Cited By
View all- Lawrence TLi FAli IHaruna CKpiebaareh MChristopher T(2022)A computationally efficient HMAC-based authentication scheme for network codingTelecommunications Systems10.1007/s11235-021-00842-679:1(47-69)Online publication date: 1-Jan-2022
- Sassatelli LMédard MHamdan HToral-Cruz HAkleylek SMcheick HBoubiche D(2017)Thwarting pollution attacks in network coding for delay tolerant mobile social networksProceedings of the Second International Conference on Internet of things, Data and Cloud Computing10.1145/3018896.3018960(1-7)Online publication date: 22-Mar-2017
- Esfahani AMantas GRodriguez JNeves J(2017)An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networksInternational Journal of Information Security10.1007/s10207-016-0351-z16:6(627-639)Online publication date: 1-Nov-2017
- Show More Cited By