science and Service System, Nanjing, 11-13 August 2012, 1216-1219.
http://dx.doi.org/10.1109/CSSS.2012.308 |
[4] | Christos, G. and Pablo, R. (2006) Cooperative Security for Net-work Coding File Distribution. Infocom, 3, 5. |
[5] | Jiang, Y.-X., Fan, Y.-F., Xue, M., et al. (2009) A Self-Adaptive Probabilistic Packet Filter Scheme against Entropy Attacks in Network Coding. Computer Networks, 53, 3089-3101. http://dx.doi.org/10.1016/j.comnet.2009.08.002 |
[6] | Newell, A.J., Curtmola, R. and Nita-Rotaru, C. (2012) En-tropy Attacks and Countermeasures in Wireless Network Coding. Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, New York, 16-18 April 2012, 185-196. http://dx.doi.org/10.1145/2185448.2185473 |
[7] | Cai, N. and Yeung, R.W. (2002) Network Coding and Error Correction. IEEE Information Theory Workshop, Bangalore, 20-25 October 2002, 119-122. |
[8] | Zhang, Z. (2006) Network Error Correction Coding in Packetized Networks. IEEE Information Theory Workshop, Chengdu, 433-437. http://dx.doi.org/10.1109/itw2.2006.323836 |
[9] | Zhang, Z. (2008) Linear Network Error Correction Codes in Packet Networks. IEEE Transactions on Information Theory, 54, 209-218. http://dx.doi.org/10.1109/TIT.2007.909139 |
[10] | Jaggi, S., Langberg, M., Katti, S., Ho, T., Katabi, D. and Medard, M. (2007) Resilient Network Coding in the Presence of Byzantine Adversaries. 26th IEEE International Conference on Computer Communications, Anchorage, 6-12 May 2007, 616-624. http://dx.doi.org/10.1109/INFCOM.2007.78 |
[11] | Pandit, V., Jun, J.H. and Agrawal, D.P. (2011) Inherent Security Benefits of Analog Network Coding for the Detection of Byzantine Attacks in Multi-Hop Wireless Networks. Pro-ceedings of the 2011 IEEE 8th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Valencia, 17-21 October 2011, 697-702. |
[12] | Li, Q., Lui, J.C.S. and Chiu, D.-M. (2012) On the Security and Efficiency of Content Distribution via Network Coding. IEEE Transactions on Dependable and Secure Computing, 9, 211-221. |
[13] | Bin, D., Zhang, S., Qu, Y., Yang, J. and Wang, F. (2010) Orthogonal Vector Based Network Coding against Pollution Attacks in n-Layer Combination Networks. Proceedings of the 5th International ICST Conference on Communications and Networking in China (CHINACOM), Beijing, 22-25 August 2010, 1-5. |
[14] | Cai, N. and Yeung, R.W. (2002) Secure Network Coding. Proceedings of the IEEE International Symposium on Information Theory, Lausanne, 30 June-5 July 2002, 323. |
[15] | Cai, N. and Yeung, R.W. (2011) Secure Network Coding on a Wiretap Network. IEEE Transactions on Information Theory, 57, 424-435. http://dx.doi.org/10.1109/TIT.2010.2090197 |
[16] | Cai, N. and Chan, T. (2011) Theory of Secure Network Coding. Proceedings of the IEEE, 99, 421-437.
http://dx.doi.org/10.1109/JPROC.2010.2094592 |
[17] | Bhattad, K. and Narayanan, K.R. (2005) Weakly Secure Network Coding. Proceedings of the First Workshop on Network Coding, Theory, and Applications, Riva del Garda, 7 April 2005, 281-285. |
[18] | Capar, C. and Goeckel, D. (2012) Network Coding for Facilitating Secrecy in Large Wireless Networks. Proceedings of the 46th Annual Conference on Information Sciences and Systems (CISS), Princeton, 21-23 March 2012, 1-6. |
[19] | Zhang, P., Jiang, Y., Lin, C., Fan, Y. and Shen, X. (2010) P-Coding: Secure Network Coding against Eavesdropping Attacks. Proceedings of the IEEE INFOCOM, San Diego, 14-19 March 2010, 1-9. |
[20] | 武萌, 吴蒙. 防窃听的弱安全网络编码[J]. 计算机技术与发展, 2014, 24(10): 167-169. |
[21] | 赵佳佳, 任平安. 基于抗窃听和拜占庭攻击的随机网络编码[J]. 计算机科学, 2014, 41(9): 174-177. |
[22] | 徐光宪, 付晓. 抗万能攻击的安全网络编码[J]. 计算机科学, 2012, 39(8): 88-91. |
[23] | 杨柳, 钟诚. 一种高效的安全数据包过滤算法[J]. 兰州大学学报(自然科学版), 2012, 48(4): 105-108. |