Byzantine Modification Detection in Multicast Networks With Random Network Coding

An information-theoretic approach for detecting Byzantine or adversarial modifications in networks employing random linear network coding is described. Each exogenous source packet is augmented with a flexible number of hash symbols that are obtained as a polynomial function of the data symbols. Thi...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on information theory Vol. 54; no. 6; pp. 2798 - 2803
Main Authors: Tracey Ho, Ben Leong, Koetter, R., Medard, M., Effros, M., Karger, D.R.
Format: Journal Article
Language:English
Published: New York IEEE 01.06.2008
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
ISSN:0018-9448, 1557-9654
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first