[1]
T Ho, B Leong, R Koetter, et.Byzantine modification detection in multicast networks using randomized network coding [C] . The 2004 IEEE Int'l Symp on Information Theory (ISIT'04), Chicago, IL, USA, (2004).
DOI: 10.1109/isit.2004.1365180
Google Scholar
[2]
C Fragouli, J-Y L Boudec, J Widmer . Network coding: An instant primer[J] . ACM SIGCOMM Computer Communication Review 2006, 36(1): 63-68.
DOI: 10.1145/1111322.1111337
Google Scholar
[3]
P A Chou, Y N Wu, K Jain . Practical network coding[c] . The 4lst Annual Allerton Confon Communication, Control, and Computing, Monticello, IL, (2003).
Google Scholar
[4]
C Fragouli, E Soljanin. Decentralized network coding [C] . IEEE Information Theory Workshop, San A, ntonio Texas, (2004).
Google Scholar
[5]
Ahlswede R, Cai N, et al. Network information flow. IEEE Trans on Information Theory, 2000, 46(4).
Google Scholar
[6]
Li S Y R, Yeung R W, Cai N. Linear network coding[ J ]. IEEE Transaction on Information Theory, 2003, 49 (2) : 371 - 381.
DOI: 10.1109/tit.2002.807285
Google Scholar
[7]
R Koetter, M Medard. Beyond routing: An algebraic approach to network coding[C]. The 21st Annual Joint Conf of the IEEE Co imputer and Communications Societies (INF0COM 2002), New York, (2002).
DOI: 10.1109/infcom.2002.1019253
Google Scholar
[8]
S Jaggi, P Sanders, P A Chou, et a1. Polynomial time algorithms for multicast network code construction[J].IEEE Trans on Information Theory, 2005, 51(6):1973—(1982).
DOI: 10.1109/tit.2005.847712
Google Scholar
[9]
Philip C, YunnanW, Kamal J. Network coding for the Internet[C]∥IEEE Communication Theory Workshop. Cap ri, (2004).
Google Scholar
[10]
A G Dimakis, P B Godfrey, M Wainwright, et a1. Network coding for distributed storage systems[C], The 26th Annual IEEE Conf on Computer Communications(INFOCOM 2007), Anchorage, AK, USA, (2007).
DOI: 10.1109/infcom.2007.232
Google Scholar
[11]
R K Ahuja, T L Magnanti, J B Orlin. Network Flows: Theory, Algorithms, and Applications[M].Englewood Cliffs, NJ: Prentice Hall, l993.
Google Scholar
[12]
[Ho T, Leong B, Koetter R, et a1. Byzantine modification detection in multicast networks using randomized network coding} IEEE International Symposium on Information Theory (ISIT2004). June (2004).
DOI: 10.1109/isit.2004.1365180
Google Scholar