{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T02:25:14Z","timestamp":1725503114025},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/milcom.2012.6415857","type":"proceedings-article","created":{"date-parts":[[2013,1,31]],"date-time":"2013-01-31T17:24:53Z","timestamp":1359653093000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Securing wireless network coding against pollution attack at the physical layer"],"prefix":"10.1109","author":[{"given":"Sang Wu","family":"Kim","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511606267"},{"key":"17","first-page":"42","article-title":"The weight distribution and randomness of linear codes","author":"cheung","year":"1989","journal-title":"NASA IPN Progress Report"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753089"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511813498"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.909106"},{"key":"13","article-title":"Signing a linear subspace: Signature schemes for network coding","author":"boneh","year":"2009","journal-title":"Proc OfInternational Conf on Public Key Cryptography"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","author":"gallager","year":"1963","journal-title":"Low Density Parity Check Codes"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2004.1365180"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921711"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2007.4454907"},{"key":"20","first-page":"367","author":"proakis","year":"0","journal-title":"Digital Communications"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.904818"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511754623"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514292"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557283"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.199"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2006.286587"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-01957-9_18","article-title":"Homomorphic MACs: MAC-based integrity for network coding","author":"agrawal","year":"2009","journal-title":"Proc of International Conference on Applied Cryptography and Network Security"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.233"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320209"}],"event":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","start":{"date-parts":[[2012,10,29]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2012,11,1]]}},"container-title":["MILCOM 2012 - 2012 IEEE Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6383191\/6415559\/06415857.pdf?arnumber=6415857","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,21]],"date-time":"2020-07-21T14:30:03Z","timestamp":1595341803000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6415857\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/milcom.2012.6415857","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}