An Information-Theoretic Cryptanalysis of Network Coding - Is Protecting the Code Enough?

AuthID
P-004-5EW
4
Author(s)
Medard, M
Tipo de Documento
Proceedings Paper
Year published
2008
Publicado
in 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3
Páginas: 262-267 (6)
Conference
International Symposium on Information Theory and Its Applications, Date: DEC 07-10, 2008, Location: Auckland, NEW ZEALAND, Patrocinadores: Commemorat Org Japan World Exposit 70, Support Ctr Adv Telecommun Tech Res, REFEC
Indexing
Publication Identifiers
SCOPUS: 2-s2.0-77951134439
Wos: WOS:000273504800048
Export Publication Metadata
Citações
Oops! It looks like you don't have access to this content.

This section is restricted to uses with b-on access.



CORE Conference
No information about CORE Rank

During the preprocessing phase, only publications of type 'Proceedings Paper' or 'Proceedings' are automatically processed to identify their CORE Rank.

TIP: If your publication's CORE Rank is missing, you can contact with your institutional manager to have the correct ranking manually added to the record.

Journal Factors
Oops! It looks like you don't have access to this content.

This section is restricted to uses with b-on access.

Info
At this moment we don't have any links to full text documens.