1Ahlswede R, Cai Ning, Li Shuo-Yen, et al. Network Information Flow[J]. IEEE Transactions on Information Theory, 2000, 46(4): 1204-1216. 被引量:1
2Li Shuo-Yen, Yeung R W, Cai Ning. Linear Network Coding[J]. IEEE Transactions on Information Theory, 2003, 49(2): 371-381. 被引量:1
3Deb S, Ho E T. Network Coding for Wireless Applications: A Brief Tutorial[C]//Proceedings of International Workshop on Wireless Ad-hoc Networks. London, UK: [s. n.], 2005. 被引量:1
4Ho T, Leong B, Koetter R. Byzantine Modification Detection in Multicast Networks with Random Network Coding[J]. IEEE Transactions on Information Theory, 2008, 54(6): 2798-2830. 被引量:1
5Cai Ning, Yeung R W. Secure Network Coding[C]//Proceedings of IEEE International Symposium on Information Theory. [S. 1.]: IEEE Press, 2002. 被引量:1
6Zhang Yan, Xu Chengqi, Wang Feng. A Novel Scheme for Secure Network Coding Using One-time Pad[C]//Proceedings of Intemational Conference on Networks Security, Wireless Communications and Trusted Computing. [S. 1.]: IEEE Press, 2009 92-98. 被引量:1
7Bhattad K, Narayana K R. Weakly Secure Network Coding[EB/OL]. (2007-05-22). http://netcod.org.papers/06Bhattad N-final.pdf. 被引量:1
8Majid A, Huaping L. Secure Network Coding with Minimum Overhead Based on Hash Functions[J]. IEEE Communications Letters, 2009, 13(12): 956-958. 被引量:1