6JAGGI S,LANGBERG M,KATTI S,et al.ResilientNetwork Coding in the Presence of ByzantineAdversaries[C].USA:IEEE,2007:616-624.
7KROHN M N,FREEDMAN MJ,MAZI’ERES D.On-the-flyVerification of Rateless Erasure Codes forEfficient Content Distribution[J].IEEE Symp.Security and Privacy,2004(05):226-240.
8CAI N,YEUNG R W.Secure Network Coding[C].USA:IEEE Computer Society,2002:323.
9FELDMAN J,MALKIN T,STEIN C,et al.On the Capacityof Secure Network Coding[EB/OL].(2004-09-29)[2011-07-05].http://www.cs.columbia.edu/~rocco/papers/allerton04.html.
10JAIN K.Security based on Network Topology Againstthe Wiretapping Attack[J].IEEE WirelessCommunications,2004,11(01):68-71.