{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:27:14Z","timestamp":1725474434834},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/icnss.2011.6060020","type":"proceedings-article","created":{"date-parts":[[2011,11,1]],"date-time":"2011-11-01T16:59:24Z","timestamp":1320166764000},"page":"305-309","source":"Crossref","is-referenced-by-count":2,"title":["Flooding attacks against network coding and countermeasures"],"prefix":"10.1109","author":[{"given":"Yuanyuan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Wassim","family":"Znaidi","sequence":"additional","affiliation":[]},{"given":"Cedric","family":"Lauradoux","sequence":"additional","affiliation":[]},{"given":"Marine","family":"Minier","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511754623"},{"journal-title":"Network Coding Theory","year":"2005","author":"yeung","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881746"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_15"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/965732.965742"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SENSORCOMM.2010.77"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1236360.1236385"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.923722"},{"key":"ref19","article-title":"Beyond Routing: An Algebraic Approach to Network Coding","author":"m\u00e9dard","year":"2002","journal-title":"IEEE INFOCOM 2002"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061945"},{"key":"ref3","first-page":"551","article-title":"On wiretap networks II","author":"el rouayheb","year":"2008","journal-title":"2007 IEEE International Symposium on Information Theory ISIT"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1504\/IJICOT.2009.024044"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514292"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2010.32"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/978-3-642-01957-9_18","article-title":"Homomorphic MACs: MAC-Based Integrity for Network Coding","author":"agrawal","year":"2009","journal-title":"Applied Cryptography and Network Security - ACNS 2009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557282"},{"key":"ref1","article-title":"Secure network coding","author":"cai","year":"2002","journal-title":"IEEE Int Symp Information Theory ISIT 2002"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.07.010"}],"event":{"name":"2011 5th International Conference on Network and System Security (NSS)","start":{"date-parts":[[2011,9,6]]},"location":"Milan, Italy","end":{"date-parts":[[2011,9,8]]}},"container-title":["2011 5th International Conference on Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6044613\/6059944\/06060020.pdf?arnumber=6060020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T04:56:08Z","timestamp":1497934568000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6060020\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icnss.2011.6060020","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}