{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:40:32Z","timestamp":1743054032602,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":38,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811905223"},{"type":"electronic","value":"9789811905230"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-0523-0_12","type":"book-chapter","created":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T06:02:45Z","timestamp":1646028165000},"page":"181-196","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Requirements for Total Resistance to Pollution Attacks in HMAC-Based Authentication Schemes for Network Coding"],"prefix":"10.1007","author":[{"given":"Lawrence","family":"Tandoh","sequence":"first","affiliation":[]},{"given":"Fagen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ikram","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Charles Roland","family":"Haruna","sequence":"additional","affiliation":[]},{"given":"Michael Y.","family":"Kpiebaareh","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Tandoh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"issue":"4","key":"12_CR1","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1109\/18.850663","volume":"46","author":"R Ahlswede","year":"2000","unstructured":"Ahlswede, R., Ning, C., Li, S.R., Yeung, R.W.: Network information flow. IEEE Trans. Inf. Theory 46(4), 1204\u20131216 (2000)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"12_CR2","doi-asserted-by":"publisher","first-page":"96","DOI":"10.4064\/fm-10-1-96-115","volume":"10","author":"K Menger","year":"1927","unstructured":"Menger, K.: Zur allgemeinen kurventheorie. Fundam. Math. 10(1), 96\u2013115 (1927)","journal-title":"Fundam. Math."},{"issue":"4","key":"12_CR3","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/TIT.1956.1056816","volume":"2","author":"P Elias","year":"1956","unstructured":"Elias, P., Feinstein, A., Shannon, C.: A note on the maximum flow through a network. IRE Trans. Inf. Theory 2(4), 117\u2013119 (1956)","journal-title":"IRE Trans. Inf. Theory"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"399","DOI":"10.4153\/CJM-1956-045-5","volume":"8","author":"L Ford","year":"1956","unstructured":"Ford, L., Fulkerson, D.: Maximal flow through a network. Can. J. Math. 8, 399\u2013404 (1956)","journal-title":"Can. J. Math."},{"key":"12_CR5","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley Series in Telecommunications and Signal Processing (2006)"},{"issue":"6","key":"12_CR6","doi-asserted-by":"publisher","first-page":"1956","DOI":"10.1016\/j.jnca.2011.07.012","volume":"34","author":"MA Iqbal","year":"2011","unstructured":"Iqbal, M.A., Dai, B., Huang, B., Hassan, A., Yu, S.: Survey of network coding-aware routing protocols in wireless networks. J. Netw. Comput. Appl. 34(6), 1956\u20131970 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Gkantsidis, C., Rodriguez, P.R.: Network coding for large scale content distribution. In: Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 4, pp. 2235\u20132245. IEEE (2005)","DOI":"10.1109\/INFCOM.2005.1498511"},{"issue":"4","key":"12_CR8","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/1282427.1282400","volume":"37","author":"S Chachulski","year":"2007","unstructured":"Chachulski, S., Jennings, M., Katti, S., Katabi, D.: Trading structure for randomness in wireless opportunistic routing. SIGCOMM Comput. Commun. Rev. 37(4), 169\u2013180 (2007). https:\/\/doi.org\/10.1145\/1282427.1282400","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"12_CR9","unstructured":"Gkantsidis, C., Goldberg, M.: Avalanche: file swarming with network coding. Microsoft Research (2005)"},{"issue":"4","key":"12_CR10","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1145\/1151659.1159942","volume":"36","author":"S Katti","year":"2006","unstructured":"Katti, S., Katabi, D., Hu, W., Rahul, H., Medard, M.: The importance of being opportunistic: practical network coding for wireless environments. Newsl. ACM SIGCOMM Comput. Commun. Rev. 36(4), 243\u2013254 (2006)","journal-title":"Newsl. ACM SIGCOMM Comput. Commun. Rev."