ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
33
views
16
references
Top references
cited by
28
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,900
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Public Key Cryptography – PKC 2009
Signing a Linear Subspace: Signature Schemes for Network Coding
other
Author(s):
Dan Boneh
,
David Freeman
,
Jonathan Katz
,
Brent Waters
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Exponential Random Graph Models
Most cited references
16
Record
: found
Abstract
: not found
Article
: not found
Network information flow
R. Ahlswede
,
Ning Cai
,
S.-Y.R. Li
…
(2000)
0
comments
Cited
785
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Linear network coding
S.-Y.R. Li
,
R.W. Yeung
,
Ning Cai
(2003)
0
comments
Cited
329
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
A Random Linear Network Coding Approach to Multicast
Binh Ho
,
M Medard
,
R. Koetter
…
(2006)
0
comments
Cited
314
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 68-87
DOI:
10.1007/978-3-642-00468-1_5
SO-VID:
23f48627-a501-44a9-8ce0-79cdd7557452
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 425
An Algebraic Surface Cryptosystem
pp. 68
Signing a Linear Subspace: Signature Schemes for Network Coding
pp. 196
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data
pp. 256
Removing Escrow from Identity-Based Encryption
pp. 317
Security of Sanitizable Signatures Revisited
pp. 357
CCA-Secure Proxy Re-encryption without Pairings
pp. 463
Revocable Group Signature Schemes with Constant Costs for Signing and Verifying
pp. 481
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
pp. 501
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
Similar content
2,900
Adaptive Double Subspace Signal Detection in Gaussian Background—Part II: Partially Homogeneous Environments
Authors:
Weijian Liu
,
Wenchong Xie
,
Jun Liu
…
PETRELS: Parallel Subspace Estimation and Tracking by Recursive Least Squares From Partial Observations
Authors:
Yuejie Chi
,
Yonina C. Eldar
,
Robert CALDERBANK
…
Operational Modal Analysis of Y25 Bogie via Stochastic Subspace Identification for the Condition Monitoring of Primary Suspension Systems
Authors:
Fulong Liu
,
Jiongqi Wang
,
Miaoshuo Li
…
See all similar
Cited by
28
An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain
Authors:
Wenbin Chen
,
Hongyang Yan
,
Jian Shen
…
A Short Linearly Homomorphic Proxy Signature Scheme
Authors:
Zhengan Huang
,
Wenbin Chen
,
Jian Shen
…
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
Authors:
Dan Boneh
,
David Freeman
See all cited by