@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20180828-142513016, title = "Proceedings of the 11th ACM International Systems and Storage Conference", chapter = "How to Best Share a Big Secret", url = "https://resolver.caltech.edu/CaltechAUTHORS:20180828-142513016", id = "record", isbn = "978-1-4503-5849-1", doi = "10.1145/3211890.3211896" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170816-162125720, title = "2017 IEEE International Symposium on Information Theory (ISIT)", chapter = "Secure RAID schemes from EVENODD and STAR codes", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170816-162125720", id = "record", isbn = "978-1-5090-4096-4", doi = "10.1109/ISIT.2017.8006600" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170816-153318334, title = "2017 IEEE International Symposium on Information Theory (ISIT)", chapter = "Secret sharing with optimal decoding and repair bandwidth", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170816-153318334", id = "record", isbn = "978-1-5090-4096-4", doi = "10.1109/ISIT.2017.8006842" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20160823-165433889, title = "2016 IEEE International Symposium on Information Theory (ISIT)", chapter = "Secure RAID Schemes for Distributed Storage", url = "https://resolver.caltech.edu/CaltechAUTHORS:20160823-165433889", id = "record", isbn = "978-1-5090-1806-2", doi = "10.1109/ISIT.2016.7541529" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20151012-142447290, chapter = "Rewriting Flash Memories by Message Passing", url = "https://resolver.caltech.edu/CaltechAUTHORS:20151012-142447290", id = "record", doi = "10.1109/ISIT.2015.7282534" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20151007-140543269, title = "2015 IEEE International Symposium on Information Theory", chapter = "Rateless and pollution-attack-resilient network coding", url = "https://resolver.caltech.edu/CaltechAUTHORS:20151007-140543269", id = "record", isbn = "978-1-4673-7704-1", doi = "10.1109/ISIT.2015.7282931" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20151006-093456107, title = "2015 IEEE International Symposium on Information Theory", chapter = "Connecting multiple-unicast and network error correction: Reduction and unachievability", url = "https://resolver.caltech.edu/CaltechAUTHORS:20151006-093456107", id = "record", isbn = "978-1-4673-7704-1", doi = "10.1109/ISIT.2015.7282477" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150203-103001898, title = "2014 52nd Annual Allerton Conference on Communication, Control, and Computing", chapter = "Single-source/sink network error correction is as hard as multiple-unicast", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150203-103001898", id = "record", isbn = "978-1-4799-8009-3", doi = "10.1109/ALLERTON.2014.7028486" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150227-080252781, title = "2014 IEEE International Symposium on Information Theory (ISIT)", chapter = "Reverse Edge Cut-Set Bounds for Secure Network Coding", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150227-080252781", id = "record", isbn = "978-1-4799-5186-4", doi = "10.1109/ISIT.2014.6874804" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150720-132416191, title = "IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)", chapter = "A novel channel aware stage ARQ in wide area Wireless Sensor Networks", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150720-132416191", id = "record", isbn = "978-1-4799-2842-2", doi = "10.1109/ISSNIP.2014.6827595" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20131213-144743708, title = "Network Coding (NetCod) 2013", chapter = "On Secure Network Coding with Uniform Wiretap Sets", url = "https://resolver.caltech.edu/CaltechAUTHORS:20131213-144743708", id = "record", isbn = "978-1-4799-0821-9", doi = "10.1109/NetCod.2013.6570814" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20131212-093836091, title = "Infocom, 2013 Proceedings", chapter = "Rateless Resilient Network Coding Against Byzantine Adversaries", url = "https://resolver.caltech.edu/CaltechAUTHORS:20131212-093836091", id = "record", isbn = "978-1-4673-5944-3", doi = "10.1109/INFCOM.2013.6566776" }