Special Issue Paper
Strategies of network coding against nodes conspiracy attack
Version of Record online: 29 MAY 2013
Copyright © 2013 John Wiley & Sons, Ltd.
Security and Communication Networks
Special Issue: Security in Big Data
Volume 8, Issue 14, pages 2396–2403, 25 September 2015
How to Cite
2015) Strategies of network coding against nodes conspiracy attack. Security Comm. Networks, 8: 2396–2403. doi: 10.1002/sec.753., , , and (
- Issue online: 17 AUG 2015
- Version of Record online: 29 MAY 2013
- National Science Foundation of China. Grant Numbers: 61071152, 60702043, 2010CB731403, 2010CB731406, 2012BAH38 B04
- 973 Program of China
- National “Twelfth Five-Year” Plan for Science and Technology Support
Options for accessing this content:
- If you are a society or association member and require assistance with obtaining online access instructions please contact our Journal Customer Services team.
- Login via other institutional login options http://onlinelibrary.wiley.com/login-options.
Login via OpenAthens
Search for your institution's name below to login via Shibboleth.
Registered Users please login:
- Access your saved publications, articles and searches
- Manage your email alerts, orders and subscriptions
- Change your contact information, including your password
Please register to:
- Save publications, articles and searches
- Get email alerts
- Get all the benefits mentioned below!