4Ahlswede R, Cai Ning, Li Shuo-Yen, et al. Network Information Flow[J]. IEEE Transactions on Information Theory, 2000, 46(4): 1204-1216.
5Li Shuo-Yen, Yeung R W, Cai Ning. Linear Network Coding[J]. IEEE Transactions on Information Theory, 2003, 49(2): 371-381.
6Deb S, Ho E T. Network Coding for Wireless Applications: A Brief Tutorial[C]//Proceedings of International Workshop on Wireless Ad-hoc Networks. London, UK: [s. n.], 2005.
7Ho T, Leong B, Koetter R. Byzantine Modification Detection in Multicast Networks with Random Network Coding[J]. IEEE Transactions on Information Theory, 2008, 54(6): 2798-2830.
8Cai Ning, Yeung R W. Secure Network Coding[C]//Proceedings of IEEE International Symposium on Information Theory. [S. 1.]: IEEE Press, 2002.
9Zhang Yan, Xu Chengqi, Wang Feng. A Novel Scheme for Secure Network Coding Using One-time Pad[C]//Proceedings of Intemational Conference on Networks Security, Wireless Communications and Trusted Computing. [S. 1.]: IEEE Press, 2009 92-98.
10Bhattad K, Narayana K R. Weakly Secure Network Coding[EB/OL]. (2007-05-22). http://netcod.org.papers/06Bhattad N-final.pdf.