参考文献
[1]Ahlswede R,Cai Ning,Li S Y R,et al.Network Information Flow[J].IEEE Transactions on Information Theory,2000,46(4):1204-1216.
[2]徐光宪,吴巍.混沌序列在安全网络编码算法中的应用研究[J].计算机应用研究,2013,31(4):1001-3695.
[3]杨林,郑刚,胡晓惠.网络编码的研究进展[J].计算机研究与展,2008,25(3):400-407.
[4]Cain B,Yeung R W.Secure Network Coding[C]//Proceedings of 2002 IEEE International Symposium on Information Theory.Los Alamitos,USA:IEEE Computer Society,2002:323-340.
[5]Li S Y,Yeung R W,Cai N.Linear Network Coding[J].IEEE Transactions on Information Theory,2003,49(2):371-381.
[6]Feldman J,Malkin T,Stein C et al.On the Capacity of Secure Network Coding[C]//Proceedings of the 42nd Annual Allerton Conference on Communication,Control,and Computing.Monticello,USA:Curran Associates,2004:30-40.
[7]Zhang Yan,Xu Chengqi,Wang Feng.A Novel Scheme for Secure Network Coding Using One-time Pad [C]//Proceedings of International Conference on Networks Security,Wireless Communication and Trusted Computing.Washington D.C.,USA:IEEE
Press,2009:92-98.
[8]Krohn M N,Freedma M J,Mazieres D.On-the-fly Verification of Rateless Erasure Codes for Efficient Content Distri Bution[C]//Proceedings of IEEE Symposium on Security and Privacy.Oakland,USA:IEEE Computer Security Press,2004:226-
240.
[9]Gkantsidis C,Rodriguez P.Cooperative Security for Network Coding File Distribution[C]//Proceedings of the 25th EEE International Conference on Computer Communications.Barcelona,Spain:Institute of Electrical and Electronics
Engineers,2006:743-757.
[10]Vilela J,Limal L,Barros J.Lightweight Security for Network Coding[C]//Proceedings of IEEE International Conference on Communications.Washington D.C.,USA:IEEE Press,2008:978-990.
[11]Zhang Peng,Jiang Yixin,Lin Chuang,et al.P-coding Se-cure Network Coding Against Eavesdropping Attacks[C]//Proceedings of IEEE INFOCOM’10.Washington D.C.,USA:IEEE Press,2010:1-9.
[12]俞立峰,杨琼,于娟,等.防窃听攻击的安全网络编码[J].计算机应用研究,2012,29(3):813-818.
[13]曹张华,唐元生.安全网络编码综述[J].计算机应用,2010,30(2):1001-1008.
[14]王亚伟,王行愚.一种结合Cat和Logistic映射的混沌加密算法[J].东南大学学报:自然科学版,2005,35(增刊 (II)):128-131.
[15]徐光宪,李晓彤,罗荟荟.一种基于混沌序列的安全网络编码设计与分析[J].计算机科学,2013,40(5):147-163.
[16]燕莎,田鹏辉,刘强辉.基于混合光学双稳模型的二值图像置乱法[J].信息与控制,2012:34(4):1008-1194.
[17]翁贻方,鞠磊.基于混沌的序列密码加密算法[J].计算机工程,2002,28(11):79-83.
[18]张岩.一种改进的安全网络编码方案的研究[C]//中国电子学会第十五届信息论学术年会论文集.西安:国防工业出版社,2008:962-966.
[19]徐光宪,付晓.抗万能攻击的安全网络编码[J].计算机科学,2012,39(8):88-114.
[20]曹张华,吉晓东,刘敏.网络编码在窃听网络中的应用[J].计算机科学,2013,40(10):144-147.
[21]徐光宪,付晓.基于稀疏矩阵的低复杂度安全网络编码算法[J].计算机工程,2012,38(9):100-103.
编辑索书志 |