参考文献
[1]Ahlswede R,Cai Ning,Li S Y R,et al.Network Information Flow[J].IEEE Transactions on Information Theory,2000,46(4):1204-1216.
[2]Wu Yunnan,Chou P A,Jain K.A Comparison of Network Coding and Tree Packing[C]//Proceedings of 2004 IEEE International Symposium on Information Theory.Washington D.C.,USA:IEEE Press,2004:143.
[3]Koetter R,Médard M.An Algebraic Approach to Network Coding[J].IEEE/ACM Transactions on Networking,2003,11(5):782-795.
[4]Wang Jin,Wu Chuan,Wang Jianping.Anonymous Communication with Network Coding Against Traffic Analysis Attack[C]//Proceedings of INFOCOM’11.Washington D.C.,USA:IEEE Press,2011:1008-1016.
[5]Li S Y R,Yeung R,Cai Ning.Linear Network Coding[J].IEEE Transactions on Information Theory,2003,49(2):371-381.
[6]Ho T,Karger D R,Medard M,et al.Network Coding from a Network Flow Perspective[C]//Proceedings of IEEE International Symposium on Information Theory.Washington D.C.,USA:IEEE Press,2003:441.
[7]Ho T,Medard M,Koetter R,et al.Toward a Random Operation of Networks[J].IEEE Transactions on Information Theory,2004,50(3):532-537.
[8]Harvey N J A,Karger D R,Murota K.Deterministic Network Coding by Matrix Completion[C]//Pro-ceedings of the 16th Annual ACM-SIAM Symposium on Discrete Algorithms.New York,USA:ACM Press,2005:489-498.
[9]Jaggi S,Cassuto Y,Effros M.Low Complexity Encoding for Network Codes[C]//Proceedings of IEEE International Symposium on Information Theory.Washington D.C.,USA:IEEE Press,2006:40-44.
[10]Sanders P,Egner S,Tolhuizen L.Polynomial Time Algorithms for Network Information Flow[C]//Proceedings of the 15th Annual ACM Symposium on Parallel Algorithms and Architectures.New York,USA:ACM Press,2003:286-294.
[11]Jain K,Lovsz L,Chou P A.Building Scalable and Robust Peer-to-Peer Overlay Networks for Broadcasting Using Network Coding[C]//Proceedings of the 24th Annual ACM Symposium on Principles of Distributed Computing.New York,USA:ACM
Press,2005:51-59.
[12]Gkantsidis C,Rodriguez P R.Cooperative Security for Network Coding File Distribution[C]//Proceedings of INFOCOM’06.Washington D.C.,USA:IEEE Press,2006:1-13.
[13]Chou P A,Wu Yunnan.Network Coding for the Internet and Wireless Networks[J].IEEE Signal Processing Magazine,2007,24(5):77-85.
[14]吴振强,马亚蕾.编码混淆:一种新型匿名通信模型[J].武汉大学学报(理学版),2010,57(5):401-407.
[15]Katti S,Katabi D,Puchala K.Slicing the Onion:Anonymous Routing Without PKI:MIT-CSAIL-TR-1000[R].Cambridge,USA:MIT Press,2005.
[16]Katti S,Katabi D,Puchala K.Slicing the Onion:Anonymous Using Unreliable Overlays[C]//Proceed-ings of the 4th USENIX Symposium on Networked System Design and Implementation.San Diego,USA:USENIX Association,2007:43-56.
[17]段桂花,王伟平,王建新,等.一种基于多路径网络编码的匿名通信机制[J].软件学报,2010,21(9):2338-2351.
[18]王进.基于网络编码的抵抗被动攻击的安全单播策略的研究[D].合肥:中国科学技术大学,2011.
[19]Fan Yanfeng,Jiang Yixin,Zhu Haojin,et al.An Efficient Privacy-preserving Scheme Against Traffic Analysis Attacks in Network Coding[C]//Proceedings of INFOCOM’09.Washington D.C.,USA:IEEE Press,2009:2213-2221.
[20]Zhang Peng,Jiang Yixin,Lin Chuang,et al.P-coding:Secure Network Coding Against Eavesdropping Attacks[C]//Proceedings of INFOCOM’10.Washington D.C.,USA:IEEE Press,2010:1-9.
[21]Zhou Yihui,Liao Xuening,Wu Zhenqiang.Effectiveness Analysis of ALNCode Scheme for Anonymous Communication with Network Coding[J].Journal of Information Science and Engineering,2015(2015):1961-1974.
[22]李伟,樊平毅.网络编码在无线中继网络中的应用研究[J].计算机工程,2011,37(7):15-17.
[23]吴振强,廖雪宁,周异辉.网络编码混淆方法研究进展[J].陕西师范大学学报(自然科学版),2014,42(6):13-20.
编辑金胡考 |