},{"key":"12_CR11","unstructured":"Wu, Y., Chou, P.A., Kung, S.Y.: Information exchange in wireless networks with network coding and physical-layer broadcast. Report, MSR-TR-2004 (2005)"},{"key":"12_CR12","unstructured":"Widmer, J., Fragouli, C., Le Boudec, J.Y.: Low-complexity energy-efficient broadcasting in wireless ad-hoc networks using network coding. In: Proceedings (2005)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Dimakis, A.G., Prabhakaran, V., Ramchandran, K.: Ubiquitous access to distributed data in large-scale sensor networks through decentralized erasure codes. In: IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks 2005, pp. 111\u2013117. IEEE (2005)","DOI":"10.1109\/IPSN.2005.1440909"},{"key":"12_CR14","doi-asserted-by":"publisher","first-page":"43863","DOI":"10.1109\/ACCESS.2020.2977428","volume":"8","author":"R Parsamehr","year":"2020","unstructured":"Parsamehr, R., Mantas, G., Rodriguez, J., Martinez-Ortega, J.F.: IDLP: an efficient intrusion detection and location-aware prevention mechanism for network coding-enabled mobile small cells. IEEE Access 8, 43863\u201343875 (2020)","journal-title":"IEEE Access"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Parsamehr, R., Esfahani, A., Mantas, G., Rodriguez, J., Mart\u00ednez-Ortega, J.F.: A location-aware IDPS scheme for network coding-enabled mobile small cells. In: 2019 IEEE 2nd 5G World Forum (5GWF), pp. 91\u201396. IEEE (2019)","DOI":"10.1109\/5GWF.2019.8911650"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Adat, V., Parsamehr, R., Politis, I., Tselios, C., Kotsopoulos, S.: Malicious user identification scheme for network coding enabled small cell environment. In: ICC 2020\u20132020 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/ICC40277.2020.9148736"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Katti, S., Rahul, H., Hu, W., Katabi, D., M\u00e9dard, M., Crowcroft, J.: XORs in the air: practical wireless network coding. In: Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 243\u2013254 (2006)","DOI":"10.1145\/1151659.1159942"},{"issue":"4","key":"12_CR18","doi-asserted-by":"publisher","first-page":"3683","DOI":"10.1109\/JSYST.2018.2802493","volume":"12","author":"YJ Chen","year":"2018","unstructured":"Chen, Y.J., Wang, L.C., Wang, K., Ho, W.L.: Topology-aware network coding for wireless multicast. IEEE Syst. J. 12(4), 3683\u20133692 (2018)","journal-title":"IEEE Syst. J."},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Gkantsidis, C., Rodriguez, P.: Cooperative security for network coding file distribution. In: INFOCOM, vol. 3, p. 5 (2006)","DOI":"10.1109\/INFOCOM.2006.233"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Yu, Z., Wei, Y., Ramkumar, B., Guan, Y.: An efficient signature-based scheme for securing network coding against pollution attacks. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 1409\u20131417. IEEE (2008)","DOI":"10.1109\/INFOCOM.2008.199"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Dai, B., Zhang, S., Qu, Y., Yang, J., Wang, F.: Orthogonal vector based network coding against pollution attacks in n-layer combination networks. In: 2010 5th International ICST Conference on Communications and Networking in China, pp. 1\u20135. IEEE (2010)","DOI":"10.4108\/chinacom.2010.89"},{"issue":"1","key":"12_CR22","first-page":"3","volume":"1","author":"D Charles","year":"2009","unstructured":"Charles, D., Jain, K., Lauter, K.: Signatures for network coding. Int. J. Inf. Coding Theory 1(1), 3\u201314 (2009)","journal-title":"Int. J. Inf. Coding Theory"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Jaggi, S., Langberg, M., Katti, S., Ho, T., Katabi, D., M\u00e9dard, M.: Resilient network coding in the presence of byzantine adversaries. In: IEEE INFOCOM 2007\u201326th IEEE International Conference on Computer Communications, pp. 616\u2013624. IEEE (2007)","DOI":"10.1109\/ISIT.2007.4557281"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Yu, Z., Wei, Y., Ramkumar, B., Guan, Y.: An efficient scheme for securing XOR network coding against pollution attacks. In: IEEE INFOCOM 2009, pp. 406\u2013414. IEEE (2009)","DOI":"10.1109\/INFCOM.2009.5061945"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Kehdi, E., Li, B.: Null keys: limiting malicious attacks via null space properties of network coding. In: IEEE INFOCOM 2009, pp. 1224\u20131232. IEEE (2009)","DOI":"10.1109\/INFCOM.2009.5062036"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Zhao, F., Kalker, T., M\u00e9dard, M., Han, K.J.: Signatures for content distribution with network coding. In: 2007 IEEE International Symposium on Information Theory, pp. 556\u2013560. IEEE (2007)","DOI":"10.1109\/ISIT.2007.4557283"},{"key":"12_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/978-3-642-01957-9_18","volume-title":"Applied Cryptography and Network Security","author":"S Agrawal","year":"2009","unstructured":"Agrawal, S., Boneh, D.: Homomorphic MACs: MAC-based integrity for network coding. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 292\u2013305. