Computer Science ›› 2020, Vol. 47 ›› Issue (2): 313-319.doi: 10.11896/jsjkx.181102161
• Information Security • Previous Articles
HONG Hai-cheng,CHEN Dan-wei
CLC Number:
[1]CHEN H C H,HU Y,LEE P P C,et al.NCCloud:A network-coding-based storage system in a cloud-of-clouds[J].IEEE Transactions on computers,2014,63(1):31-44. [2]LEONTIADIS I,CURTMOLA R.Secure Storage with Replication and Transparent Deduplication[C]∥Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy.ACM,2018:13-23. [3]SHAHABINEJAD M,ARDAKANI M,KHABBAZIAN M.An erasure code with reduced average locality for distributed sto-rage systems[C]∥2017 International Conference on Computing,Networking and Communications(ICNC).IEEE,2017:427-431. [4]GLIGOROSKI D,KRALEVSKA K,JENSEN R E,et al.Repair Duality with Locally Repairable and Locally Regenerating Codes[C]∥2017 IEEE 15th Intl Dependable,Autonomic and Secure Computing,15th Intl Conf on Pervasive Intelligence & Computing,3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech).IEEE,2017:979-984. [5]MAHAJAN J,BORKAR B S.Public Auditing for Regenerating Code Based Cloud Storage[C]∥International Conference on Science and Engineering for Sustainable Development.IEEE,2017:16-22. [6]WARAMBHE P,GODE S,MULE S.Privacy-Preserving and Public Auditing for Regenerating-Code-Based Cloud Storage Using Finger Print Authentication[C]∥International Conference on Communication & Electronic Information Engineering.IEEE,2017:153-166. [7]SURYAWANSHI M,KAMBLE A,HIREKHAN S,et al.Privacy-Preserving and Public Auditing for Regenerating-Code-Based Cloud Storage[C]∥International Conference on Communication &Electronic Information Engineering.IEEE,2018:763-769. [8]GURUSWAMI V,WOOTTERS M.Repairing reed-solomon codes[J].IEEE Transactions on Information Theory,2017,63(9):5684-5698. [9]JIANG S,MO F,LAU F C M,et al.Tree-Permutation-Matrix Based LDPC Codes[J].IEEE Transactions on Circuits and Sys-tems II:Express Briefs,2018,65(8):1019-1023. [10]KUMAR S,ROSNES E,I AMAT A G.Secure repairable fountain codes[J].IEEE Communications Letters,2016,20(8):1491-1494. [11]HAO J,LU Y B,LIU X J,et al.Survey for regenerating codes for distributed Storage[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2013,25(1):30-38. [12]KADHE S,SPRINTSON A.Universally weakly secure coset coding schemes for minimum storage regenerating (MSR) codes[C]∥2017 55th Annual Allerton Conference on Communication,Control,and Computing (Allerton).IEEE,2017:25-30. [13]DAU S H,SONG W,YUEN C.On block security of regenerating codes at the MBR point for distributed storage systems[C]∥2014 IEEE International Symposium on Information Theory (ISIT).IEEE,2014:1967-1971. [14]EVANS D,NGUYEN-TUONG A,KNIGHT J.Effectiveness of moving target defenses[M]∥Moving Target Defense.New York:Springer,2011:29-48. [15]LEI C,ZHANG H Q,TAN J L,et al.Moving Target Defense Techniques:A Survey[J].Security and Communication Networks,2018(2):14-27. [16]CARVALHO M,FORD R.Moving-target defenses for computer networks[J].IEEE Security & Privacy,2014,12(2):73-76. [17]WANG S,ZHANG L,TANG C.A new dynamic address solution for moving target defense[C]∥Information Technology,Networking,Electronic and Automation Control Conference.IEEE,2016:1149-1152. [18]CHEN L,ZHANG J Z,TENG P G,et al.Random Binary Extensive Code:An Efficient Code for Distributed Storage System[J].Chinese Journal of Computers,2017,40(9):1980-1995. [19]CHEN Y,WANG L J,YAN X C,et al.Mimic storage scheme based on regenerated code [J].Journal on Communications,2018,39(4):21-34. |
[1] | GAO Chun-gang, WANG Yong-jie, XIONG Xin-li. MTDCD:A Hybrid Defense Mechanism Against Network Intrusion [J]. Computer Science, 2022, 49(7): 324-331. |
[2] | HAN Xiao-dong, GAO Fei, ZHANG Li-wei. Novel Real-time Algorithm for Critical Path of Linear Network Coding [J]. Computer Science, 2020, 47(9): 232-237. |
[3] | XU Guang-xian, CUI Jun-jie. Anti-eavesdropping Network Coding Based on Quantum GHZ State [J]. Computer Science, 2020, 47(7): 314-321. |
[4] | SONG Ying, ZHONG Xian, SUN Bao-lin, GUI Chao. Sliding Window-based Network Coding Cooperative Algorithm in MANET [J]. Computer Science, 2020, 47(11): 322-326. |
[5] | ZHANG Jin-hui, DENG Qian, LI Zhen-yu. Study on Application of Network Coding and Multipath Transmission in Internet Live Video Broadcasting [J]. Computer Science, 2019, 46(8): 171-177. |
[6] | JI Bao-feng, WANG Yi-dan, XING Bing-bing, LI Yu-qi, GAO Hong-feng, HAN Cong-cheng. Enhancement Method of Throughput in Ultra-dense Network Based on Hierarchical Multi-hop Physical Layer Network Coding [J]. Computer Science, 2019, 46(7): 56-60. |
[7] | CHEN Jie, XIE Xian-zhong, HUANG Qian, LI Jia. Network Coding TCP Protocol Based on Cross-layer Optimization in Wireless Vehicle Networks [J]. Computer Science, 2019, 46(2): 88-94. |
[8] | GUO Bin, YU Dan-dan, LU Wei, HUANG Ming-he, ZENG Ya-lin. Selective Network Coding Strategy Based on Packet Loss Prediction [J]. Computer Science, 2019, 46(11A): 399-404. |
[9] | HAN Li and QIAN Huan-yan. Opportunistic Routing Algorithm Combining Intra-session Coding and Inter-session Coding in Wireless Network [J]. Computer Science, 2018, 45(5): 69-74. |
[10] | LIU Yan-tao, LIU Heng. Cloud Storage System Based on Network Coding [J]. Computer Science, 2018, 45(12): 293-298. |
[11] | LU Ming-yue, GUO Dao-xing and NIU He-hao. New Physical Layer Network Coding Denoising Mapping Algorithm Based on MQAM [J]. Computer Science, 2017, 44(Z6): 284-287. |
[12] | XU Jing, LIU Yan-tao, XIA Gui-yang and Yasser MORGAN. Network Coding Based Topology Inference:A Survey [J]. Computer Science, 2016, 43(Z6): 242-248. |
[13] | TAO Wen, JIN Ling, BAI Guang-wei and SHEN Hang. Performance Model for Network-coding-aware Opportunistic Routing in Wireless Networks [J]. Computer Science, 2016, 43(9): 156-159. |
[14] | WANG Zhen-chao, CAI Zhi-jie and XUE Wen-ling. Opportunistic Routing Algorithm Based on Partial Network Coding for Wireless Networks [J]. Computer Science, 2016, 43(9): 152-155. |
[15] | WANG Zhen-chao, CAI Zhi-jie and XUE Wen-ling. Network Coding Based Energy-aware Routing Protocol for Ad Hoc Network [J]. Computer Science, 2016, 43(7): 106-110. |
|