@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20180828-142513016,
    title = "Proceedings of the 11th ACM International Systems and Storage Conference",
    chapter = "How to Best Share a Big Secret",
    year = "2018",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20180828-142513016",
    id = "record",
    isbn = "978-1-4503-5849-1",
    doi = "10.1145/3211890.3211896"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170816-162125720,
    title = "2017 IEEE International Symposium on Information Theory (ISIT)",
    chapter = "Secure RAID schemes from EVENODD and STAR codes",
    year = "2017",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20170816-162125720",
    id = "record",
    isbn = "978-1-5090-4096-4",
    doi = "10.1109/ISIT.2017.8006600"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170816-153318334,
    title = "2017 IEEE International Symposium on Information Theory (ISIT)",
    chapter = "Secret sharing with optimal decoding and repair bandwidth",
    year = "2017",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20170816-153318334",
    id = "record",
    isbn = "978-1-5090-4096-4",
    doi = "10.1109/ISIT.2017.8006842"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20160823-165433889,
    title = "2016 IEEE International Symposium on Information Theory (ISIT)",
    chapter = "Secure RAID Schemes for Distributed Storage",
    year = "2016",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20160823-165433889",
    id = "record",
    isbn = "978-1-5090-1806-2",
    doi = "10.1109/ISIT.2016.7541529"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20151012-142447290,
    chapter = "Rewriting Flash Memories by Message Passing",
    year = "2015",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20151012-142447290",
    id = "record",
    doi = "10.1109/ISIT.2015.7282534"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20151006-093456107,
    title = "2015 IEEE International Symposium on Information Theory",
    chapter = "Connecting multiple-unicast and network error correction: Reduction and unachievability",
    year = "2015",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20151006-093456107",
    id = "record",
    isbn = "978-1-4673-7704-1",
    doi = "10.1109/ISIT.2015.7282477"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20151007-140543269,
    title = "2015 IEEE International Symposium on Information Theory",
    chapter = "Rateless and pollution-attack-resilient network coding",
    year = "2015",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20151007-140543269",
    id = "record",
    isbn = "978-1-4673-7704-1",
    doi = "10.1109/ISIT.2015.7282931"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150203-103001898,
    title = "2014 52nd Annual Allerton Conference on Communication, Control, and Computing",
    chapter = "Single-source/sink network error correction is as hard as multiple-unicast",
    year = "2014",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20150203-103001898",
    id = "record",
    isbn = "978-1-4799-8009-3",
    doi = "10.1109/ALLERTON.2014.7028486"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150227-080252781,
    title = "2014 IEEE International Symposium on Information Theory (ISIT)",
    chapter = "Reverse Edge Cut-Set Bounds for Secure Network Coding",
    year = "2014",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20150227-080252781",
    id = "record",
    isbn = "978-1-4799-5186-4",
    doi = "10.1109/ISIT.2014.6874804"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150720-132416191,
    title = "IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)",
    chapter = "A novel channel aware stage ARQ in wide area Wireless Sensor Networks",
    year = "2014",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20150720-132416191",
    id = "record",
    isbn = "978-1-4799-2842-2",
    doi = "10.1109/ISSNIP.2014.6827595"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20131213-144743708,
    title = "Network Coding (NetCod) 2013",
    chapter = "On Secure Network Coding with Uniform Wiretap Sets",
    year = "2013",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20131213-144743708",
    id = "record",
    isbn = "978-1-4799-0821-9",
    doi = "10.1109/NetCod.2013.6570814"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20131212-093836091,
    title = "Infocom, 2013 Proceedings",
    chapter = "Rateless Resilient Network Coding Against Byzantine Adversaries",
    year = "2013",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20131212-093836091",
    id = "record",
    isbn = "978-1-4673-5944-3",
    doi = "10.1109/INFCOM.2013.6566776"
}