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01957-9_18"},{"key":"12_CR28","unstructured":"Krohn, M.N., Freedman, M.J., Mazieres, D.: On-the-fly verification of rateless erasure codes for efficient content distribution. In: IEEE Symposium on Security and Privacy 2004, Proceedings 2004, pp. 226\u2013240. IEEE (2004)"},{"issue":"6","key":"12_CR29","doi-asserted-by":"publisher","first-page":"2798","DOI":"10.1109\/TIT.2008.921894","volume":"54","author":"T Ho","year":"2008","unstructured":"Ho, T., Leong, B., Koetter, R., M\u00e9dard, M., Effros, M., Karger, D.R.: Byzantine modification detection in multicast networks with random network coding. IEEE Trans. Inf. Theory 54(6), 2798\u20132803 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"12_CR30","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1109\/LCOMM.2016.2547420","volume":"20","author":"A Esfahani","year":"2016","unstructured":"Esfahani, A., Mantas, G., Rodriguez, J.: An efficient null space-based homomorphic MAC scheme against tag pollution attacks in RLNC. IEEE Commun. Lett. 20(5), 918\u2013921 (2016)","journal-title":"IEEE Commun. Lett."},{"issue":"7","key":"12_CR31","doi-asserted-by":"publisher","first-page":"510251","DOI":"10.1155\/2015\/510251","volume":"11","author":"A Esfahani","year":"2015","unstructured":"Esfahani, A., Yang, D., Mantas, G., Nascimento, A., Rodriguez, J.: Dual-homomorphic message authentication code scheme for network coding-enabled wireless sensor networks. Int. J. Distrib. Sens. Netw. 11(7), 510251 (2015)","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"5","key":"12_CR32","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1109\/JSAC.2010.100607","volume":"28","author":"M Kim","year":"2010","unstructured":"Kim, M., et al.: On counteracting byzantine attacks in network coded peer-to-peer networks. IEEE J. Sel. Areas Commun. 28(5), 692\u2013702 (2010)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"12_CR33","unstructured":"Cai, N., Yeung, R.W.: Secure network coding. In: Proceedings IEEE International Symposium on Information Theory, p. 323. IEEE (2002)"},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Zhang, P., Jiang, Y., Lin, C., Fan, Y., Shen, X.: P-coding: secure network coding against eavesdropping attacks. In: 2010 Proceedings IEEE INFOCOM, pp. 1\u20139. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462050"},{"key":"12_CR35","doi-asserted-by":"crossref","unstructured":"Li, Y., Yao, H., Chen, M., Jaggi, S., Rosen, A.: Ripple authentication for network coding. In: 2010 Proceedings IEEE INFOCOM, pp. 1\u20139. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462051"},{"key":"12_CR36","doi-asserted-by":"crossref","unstructured":"Zhang, P., Jiang, Y., Lin, C., Yao, H., Wasef, A., Shenz, X.: Padding for orthogonality: efficient subspace authentication for network coding. In: 2011 Proceedings IEEE INFOCOM, pp. 1026\u20131034. IEEE (2011)","DOI":"10.1109\/INFCOM.2011.5934876"},{"issue":"6","key":"12_CR37","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1007\/s10207-016-0351-z","volume":"16","author":"A Esfahani","year":"2017","unstructured":"Esfahani, A., Mantas, G., Rodriguez, J., Neves, J.C.: An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks. Int. J. Inf. Secur. 16(6), 627\u2013639 (2017). https:\/\/doi.org\/10.1007\/s10207-016-0351-z","journal-title":"Int. J. Inf. Secur."},{"key":"12_CR38","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s11235-021-00842-6","volume":"79","author":"T Lawrence","year":"2022","unstructured":"Lawrence, T., Li, F., Ali, I., Haruna, C.R., Kpiebaareh, M.Y., Christopher, T.: A computationally efficient HMAC-based authentication scheme for network coding. Telecommun. Syst. 79, 47\u201369 (2022). https:\/\/doi.org\/10.1007\/s11235-021-00842-6","journal-title":"Telecommun. Syst."}],"container-title":["Communications in Computer and Information Science","Frontiers in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-0523-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T12:11:51Z","timestamp":1726747911000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-0523-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811905223","9789811905230"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-0523-0_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"1 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Frontiers in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fcs2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icfcs.com.cn\/fcs2021","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.7","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}