Back to Results
First PageMeta Content
Coding theory / Finite fields / Information / Cryptography / Network coding / Hash function / Hash list / Very smooth hash / Homomorphic signatures for network coding / Hashing / Cryptographic hash functions / Error detection and correction


1 On the Security and Efficiency of Content Distribution Via Network Coding Qiming Li∗ John C.S. Lui+
Add to Reading List

Document Date: 2011-05-19 23:15:34


Open Document

File Size: 251,79 KB

Share Result on Facebook

Company

C. Coefficients / D. Trade / S&P / Intel / Microsoft / /

Country

Singapore / /

/

Event

Reorganization / /

Facility

Chinese University of Hong Kong / /

IndustryTerm

parallel exponentiation algorithm / code construction algorithm / secure and efficient network / sparse random linear network / content distribution schemes using network / probabilistic algorithm / batch verification algorithm / verification algorithm / typical applications / random linear network / probabilistic polynomial-time algorithm / software patches / content distribution network / polynomial-time probabilistic algorithm / attack algorithm / linear network / Random network / acyclic synchronous networks / content distribution using random network / /

OperatingSystem

GNU / /

Organization

Institute for Infocomm Research / Crytography and Security Department / Chinese University of Hong Kong / Information Engineering Department / Security Department / Computer Science and Engineering Department / /

Person

Ming Chiu / John C.S. Lui / /

Position

Prime Minister / /

ProgrammingLanguage

C / C++ / /

Technology

alpha / code construction algorithm / cryptography / attack algorithm / batch verification algorithm / parallel exponentiation algorithm / encoding algorithm / polynomial-time probabilistic algorithm / 6 algorithm / verification algorithm / P2P / laptop computer / probabilistic polynomial-time algorithm / simulation / digital signature / probabilistic algorithm / two algorithms / /

SocialTag