Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
39
views
16
references
Top references
cited by
28
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,645
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Public Key Cryptography – PKC 2009
Signing a Linear Subspace: Signature Schemes for Network Coding
other
Author(s):
Dan Boneh
,
David Freeman
,
Jonathan Katz
,
Brent Waters
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Exponential Random Graph Models
Most cited references
16
Record
: found
Abstract
: not found
Article
: not found
Network information flow
R. Ahlswede
,
Ning Cai
,
S.-Y.R. Li
…
(2000)
0
comments
Cited
786
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Linear network coding
S.-Y.R. Li
,
R.W. Yeung
,
Ning Cai
(2003)
0
comments
Cited
330
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
A Random Linear Network Coding Approach to Multicast
Binh Ho
,
M Medard
,
R. Koetter
…
(2006)
0
comments
Cited
314
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 68-87
DOI:
10.1007/978-3-642-00468-1_5
SO-VID:
23f48627-a501-44a9-8ce0-79cdd7557452
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 425
An Algebraic Surface Cryptosystem
pp. 68
Signing a Linear Subspace: Signature Schemes for Network Coding
pp. 196
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data
pp. 256
Removing Escrow from Identity-Based Encryption
pp. 317
Security of Sanitizable Signatures Revisited
pp. 357
CCA-Secure Proxy Re-encryption without Pairings
pp. 463
Revocable Group Signature Schemes with Constant Costs for Signing and Verifying
pp. 481
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
pp. 501
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
Similar content
1,645
Feature selection in independent component subspace for microarray data classification
Authors:
Chun-Hou Zheng
,
De-Shuang Huang
,
Li Shang
Distribution based truncation for variable selection in subspace methods for multivariate regression
Authors:
Kristian Liland
,
Martin Høy
,
Harald Martens
…
Krylov Cubic Regularized Newton: A Subspace Second-Order Method with Dimension-Free Convergence Rate
Authors:
Ruichen Jiang
,
Parameswaran Raman
,
Shoham Sabach
…
See all similar
Cited by
28
An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain
Authors:
Wenbin Chen
,
Hongyang Yan
,
Jian Shen
…
A Short Linearly Homomorphic Proxy Signature Scheme
Authors:
Zhengan Huang
,
Wenbin Chen
,
Jian Shen
…
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
Authors:
Dan Boneh
,
David Freeman
See all cited by