{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:25:47Z","timestamp":1729650347839,"version":"3.28.0"},"reference-count":50,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/trustcom.2014.35","type":"proceedings-article","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T14:37:37Z","timestamp":1421851057000},"page":"252-259","source":"Crossref","is-referenced-by-count":10,"title":["A Survey of Security Network Coding toward Various Attacks"],"prefix":"10.1109","author":[{"given":"Shixiong","family":"Yao","sequence":"first","affiliation":[]},{"given":"Jing","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ruiying","family":"Du","sequence":"additional","affiliation":[]},{"given":"Lan","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Chiheng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_12"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1145\/2184751.2184815"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2104"},{"key":"34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-44750-4_1","article-title":"MDx-mac and building fast macs from hash functions","author":"preneel","year":"1995","journal-title":"Advances in Cryptology-CRYPT0' 95"},{"key":"39","first-page":"1","article-title":"Orthogonal vector based network coding against pollution attacks in n-layer combination networks","author":"bin","year":"2010","journal-title":"2010 5th International ICST Conference on Communications and Networking in China (CHINACOM)"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061945"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.01.101682"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/NETCOD.2010.5487671"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2012.6275815"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514292"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062036"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.08.002"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.78"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.100607"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/NETCOD.2010.5487673"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ICICTA.2011.580"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.08.006"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.199"},{"key":"29","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/978-3-642-01957-9_18","article-title":"Homomorphic macs: Mac-based integrity for network coding","author":"agrawal","year":"2009","journal-title":"Applied Cryptography and Network Security"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.818197"},{"key":"2","first-page":"11","article-title":"On randomized network coding","volume":"41","author":"ho","year":"2003","journal-title":"Proceedings of the Annual Allerton Conference on Communication Control and Computing"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.111412.112124"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.32"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.252"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCom.2013.6719757"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1767"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6562851"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301326"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120229"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.122212.120196"},{"key":"19","first-page":"323","article-title":"Secure network coding","author":"cai","year":"2002","journal-title":"2002 IEEE International Symposium on Information Theory 2002 Proceedings"},{"key":"17","first-page":"5","article-title":"Cooperative security for network coding file distribution","volume":"3","author":"christos","year":"2006","journal-title":"INFOCOM"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2011.146"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282400"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.923722"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567041"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566775"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.6658242"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2236912"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.SUP.0513026"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185473"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2090197"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.27"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462050"},{"key":"44","article-title":"Weakly secure network coding","author":"bhattad","year":"2005","journal-title":"NetCod"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4595044"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2012.6310906"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2204532"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4594971"}],"event":{"name":"2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2014,9,24]]},"location":"Beijing, China","end":{"date-parts":[[2014,9,26]]}},"container-title":["2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7008824\/7011202\/07011258.pdf?arnumber=7011258","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T00:03:43Z","timestamp":1498176223000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7011258\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2014.35","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}