Detection and recovery from pollution attacks in coding-based distributed storage schemes L Buttyán, L Czap, I Vajda IEEE transactions on dependable and secure computing 8 (6), 824-838, 2011 | 37 | 2011 |
Secret message capacity of erasure broadcast channels with feedback L Czap, VM Prabhakaran, C Fragouli, S Diggavi Information Theory Workshop (ITW), 2011 IEEE, 65-69, 2011 | 30 | 2011 |
Broadcasting private messages securely L Czap, VM Prabhakaran, S Diggavi, C Fragouli Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on …, 2012 | 28 | 2012 |
Secure Network Coding with Erasures and Feedback L Czap, V Prabhakaran, S Diggavi, C Fragouli Allerton, 2013 | 25 | 2013 |
Secure Network Coding with Erasures and Feedback L Czap, V Prabhakaran, S Diggavi, C Fragouli Allerton, 2013 | 25 | 2013 |
Secret Communication over Broadcast Erasure Channels with State-feedback L Czap, VM Prabhakaran, C Fragouli, SN Diggavi IEEE Transactions on Information Theory 61 (9), 4788-4808, 2015 | 18 | 2015 |
Securing coding based distributed storage in wireless sensor networks L Buttyán, L Czap, I Vajda 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems …, 2008 | 18 | 2008 |
Creating Secrets Out of Packet Erasures I Safaka, L Czap, K Argyraki, C Fragouli IEEE Transactions on Information Forensics and Security 11 (6), 1177-1191, 2016 | 13 | 2016 |
Signatures for Multi-source Network Coding. L Czap, I Vajda IACR Cryptology ePrint Archive 2010, 328, 2010 | 11 | 2010 |
Triangle Network Secrecy L Czap, VM Prabhakaran, S Diggavi, C Fragouli IEEE International Symposium on Information Theory (ISIT), 2014 | 10 | 2014 |
Pollution Attack Defense for Coding Based Sensor Storage L Buttyán, L Czap, I Vajda Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), 2010 IEEE …, 2010 | 10 | 2010 |
Wireless Network Security: Building on Erasures C Fragouli, VM Prabhakaran, L Czap, SN Diggavi Proceedings of the IEEE 103 (10), 1826-1840, 2015 | 9 | 2015 |
Exploiting common randomness: A resource for network secrecy L Czap, VM Prabhakaran, S Diggavi, C Fragouli Information Theory Workshop (ITW), 2013 IEEE, 1-5, 2013 | 9 | 2013 |
LP formulations for secrecy over erasure networks with feedback A Papadopoulos, L Czap, C Fragouli International Symposium on Information Theory (ISIT), 2015 | 8 | 2015 |
Secret Message Capacity of a Line Network A Papadopoulos, L Czap, C Fragouli 52nd Annual Allerton Conference on Communication, Control, and Computing, 2014 | 7 | 2014 |
Towards Unconditional Tor-Like Anonymity I Safaka, L Czap, K Argyraki, C Fragouli The 2015 IEEE International Sumposium on Network Coding (NetCod)-Invited Paper, 2015 | 5 | 2015 |
Secure Network Coding in DTNs L Czap, I Vajda IEEE Communications Letters 15 (1), 28-30, 2011 | 5 | 2011 |
Securing broadcast against dishonest receivers L Czap, VM Prabhakaran, S Diggavi, C Fragouli 2013 International Symposium on Network Coding (NetCod), 1-6, 2013 | 3 | 2013 |
Secure Capacity Region for Erasure Broadcast Channels with Feedback L Czap, VM Prabhakaran, S Diggavi, C Fragouli Arxiv preprint arXiv:1110.5741, 2011 | 3 | 2011 |
Achievable secrecy in arbitrary erasure networks with feedback L Czap, A Papadopoulos, C Fragouli Signal and Information Processing (GlobalSIP), 2014 IEEE Global Conference …, 2014 | 2 | 2014 |