{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:27:41Z","timestamp":1725888461765},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319594620"},{"type":"electronic","value":"9783319594637"}],"license":[{"start":{"date-parts":[[2017,5,28]],"date-time":"2017-05-28T00:00:00Z","timestamp":1495929600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-59463-7_50","type":"book-chapter","created":{"date-parts":[[2017,5,27]],"date-time":"2017-05-27T02:26:44Z","timestamp":1495852004000},"page":"509-517","source":"Crossref","is-referenced-by-count":0,"title":["A Combined Security Scheme for Network Coding"],"prefix":"10.1007","author":[{"given":"Chao","family":"Xu","sequence":"first","affiliation":[]},{"given":"Yonghui","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Guomin","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,28]]},"reference":[{"issue":"4","key":"50_CR1","doi-asserted-by":"crossref","first-page":"1204","DOI":"10.1109\/18.850663","volume":"46","author":"R Ahlswede","year":"2000","unstructured":"Ahlswede, R., et al.: Network information flow. IEEE Trans. Inf. Theory 46(4), 1204\u20131216 (2000)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"50_CR2","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1109\/TIT.2002.807285","volume":"49","author":"S-Y Li","year":"2003","unstructured":"Li, S.-Y., Yeung, R.W., Cai, N.: Linear network coding. IEEE Trans. Inf. Theory 49(2), 371\u2013381 (2003)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"50_CR3","doi-asserted-by":"crossref","unstructured":"Gkantsidis, C., Rodriguez, P.R.: Network coding for large scale content distribution. In: Proceedings of the IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2005. IEEE (2005)","DOI":"10.1109\/INFCOM.2005.1498511"},{"key":"50_CR4","doi-asserted-by":"crossref","unstructured":"Katti, S., et al.: XORs in the air: practical wireless network coding. In: ACM SIGCOMM Computer Communication Review. ACM (2006)","DOI":"10.1145\/1159913.1159942"},{"issue":"3","key":"50_CR5","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1109\/JPROC.2010.2096170","volume":"99","author":"AG Dimakis","year":"2011","unstructured":"Dimakis, A.G., et al.: A survey on network codes for distributed storage. Proc. IEEE 99(3), 476\u2013489 (2011)","journal-title":"Proc. IEEE"},{"key":"50_CR6","doi-asserted-by":"crossref","unstructured":"Ho, T., et al.: Byzantine modification detection in multicast networks using randomized network coding. In: Proceedings of International Symposium on Information Theory, ISIT 2004. IEEE (2004)","DOI":"10.1109\/ISIT.2004.1365180"},{"key":"50_CR7","doi-asserted-by":"crossref","unstructured":"Jaggi, S., et al.: Resilient network coding in the presence of byzantine adversaries. In: 26th IEEE International Conference on Computer Communications, INFOCOM 2007. IEEE (2007)","DOI":"10.1109\/INFCOM.2007.78"},{"key":"50_CR8","doi-asserted-by":"crossref","unstructured":"Krohn, M.N., Freedman, M.J., Mazieres, D.: On-the-fly verification of rateless erasure codes for efficient content distribution. In: Proceedings of the 2004 IEEE Symposium on Security and Privacy. IEEE (2004)","DOI":"10.1109\/SECPRI.2004.1301326"},{"key":"50_CR9","doi-asserted-by":"crossref","unstructured":"Gkantsidis, C., Rodriguez. P.: Cooperative security for network coding file distribution. In: INFOCOM (2006)","DOI":"10.1109\/INFOCOM.2006.233"},{"key":"50_CR10","doi-asserted-by":"crossref","unstructured":"Yu, Z., et al.: An efficient signature-based scheme for securing network coding against pollution attacks. In: The 27th IEEE Conference on Computer Communications, INFOCOM 2008. IEEE (2008)","DOI":"10.1109\/INFOCOM.2008.199"},{"key":"50_CR11","doi-asserted-by":"crossref","unstructured":"Zhao, F., et al.: Signatures for content distribution with network coding. In: IEEE International Symposium on Information Theory, ISIT 2007 (2007)","DOI":"10.1109\/ISIT.2007.4557283"},{"key":"50_CR12","doi-asserted-by":"crossref","unstructured":"Boneh, D., et al.: Signing a linear subspace: signature schemes for network coding. In: International Workshop on Public Key Cryptography. Springer (2009)","DOI":"10.1007\/978-3-642-00468-1_5"},{"key":"50_CR13","doi-asserted-by":"crossref","unstructured":"Yu, Z., et al.: An efficient scheme for securing XOR network coding against pollution attacks. In: INFOCOM 2009. IEEE (2009)","DOI":"10.1109\/INFCOM.2009.5061945"},{"key":"50_CR14","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Boneh, D.: Homomorphic MACs: MAC-based integrity for network coding. In: International Conference on Applied Cryptography and Network Security. Springer (2009)","DOI":"10.1007\/978-3-642-01957-9_18"},{"key":"50_CR15","doi-asserted-by":"crossref","unstructured":"Li, Y., et al.: RIPPLE authentication for network coding. In: Proceedings of the INFOCOM 2010. