{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:42:51Z","timestamp":1730238171861,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/iccw.2015.7247395","type":"proceedings-article","created":{"date-parts":[[2015,9,14]],"date-time":"2015-09-14T17:18:06Z","timestamp":1442251086000},"page":"1521-1526","source":"Crossref","is-referenced-by-count":6,"title":["A null space-based MAC scheme against pollution attacks to Random linear Network Coding"],"prefix":"10.1109","author":[{"given":"Alireza","family":"Esfahani","sequence":"first","affiliation":[]},{"given":"Georgios","family":"Mantas","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Rodriguez","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Nascimento","sequence":"additional","affiliation":[]},{"given":"Jose Carlos","family":"Neves","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.233"},{"key":"ref11","article-title":"An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks","author":"zhen","year":"0","journal-title":"INFOCOM 2008 The 27th Conference on Computer Communications IEEE"},{"key":"ref12","first-page":"556","article-title":"Signatures for Content Distribution with Network Coding","author":"fang","year":"2007","journal-title":"Information Theory 2007 ISIT 2007 IEEE International Symposium on"},{"key":"ref13","article-title":"Signing a Linear Subspace: Signature Schemes for Network Coding","author":"boneh","year":"0","journal-title":"presented at the Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography PKC '09 CA"},{"key":"ref14","first-page":"406","article-title":"An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks","author":"zhen","year":"2009","journal-title":"INFOCOM 2009 IEEE"},{"key":"ref15","article-title":"Homomorphic MACs: MAC-Based Integrity for Network Coding","author":"agrawal","year":"0","journal-title":"presented at the Proceedings of the 7th International Conference on Applied Cryptography and Network Security Paris-Rocquencourt"},{"key":"ref16","first-page":"1","article-title":"RIPPLE Authentication for Network Coding","author":"yaping","year":"2010","journal-title":"INFOCOM 2010 Proceedings IEEE"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062036"},{"key":"ref18","first-page":"1026","article-title":"Padding for orthogonality: Efficient subspace authentication for network coding","author":"peng","year":"2011","journal-title":"INFOCOM 2011 Proceedings IEEE"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1504\/IJICOT.2009.024044"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"ref3","article-title":"Network Coding for Large Scale File Distribution","author":"gkantsidis","year":"2005","journal-title":"IEEE INFOCOM"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881746"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.807285"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921711"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921894"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.874396"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301326"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282400"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6283647"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISNETCOD.2011.5979096"},{"key":"ref21","article-title":"Timed efficient stream loss-tolerant authentication (TESLA): Multicast source authentication transform introduction","volume":"4082","author":"perrig","year":"2005","journal-title":"Request for Comments"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.751457"},{"key":"ref23","first-page":"4413","article-title":"A random linear network coding approach to multicast","author":"ho","year":"2004","journal-title":"IEEE Transactions on Information Theory 52"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.24"}],"event":{"name":"2015 ICC - 2015 IEEE International Conference on Communications Workshops (ICC)","start":{"date-parts":[[2015,6,8]]},"location":"London, United Kingdom","end":{"date-parts":[[2015,6,12]]}},"container-title":["2015 IEEE International Conference on Communication Workshop (ICCW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7226899\/7247062\/07247395.pdf?arnumber=7247395","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T23:41:28Z","timestamp":1490398888000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7247395\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iccw.2015.7247395","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}