{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:26:43Z","timestamp":1725888403802},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319600321"},{"type":"electronic","value":"9783319600338"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60033-8_44","type":"book-chapter","created":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T12:18:42Z","timestamp":1495801122000},"page":"509-521","source":"Crossref","is-referenced-by-count":3,"title":["Security Enhancement via Dynamic Fountain Code for Wireless Multicast"],"prefix":"10.1007","author":[{"given":"Qinghe","family":"Du","sequence":"first","affiliation":[]},{"given":"Wanyu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Houbing","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,27]]},"reference":[{"issue":"4","key":"44_CR1","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.274999","volume":"27","author":"H Forman","year":"1994","unstructured":"Forman, H., Zahorjan, J.: The challenges of mobile computing. IEEE Comput. 27(4), 38\u201347 (1994)","journal-title":"IEEE Comput."},{"doi-asserted-by":"publisher","unstructured":"Hui, Y., Su, Z., Guo, S.: Utility based data computing scheme to provide sensing service in internet of things. IEEE Trans. Emerg. Top. Comput., June 2017. doi:\n10.1109\/TETC.2017.2674023","key":"44_CR2","DOI":"10.1109\/TETC.2017.2674023"},{"key":"44_CR3","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511977985","volume-title":"Physical-Layer Security, From Information Theory to Security Engineering","author":"J Bloch","year":"2011","unstructured":"Bloch, J., Barros, M.: Physical-Layer Security, From Information Theory to Security Engineering. Cambridge University Press, Cambridge (2011)"},{"issue":"9","key":"44_CR4","doi-asserted-by":"crossref","first-page":"5345","DOI":"10.1007\/s11042-015-2936-3","volume":"75","author":"M Hussain","year":"2016","unstructured":"Hussain, M., Du, Q., Sun, L., Ren, P.: Security enhancement for video transmission via noise aggregation in immersive systems. Multimed. Tools Appl. 75(9), 5345\u20135357 (2016)","journal-title":"Multimed. Tools Appl."},{"issue":"5","key":"44_CR5","doi-asserted-by":"crossref","first-page":"1633","DOI":"10.1109\/TVT.2006.874547","volume":"55","author":"X Zhang","year":"2006","unstructured":"Zhang, X., Du, Q.: Adaptive low-complexity erasure-correcting code based protocols for QoS-driven mobile multicast services over wireless networks. IEEE Trans. Veh. Technol. 55(5), 1633\u20131647 (2006)","journal-title":"IEEE Trans. Veh. Technol."},{"doi-asserted-by":"crossref","unstructured":"Cai, Z., Lin, G., Xue, G.: Improved approximation algorithms for the capacitated multicast routing problem. In: Proceedings of the 11th International Computing and Combinatorics Conference (COCOON 2005) (2005)","key":"44_CR6","DOI":"10.1007\/11533719_16"},{"issue":"3","key":"44_CR7","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1109\/JSAC.2010.100413","volume":"28","author":"Q Du","year":"2010","unstructured":"Du, Q., Zhang, X.: Statistical QoS provisionings for wireless unicast\/multicast of multi-layer video streams. IEEE J. Sel. Areas Commun. 28(3), 420\u2013433 (2010)","journal-title":"IEEE J. Sel. Areas Commun."},{"doi-asserted-by":"crossref","unstructured":"Zheng, X., Li, J., Gao, H., Cai, Z.: Capacity of wireless networks with multiple types of multicast sessions. In: The 15th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2014) (2014)","key":"44_CR8","DOI":"10.1145\/2632951.2632985"},{"issue":"52","key":"44_CR9","doi-asserted-by":"crossref","first-page":"5415","DOI":"10.1016\/j.tcs.2009.05.013","volume":"410","author":"Z Cai","year":"2009","unstructured":"Cai, Z., Chen, Z., Lin, G.: A 3.4713-approximation algorithm for the capacitated multicast tree routing problem. Theor. Comput. Sci. 410(52), 5415\u20135424 (2009)","journal-title":"Theor. Comput. Sci."