共 31 条
[1]
Homomorphic MACs: MAC-Based Integrity for Network Coding
[J].
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY,
2009, 5536
:292-+
[3]
Anh Le, 2012, 2012 International Symposium on Network Coding (NetCod 2012), P155, DOI 10.1109/NETCOD.2012.6261901
[4]
[Anonymous], 2013, IEEE T COMPUT, DOI DOI 10.1109/TC.2011.245
[5]
[Anonymous], BYOD DATA LOSS TOP L
[6]
[Anonymous], Y NEWS
[7]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[9]
Secure network coding
[J].
ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS,
2002,
:323-323
[10]
Catalano D, 2012, LECT NOTES COMPUT SC, V7293, P680, DOI 10.1007/978-3-642-30057-8_40