1. Krohn M, Freedman M, Mazieres D. On-the-fly verification of rateless erasure codes for efficient content distribution [C]//Proceedings-2004 IEEE Symposium on Security and Privacy. Berkeley: IEEE Computer Society, 2004: 226–239.
2. Charles D, Jain K, Lauter K. Signatures for network coding [C]// 2006 40th Annual Conference on Information Sciences and Systems. Princeton: Institute of Electrical and Electronics Engineers Inc, 2007: 857–863.
3. Zhao F, Kalker T, Medard M, et al. Signatures for content distribution with network coding [C]// Proceedings 2007 IEEE International Symposium on Information Theory. Paris: Institute of Electrical and Electronics Engineers Inc, 2007: 556–560.
4. Li Qiming, Chiu Dahming, Lui John C S. On the practical and security issues of batch content distribution via network coding [C]// 14th IEEE International Conference on Network Protocols. Santa Barbara: IEEE Computer Society, 2006: 158–167.
5. Yu Z, Wei Y, Ramkumar B, et al. An efficient scheme for securing xor network coding against pollution attacks[C]// 28th Conference on Computer Communications. Rio de Janeiro: Institute of Electrical and Electronics Engineers Inc, 2009: 406–414.