{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T21:05:52Z","timestamp":1648587952217},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2012,5,15]],"date-time":"2012-05-15T00:00:00Z","timestamp":1337040000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1007\/s11277-012-0666-7","type":"journal-article","created":{"date-parts":[[2012,5,14]],"date-time":"2012-05-14T04:07:36Z","timestamp":1336968456000},"page":"1847-1864","source":"Crossref","is-referenced-by-count":1,"title":["Secret Error Control Codes Against Malicious Attacks in Random Multisource Network Coding"],"prefix":"10.1007","volume":"69","author":[{"given":"Siguang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Meng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Weifeng","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,5,15]]},"reference":[{"issue":"4","key":"666_CR1","doi-asserted-by":"crossref","first-page":"1204","DOI":"10.1109\/18.850663","volume":"46","author":"R. Ahlswede","year":"2000","unstructured":"Ahlswede R., Cai N., Li S. R., Yeung R. W. (2000) Network information flow. IEEE Transactions on Information Theory 46(4): 1204\u20131216","journal-title":"IEEE Transactions on Information Theory"},{"key":"666_CR2","doi-asserted-by":"crossref","unstructured":"Rouayheb, S. Y. E., & Soljanin, E. (2007). On wiretap networks II. In Proceedings of IEEE international symposium on information theory (ISIT 2007) (pp. 551\u2013555).","DOI":"10.1109\/ISIT.2007.4557098"},{"key":"666_CR3","doi-asserted-by":"crossref","unstructured":"Silva, D., & Kschischang, F. R. (2008). Security for wiretap networks via rank-metric codes. In Proceedings of IEEE International Symposium on Information Theory (ISIT 2008) (pp. 176\u2013180).","DOI":"10.1109\/ISIT.2008.4594971"},{"key":"666_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, P., Jiang, Y., Lin, C., et\u00a0al. (2010). P-coding: Secure network coding against eavesdropping attacks. In Proceedings of IEEE INFOCOM 2010 (pp. 1\u20139).","DOI":"10.1109\/INFCOM.2010.5462050"},{"key":"666_CR5","doi-asserted-by":"crossref","unstructured":"Nutman, L., & Langberg, M. (2008). Adversarial models and resilient schemes for network coding. In Proceedings of IEEE international symposium on information theory (ISIT 2008) (pp. 171\u2013175).","DOI":"10.1109\/ISIT.2008.4594970"},{"key":"666_CR6","unstructured":"Ngai, C.-K., & Yeung, R. W. (2009). Secure error-correcting (SEC) network codes. In Proceedings of workshop on network coding, theory & applications (pp. 98\u2013103)."},{"key":"666_CR7","doi-asserted-by":"crossref","unstructured":"Yao, H., Silva, D., Jaggi, S., et\u00a0al. (2010). Network codes resilient to jamming and eavesdropping. In Proceedings of IEEE international symposium on network coding (pp. 31\u201336).","DOI":"10.1109\/NETCOD.2010.5487669"},{"key":"666_CR8","doi-asserted-by":"crossref","unstructured":"Silva, D., & Kschischang, F. R. (2010). Universal secure error-correcting schemes for network coding. In Proceedings of IEEE international symposium on information theory (ISIT 2010) (pp. 2428\u20132432).","DOI":"10.1109\/ISIT.2010.5513776"},{"issue":"2","key":"666_CR9","doi-asserted-by":"crossref","first-page":"1124","DOI":"10.1109\/TIT.2010.2090212","volume":"57","author":"D. Silva","year":"2011","unstructured":"Silva D., Kschischang F. R. (2011) Universal secure network coding via rank-metric codes. IEEE Transactions on Information Theory 57(2): 1124\u20131135","journal-title":"IEEE Transactions on Information Theory"},{"issue":"11","key":"666_CR10","doi-asserted-by":"crossref","first-page":"2026","DOI":"10.1587\/transfun.E93.A.2026","volume":"E93-A","author":"E. Shioji","year":"2010","unstructured":"Shioji E., Matsumoto R., Uyematsu T. (2010) Vulnerability of MRD-code-based universal secure network coding against stronger eavesdroppers. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E93-A(11): 2026\u20132033","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"666_CR11","unstructured":"Jafari, M., Fragouli, C., & Diggavi, S. (2008). Noncoherent multisource network coding. In Proceedings of IEEE international symposium on information theory (ISIT 2008) (pp. 817\u2013821)."},{"key":"666_CR12","doi-asserted-by":"crossref","unstructured":"Jafari, M., Fragouli, C., & Diggavi, S. (2009). Code construction for multiple sources network coding. In Proceedings of MobiHoc 2009.","DOI":"10.1145\/1540358.1540365"},{"key":"666_CR13","unstructured":"Mohajer, S., Jafari, M., Diggavi, S., et\u00a0al. (2009). On the capacity of multisource noncoherent network coding. In Proceedings of information theory workshop (ITW 2009) (pp. 130\u2013134)."},{"key":"666_CR14","doi-asserted-by":"crossref","unstructured":"Vyetrenko, S., Ho, T., Effros, M., et\u00a0al. (2009). Rate regions for coherent and noncoherent multisource network error correction. In Proceedings of IEEE international symposium on information theory (ISIT 2009) (pp. 1001\u20131005).","DOI":"10.1109\/ISIT.2009.5206077"},{"key":"666_CR15","unstructured":"Yao, H., Dikaliotis, T. K., Jaggi, S., et\u00a0al. (2010). Multiple access network information-flow and correction codes. In Proceedings of information theory workshop (ITW 2010)."},{"key":"666_CR16","doi-asserted-by":"crossref","unstructured":"Dikaliotis, T. K., Ho, T., Jaggi, S., et\u00a0al. (2011). Multiple-access network information-flow and correction codes IEEE Transactions on Information Theory, 57(2), 1067\u20131079.","DOI":"10.1109\/TIT.2010.2095130"},{"key":"666_CR17","unstructured":"Chen, S., Wu, M., & Lu, W. (2011). Secret error-correcting network coding against eavesdropping and pollution attacks. In Proceedings of international conference on information systems and computational intelligence (pp. v1-140\u2013v1-145)."},{"key":"666_CR18","doi-asserted-by":"crossref","unstructured":"Chen, S., Wu, M., & Lu, W. (2011). Counteracting malicious adversaries via secret and reliable coding mechanism in random network coding. International Journal of Communication Systems. (Published online in Wiley Online Library). doi: 10.1002\/dac.1359 .","DOI":"10.1002\/dac.1359"},{"issue":"9","key":"666_CR19","doi-asserted-by":"crossref","first-page":"3951","DOI":"10.1109\/TIT.2008.928291","volume":"54","author":"D. Silva","year":"2008","unstructured":"Silva D., Kschischang F. R., Koetter R. (2008) A rank-metric approach to error control in random network coding. IEEE Transactions on Information Theory 54(9): 3951\u20133967","journal-title":"IEEE Transactions on Information Theory"},{"issue":"6","key":"666_CR20","doi-asserted-by":"crossref","first-page":"2596","DOI":"10.1109\/TIT.2008.921711","volume":"54","author":"S. Jaggi","year":"2008","unstructured":"Jaggi S., Langberg M., Katti S. et\u00a0al (2008) Resilient network coding in the presence of byzantine adversaries. IEEE Transactions on Information Theory 54(6): 2596\u20132603","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-012-0666-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-012-0666-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-012-0666-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T17:20:13Z","timestamp":1561742413000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-012-0666-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5,15]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["666"],"URL":"https:\/\/doi.org\/10.1007\/s11277-012-0666-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,5,15]]}}}