[1] AHLSWEDE R,CAI Ning,LI S Y R,et al.Network information flow[J].IEEE Transactions on Information Theory,2000,46(4):1204-1216. [2] NGUYEN D,TRAN T,NGUYEN T,et al.Wireless broadcast using network coding[J].IEEE Transactions on Vehicular Technology,2009,58(2):914-925. [3] 严子恒.最小割最大流算法的研究与应用[D].南京:南京邮电大学,2016. [4] LI S Y R,YEUNG R W,CAI Ning.Linear network coding[J].IEEE Transactions on Information Theory,2003,49(2):371-381. [5] FRAGOULI C,BOUDEC J Y L,WIDMER J.Network coding:an instant primer[J].ACM SIGCOMM Computer Communication Review,2006,36(1):63-68. [6] AGRAWAL S,BONEH D,BOYEN X,et al.Preventing pollution attacks in multi-source network coding[C]//Proceedings of International Workshop on Public Key Cryptography.Berlin,Germany:Springer,2010:1-18. [7] LIU Jun,YANG Jingyu,CHENG Zijing,et al.Anti-eavesdropping network coding algorithm based on T-N threshold[J].Chinese Journal of Electronics,2017,26(2):372-376. [8] KROHN M N,FREEDMAN M J,MAZIERES D.On-the-fly verification of rateless erasure codes for efficient content distribution[C]//Proceedings of 2004 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2004:226-240. [9] HO T,LEONG B,KOETTER R,et al.Byzantine modifi-cation detection in multicast networks using randomized network coding[C]//Proceedings of 2004 International Symposium on Information Theory.Washington D.C.,USA:IEEE Press,2005:144-150. [10] GKANTSIDIS C,RODRIGUEZ P R.Cooperative security for network coding file distribution[C]//Proceedings of 2006 IEEE International Conference on Computer Communications.Washington D.C.,USA:IEEE Press,2006:1-13. [11] CHARLES D,JAIN K,LAUTER K.Signatures for network coding[C]//Proceedings of 2006 Conference on Information Sciences and Systems.Washington D.C.,USA:IEEE Press,2006:857-863. [12] YU Zhen,WEI Yawen,RAMKUMAR B,et al.An efficient signature-based scheme for securing network coding against pollution attacks[C]//Proceedings of 2008 Conference on Computer Communications.Washington D.C.,USA:IEEE Press,2008:1409-1417. [13] 李世浩,梅中辉.抗代间污染攻击的网络编码同态签名方案[J].计算机技术与发展,2016,26(10):73-76. [14] WU Xiaohu,XU Yinlong,YUEN C,et al.A tag encoding scheme against pollution attack to linear network coding[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(1):33-42. [15] 刘光军.基于同态MAC的网络编码抗代间污染安全方案[J].科学技术与工程,2017,17(19):167-171. [16] 裴恒利,尚涛,刘建伟.融合时间戳和同态签名的安全网络编码方法[J].通信学报,2013,34(4):28-35. [17] LEE S H,GERLA M,KRAWCZYK H,et al.Performance evaluation of secure network coding using homomorphic signature[C]//Proceedings of International Symposium on Network Coding.Washington D.C.,USA:IEEE Press,2011:1-6. [18] YAN Wenjie,YANG Mingxi,LI Layuan,et al.Short signature scheme for multi-source network coding[J].Computer Communications,2012,35(3):344-351. [19] GAMAL A E.Noisy network coding[J].IEEE Transac-tions on Information Theory,2011,57(5):3132-3152. |