},{"issue":"3","key":"44_CR10","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1016\/j.tcs.2009.05.031","volume":"412","author":"Z Cai","year":"2011","unstructured":"Cai, Z., Goebel, R., Lin, G.: Size-constrained tree partitioning: approximating the multicast k-tree routing problem. Theor. Comput. Sci. 412(3), 240\u2013245 (2011)","journal-title":"Theor. Comput. Sci."},{"doi-asserted-by":"publisher","unstructured":"Su, Z., Xu, Q., Hui, Y., Wen, M., Guo, S.: A game theoretic approach to parked vehicle assisted content delivery in vehicular ad hoc networks. IEEE Trans. Veh. Technol. doi:\n10.1109\/TVT.2016.2630300","key":"44_CR11","DOI":"10.1109\/TVT.2016.2630300"},{"issue":"6","key":"44_CR12","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1049\/ip-com:20050237","volume":"152","author":"DJC MacKay","year":"2005","unstructured":"MacKay, D.J.C.: Fountain codes. IEEE Proc. Commun. 152(6), 1062\u20131068 (2005)","journal-title":"IEEE Proc. Commun."},{"issue":"6","key":"44_CR13","doi-asserted-by":"crossref","first-page":"3278","DOI":"10.1109\/TWC.2009.081102","volume":"8","author":"X Liu","year":"2009","unstructured":"Liu, X., Lim, T.J.: Fountain codes over fading relay channels. IEEE Trans. Wireless Commun. 8(6), 3278\u20133287 (2009)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"5","key":"44_CR14","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1109\/LCOMM.2014.030914.140030","volume":"18","author":"H Niu","year":"2014","unstructured":"Niu, H., Iwai, M., Sezaki, K., et al.: Exploiting fountain codes for secure wireless delivery. IEEE Commun. Lett. 18(5), 777\u2013780 (2014)","journal-title":"IEEE Commun. Lett."},{"issue":"1","key":"44_CR15","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1109\/TII.2015.2509442","volume":"12","author":"L Sun","year":"2016","unstructured":"Sun, L., Ren, P., Du, Q., Wang, Y.: Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks. IEEE Trans. Ind. Inform. 12(1), 291\u2013300 (2016)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"2","key":"44_CR16","first-page":"47","volume":"11","author":"Q Du","year":"2016","unstructured":"Du, Q., Sun, L., Song, H., Ren, P.: Security enhancement for wireless multimedia communications by fountain code. IEEE COMSOC MMTC E-Lett. 11(2), 47\u201351 (2016)","journal-title":"IEEE COMSOC MMTC E-Lett."},{"issue":"8","key":"44_CR17","doi-asserted-by":"crossref","first-page":"1528","DOI":"10.1109\/JSAC.2002.803996","volume":"20","author":"JW Byers","year":"2002","unstructured":"Byers, J.W., Luby, M., Mitzenmacher, M.: A digital fountain approach to asynchronous reliable multicast. IEEE J. Sel. Areas Commun. 20(8), 1528\u20131540 (2002)","journal-title":"IEEE J. Sel. Areas Commun."},{"doi-asserted-by":"crossref","unstructured":"Luby, M.: LT codes. In: Proceedings of the IEEE 43rd Annual Symposium on Foundation of Computer Science, pp. 271\u2013280, November 2002","key":"44_CR18","DOI":"10.1109\/SFCS.2002.1181950"},{"key":"44_CR19","doi-asserted-by":"crossref","first-page":"1142","DOI":"10.1109\/TWC.2005.847005","volume":"4","author":"Q Liu","year":"2005","unstructured":"Liu, Q., Zhou, S., Giannakis, G.B.: Queuing with adaptive modulation and coding over wireless links: cross-layer analysis and design. IEEE Trans. Wireless Commun. 4, 1142\u20131153 (2005)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"5","key":"44_CR20","doi-asserted-by":"crossref","first-page":"1746","DOI":"10.1109\/TWC.2004.833474","volume":"2","author":"Q Liu","year":"2004","unstructured":"Liu, Q., Zhou, S., Giannakis, G.B.: Cross-layer combining of adaptive modulation and coding with truncated ARQ over wireless links. IEEE Trans. Wireless Commun. 2(5), 1746\u20131775 (2004)","journal-title":"IEEE Trans. Wireless Commun."}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60033-8_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T12:32:46Z","timestamp":1495801966000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60033-8_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319600321","9783319600338"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60033-8_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}