Author:
Kralevska Katina,Gligoroski Danilo,Øverby Harald
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Ahlswede, R., Cai, N., Li, S.Y.R., Yeung, R.W.: Network information flow. IEEE Transactions on Information Theory 46, 1204–1216 (2000)
2. Bhattad, K., Narayanan, K.R.: Weakly secure network coding. In: Proc. First Workshop on Network Coding, Theory, and Applications, NetCod (2005)
3. Colbourn, C.J., Dinitz, J.H.: Handbook of Combinatorial Designs. Chapman, Hall/CRC (2006)
4. Colbourn, C.J., Dinitz, J.H., Stinson, D.R.: Applications of combinatorial designs to communications, cryptography, and networking (1999)
5. Hall, P.: On representatives of subsets. J. London Math. Soc. 37, 26–30 (1935)