@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20180828-142513016,
    title = "Proceedings of the 11th ACM International Systems and Storage Conference",
    chapter = "How to Best Share a Big Secret",
    year = "2018",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20180828-142513016",
    id = "record",
    isbn = "978-1-4503-5849-1",
    doi = "10.1145/3211890.3211896"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:20180606-110229670,
    title = "Single-Unicast Secure Network Coding and Network Error Correction are as Hard as Multiple-Unicast Network Coding",
    journal = "IEEE Transactions on Information Theory",
    year = "2018",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20180606-110229670",
    id = "record",
    issn = "0018-9448",
    doi = "10.1109/TIT.2018.2820686",
    volume = "64"
}


@other{https://resolver.caltech.edu/CaltechAUTHORS:20170713-092535943,
    title = "Generic Secure Repair for Distributed Storage",
    year = "2017",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20170713-092535943",
    id = "record",
    doi = "10.48550/arXiv.1706.00500"
}


@other{https://resolver.caltech.edu/CaltechAUTHORS:20191004-142514161,
    title = "Generic Secure Repair for Distributed Storage",
    year = "2017",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20191004-142514161",
    id = "record",
    doi = "10.48550/arXiv.1706.00500"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170816-153318334,
    title = "2017 IEEE International Symposium on Information Theory (ISIT)",
    chapter = "Secret sharing with optimal decoding and repair bandwidth",
    year = "2017",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20170816-153318334",
    id = "record",
    isbn = "978-1-5090-4096-4",
    doi = "10.1109/ISIT.2017.8006842"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170816-162125720,
    title = "2017 IEEE International Symposium on Information Theory (ISIT)",
    chapter = "Secure RAID schemes from EVENODD and STAR codes",
    year = "2017",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20170816-162125720",
    id = "record",
    isbn = "978-1-5090-4096-4",
    doi = "10.1109/ISIT.2017.8006600"
}


@other{https://resolver.caltech.edu/CaltechAUTHORS:20180709-102239656,
    title = "Secret Sharing with Optimal Decoding and Repair Bandwidth",
    year = "2017",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20180709-102239656",
    id = "record"
}


@other{https://resolver.caltech.edu/CaltechAUTHORS:20180709-101600551,
    title = "Secure RAID Schemes from EVENODD and STAR Codes",
    year = "2017",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20180709-101600551",
    id = "record"
}


@article{https://resolver.caltech.edu/CaltechAUTHORS:20161011-150403696,
    title = "Communication Efficient Secret Sharing",
    journal = "IEEE Transactions on Information Theory",
    year = "2016",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20161011-150403696",
    id = "record",
    issn = "0018-9448",
    doi = "10.1109/TIT.2016.2616144",
    volume = "62"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20160823-165433889,
    title = "2016 IEEE International Symposium on Information Theory (ISIT)",
    chapter = "Secure RAID Schemes for Distributed Storage",
    year = "2016",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20160823-165433889",
    id = "record",
    isbn = "978-1-5090-1806-2",
    doi = "10.1109/ISIT.2016.7541529"
}


@other{https://resolver.caltech.edu/CaltechAUTHORS:20160125-120110556,
    title = "Secure RAID Schemes for Distributed Storage",
    year = "2016",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20160125-120110556",
    id = "record",
    doi = "10.1109/ISIT.2016.7541529"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20151006-093456107,
    title = "2015 IEEE International Symposium on Information Theory",
    chapter = "Connecting multiple-unicast and network error correction: Reduction and unachievability",
    year = "2015",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20151006-093456107",
    id = "record",
    isbn = "978-1-4673-7704-1",
    doi = "10.1109/ISIT.2015.7282477"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20151012-142447290,
    chapter = "Rewriting Flash Memories by Message Passing",
    year = "2015",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20151012-142447290",
    id = "record",
    doi = "10.1109/ISIT.2015.7282534"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20151007-140543269,
    title = "2015 IEEE International Symposium on Information Theory",
    chapter = "Rateless and pollution-attack-resilient network coding",
    year = "2015",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20151007-140543269",
    id = "record",
    isbn = "978-1-4673-7704-1",
    doi = "10.1109/ISIT.2015.7282931"
}


@other{https://resolver.caltech.edu/CaltechAUTHORS:20150529-105023455,
    title = "Communication Efficient Secret Sharing",
    year = "2015",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20150529-105023455",
    id = "record",
    doi = "10.1109/TIT.2016.2616144"
}


@other{https://resolver.caltech.edu/CaltechAUTHORS:20150209-161244506,
    title = "Rewriting Flash Memories by Message Passing",
    year = "2015",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20150209-161244506",
    id = "record",
    doi = "10.48550/arXiv.1502.00189"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150203-103001898,
    title = "2014 52nd Annual Allerton Conference on Communication, Control, and Computing",
    chapter = "Single-source/sink network error correction is as hard as multiple-unicast",
    year = "2014",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20150203-103001898",
    id = "record",
    isbn = "978-1-4799-8009-3",
    doi = "10.1109/ALLERTON.2014.7028486"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150227-080252781,
    title = "2014 IEEE International Symposium on Information Theory (ISIT)",
    chapter = "Reverse Edge Cut-Set Bounds for Secure Network Coding",
    year = "2014",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20150227-080252781",
    id = "record",
    isbn = "978-1-4799-5186-4",
    doi = "10.1109/ISIT.2014.6874804"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150720-132416191,
    title = "IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)",
    chapter = "A novel channel aware stage ARQ in wide area Wireless Sensor Networks",
    year = "2014",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20150720-132416191",
    id = "record",
    isbn = "978-1-4799-2842-2",
    doi = "10.1109/ISSNIP.2014.6827595"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20131213-144743708,
    title = "Network Coding (NetCod) 2013",
    chapter = "On Secure Network Coding with Uniform Wiretap Sets",
    year = "2013",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20131213-144743708",
    id = "record",
    isbn = "978-1-4799-0821-9",
    doi = "10.1109/NetCod.2013.6570814"
}


@inbook{https://resolver.caltech.edu/CaltechAUTHORS:20131212-093836091,
    title = "Infocom, 2013 Proceedings",
    chapter = "Rateless Resilient Network Coding Against Byzantine Adversaries",
    year = "2013",
    url = "https://resolver.caltech.edu/CaltechAUTHORS:20131212-093836091",
    id = "record",
    isbn = "978-1-4673-5944-3",
    doi = "10.1109/INFCOM.2013.6566776"
}