{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:32:32Z","timestamp":1725456752179},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1109\/percomw.2010.5470512","type":"proceedings-article","created":{"date-parts":[[2010,5,28]],"date-time":"2010-05-28T18:25:41Z","timestamp":1275071141000},"page":"630-635","source":"Crossref","is-referenced-by-count":1,"title":["When Eco-IT meets security: Concealed network coding for multicast traffic"],"prefix":"10.1109","author":[{"given":"Alban","family":"Hessler","sequence":"first","affiliation":[]},{"given":"Takahiro","family":"Kakumaru","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Westhoff","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISTEL.2008.4651263"},{"key":"ref3","first-page":"1","article-title":"Secure Network Coding with a Cost Criterion","author":"tan","year":"2006","journal-title":"4th International Symposium on Modeling and Optimization in Mobile Ad Hoc and Wireless Networks"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.25"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1109\/SECPRI.2004.1301326","article-title":"On-the-fty Verification of Rateless Erase Codes for Efficient Content Distribution","author":"krohn","year":"2004","journal-title":"Proc IEEE Symposium on Security and Privacy"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181950"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557282"},{"journal-title":"Rateless Codes COMS 4995 Introduction to Coding Theory","year":"2004","author":"feldman","key":"ref12"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.199"},{"key":"ref7","article-title":"Security Enhanced Multi-Hop over the Air Re-programming with Fountain Codes","author":"bohli","year":"2009","journal-title":"4th IEEE International Workshop on Practical Issues in Building Sensor Network Applications"},{"article-title":"On the Capacity of Secure Network Coding","year":"0","author":"feldman","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354662"},{"key":"ref1","first-page":"323","article-title":"Secure Network Coding","author":"cai","year":"2002","journal-title":"IEEE Int Symp on Information Theory"}],"event":{"name":"2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","start":{"date-parts":[[2010,3,29]]},"location":"Mannheim, Germany","end":{"date-parts":[[2010,4,2]]}},"container-title":["2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5462925\/5470493\/05470512.pdf?arnumber=5470512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,5]],"date-time":"2020-06-05T05:29:58Z","timestamp":1591334998000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5470512\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/percomw.2010.5470512","relation":{},"subject":[],"published":{"date-parts":[[2010,3]]}}}