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462051"},{"key":"50_CR16","doi-asserted-by":"crossref","unstructured":"Kehdi, E., Li, B.: Null keys: limiting malicious attacks via null space properties of network coding. In: INFOCOM 2009. IEEE (2009)","DOI":"10.1109\/INFCOM.2009.5062036"},{"issue":"5","key":"50_CR17","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1109\/TIFS.2016.2515517","volume":"11","author":"C Cheng","year":"2016","unstructured":"Cheng, C., et al.: Security analysis and improvements on two homomorphic authentication schemes for network coding. IEEE Trans. Inf. Forensics Secur. 11(5), 993\u20131002 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"50_CR18","doi-asserted-by":"crossref","first-page":"918","DOI":"10.1109\/LCOMM.2016.2547420","volume":"20","author":"A Esfahani","year":"2016","unstructured":"Esfahani, A., Mantas, G., Rodriguez, J.: An efficient null space-based homomorphic MAC scheme against tag pollution attacks in RLNC. IEEE Commun. Lett. 20(5), 918\u2013921 (2016)","journal-title":"IEEE Commun. Lett."},{"issue":"5","key":"50_CR19","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1007\/s11859-016-1186-1","volume":"21","author":"G Liu","year":"2016","unstructured":"Liu, G.: Security analysis and improvement of a tag encoding authentication scheme for network coding. Wuhan Univ. J Nat. Sci. 21(5), 394\u2013398 (2016)","journal-title":"Wuhan Univ. J Nat. Sci."},{"key":"50_CR20","doi-asserted-by":"crossref","unstructured":"Wang, J., et al.: An efficient short null keys based scheme for securing network coding against pollution attacks. In: Internet Conference of China. Springer (2014)","DOI":"10.1007\/978-3-662-46826-5_2"},{"key":"50_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, P., et al.: Padding for orthogonality: efficient subspace authentication for network coding. In: Proceedings of the INFOCOM 2011. IEEE (2011)","DOI":"10.1109\/INFCOM.2011.5934876"},{"key":"50_CR22","doi-asserted-by":"crossref","unstructured":"Charles, D., Jain, K., Lauter, K.: Signatures for network coding. In: 2006 40th Annual Conference on Information Sciences and Systems. IEEE (2006)","DOI":"10.1109\/CISS.2006.286587"},{"key":"50_CR23","doi-asserted-by":"crossref","unstructured":"Li, X., et al.: Two improved homomorphic MAC schemes in network coding. In: 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). IEEE (2015)","DOI":"10.1109\/FSKD.2015.7382296"},{"issue":"1","key":"50_CR24","doi-asserted-by":"crossref","first-page":"173","DOI":"10.4218\/etrij.13.0212.0166","volume":"35","author":"G Liu","year":"2013","unstructured":"Liu, G., Wang, X.: Homomorphic subspace MAC scheme for secure network coding. ETRI J. 35(1), 173\u2013176 (2013)","journal-title":"ETRI J."},{"key":"50_CR25","doi-asserted-by":"crossref","unstructured":"Wang, Q., et al.: MIS: malicious nodes identification scheme in network-coding-based peer-to-peer streaming. In: Proceedings of the INFOCOM 2010. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462226"},{"issue":"2","key":"50_CR26","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1109\/JSAC.2012.120224","volume":"30","author":"A Le","year":"2012","unstructured":"Le, A., Markopoulou, A.: Cooperative defense against pollution attacks in network coding using SpaceMac. IEEE J. Sel. Areas Commun. 30(2), 442\u2013449 (2012)","journal-title":"IEEE J. Sel. Areas Commun."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internetworking, Data &amp; Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59463-7_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T05:20:35Z","timestamp":1569388835000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59463-7_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,28]]},"ISBN":["9783319594620","9783319594637"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59463-7_50","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2017,5,28]]}}}