共 25 条
[1]
Homomorphic MACs: MAC-Based Integrity for Network Coding
[J].
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY,
2009, 5536
:292-+
[3]
[Anonymous], 2003, P ANN ALL C COMM CON
[4]
Boneh D., 2009, P 12 INT C PRACT THE
[5]
Multicast security: A taxonomy and some efficient constructions
[J].
IEEE INFOCOM '99 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: THE FUTURE IS NOW,
1999,
:708-716
[7]
Charles Denis, 2009, International Journal of Information and Coding Theory, V1, P3, DOI 10.1504/IJICOT.2009.024044
[9]
Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548
[10]
Gkantsidis C, 2005, IEEE INFOCOM SER, P2235