@other{https://resolver.caltech.edu/CaltechAUTHORS:20191004-142514161, title = "Generic Secure Repair for Distributed Storage", url = "https://resolver.caltech.edu/CaltechAUTHORS:20191004-142514161", id = "record", doi = "10.48550/arXiv.1706.00500" } @other{https://resolver.caltech.edu/CaltechAUTHORS:20180709-101600551, title = "Secure RAID Schemes from EVENODD and STAR Codes", url = "https://resolver.caltech.edu/CaltechAUTHORS:20180709-101600551", id = "record" } @other{https://resolver.caltech.edu/CaltechAUTHORS:20180709-102239656, title = "Secret Sharing with Optimal Decoding and Repair Bandwidth", url = "https://resolver.caltech.edu/CaltechAUTHORS:20180709-102239656", id = "record" } @article{https://resolver.caltech.edu/CaltechAUTHORS:20180606-110229670, title = "Single-Unicast Secure Network Coding and Network Error Correction are as Hard as Multiple-Unicast Network Coding", journal = "IEEE Transactions on Information Theory", url = "https://resolver.caltech.edu/CaltechAUTHORS:20180606-110229670", id = "record", issn = "0018-9448", doi = "10.1109/TIT.2018.2820686", volume = "64" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20180828-142513016, title = "Proceedings of the 11th ACM International Systems and Storage Conference", chapter = "How to Best Share a Big Secret", url = "https://resolver.caltech.edu/CaltechAUTHORS:20180828-142513016", id = "record", isbn = "978-1-4503-5849-1", doi = "10.1145/3211890.3211896" } @other{https://resolver.caltech.edu/CaltechAUTHORS:20170713-092535943, title = "Generic Secure Repair for Distributed Storage", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170713-092535943", id = "record", doi = "10.48550/arXiv.1706.00500" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170816-162125720, title = "2017 IEEE International Symposium on Information Theory (ISIT)", chapter = "Secure RAID schemes from EVENODD and STAR codes", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170816-162125720", id = "record", isbn = "978-1-5090-4096-4", doi = "10.1109/ISIT.2017.8006600" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20170816-153318334, title = "2017 IEEE International Symposium on Information Theory (ISIT)", chapter = "Secret sharing with optimal decoding and repair bandwidth", url = "https://resolver.caltech.edu/CaltechAUTHORS:20170816-153318334", id = "record", isbn = "978-1-5090-4096-4", doi = "10.1109/ISIT.2017.8006842" } @article{https://resolver.caltech.edu/CaltechAUTHORS:20161011-150403696, title = "Communication Efficient Secret Sharing", journal = "IEEE Transactions on Information Theory", url = "https://resolver.caltech.edu/CaltechAUTHORS:20161011-150403696", id = "record", issn = "0018-9448", doi = "10.1109/TIT.2016.2616144", volume = "62" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20160823-165433889, title = "2016 IEEE International Symposium on Information Theory (ISIT)", chapter = "Secure RAID Schemes for Distributed Storage", url = "https://resolver.caltech.edu/CaltechAUTHORS:20160823-165433889", id = "record", isbn = "978-1-5090-1806-2", doi = "10.1109/ISIT.2016.7541529" } @other{https://resolver.caltech.edu/CaltechAUTHORS:20160125-120110556, title = "Secure RAID Schemes for Distributed Storage", url = "https://resolver.caltech.edu/CaltechAUTHORS:20160125-120110556", id = "record", doi = "10.1109/ISIT.2016.7541529" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20151007-140543269, title = "2015 IEEE International Symposium on Information Theory", chapter = "Rateless and pollution-attack-resilient network coding", url = "https://resolver.caltech.edu/CaltechAUTHORS:20151007-140543269", id = "record", isbn = "978-1-4673-7704-1", doi = "10.1109/ISIT.2015.7282931" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20151012-142447290, chapter = "Rewriting Flash Memories by Message Passing", url = "https://resolver.caltech.edu/CaltechAUTHORS:20151012-142447290", id = "record", doi = "10.1109/ISIT.2015.7282534" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20151006-093456107, title = "2015 IEEE International Symposium on Information Theory", chapter = "Connecting multiple-unicast and network error correction: Reduction and unachievability", url = "https://resolver.caltech.edu/CaltechAUTHORS:20151006-093456107", id = "record", isbn = "978-1-4673-7704-1", doi = "10.1109/ISIT.2015.7282477" } @other{https://resolver.caltech.edu/CaltechAUTHORS:20150529-105023455, title = "Communication Efficient Secret Sharing", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150529-105023455", id = "record", doi = "10.1109/TIT.2016.2616144" } @other{https://resolver.caltech.edu/CaltechAUTHORS:20150209-161244506, title = "Rewriting Flash Memories by Message Passing", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150209-161244506", id = "record", doi = "10.48550/arXiv.1502.00189" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150203-103001898, title = "2014 52nd Annual Allerton Conference on Communication, Control, and Computing", chapter = "Single-source/sink network error correction is as hard as multiple-unicast", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150203-103001898", id = "record", isbn = "978-1-4799-8009-3", doi = "10.1109/ALLERTON.2014.7028486" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150227-080252781, title = "2014 IEEE International Symposium on Information Theory (ISIT)", chapter = "Reverse Edge Cut-Set Bounds for Secure Network Coding", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150227-080252781", id = "record", isbn = "978-1-4799-5186-4", doi = "10.1109/ISIT.2014.6874804" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20150720-132416191, title = "IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)", chapter = "A novel channel aware stage ARQ in wide area Wireless Sensor Networks", url = "https://resolver.caltech.edu/CaltechAUTHORS:20150720-132416191", id = "record", isbn = "978-1-4799-2842-2", doi = "10.1109/ISSNIP.2014.6827595" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20131213-144743708, title = "Network Coding (NetCod) 2013", chapter = "On Secure Network Coding with Uniform Wiretap Sets", url = "https://resolver.caltech.edu/CaltechAUTHORS:20131213-144743708", id = "record", isbn = "978-1-4799-0821-9", doi = "10.1109/NetCod.2013.6570814" } @inbook{https://resolver.caltech.edu/CaltechAUTHORS:20131212-093836091, title = "Infocom, 2013 Proceedings", chapter = "Rateless Resilient Network Coding Against Byzantine Adversaries", url = "https://resolver.caltech.edu/CaltechAUTHORS:20131212-093836091", id = "record", isbn = "978-1-4673-5944-3", doi = "10.1109/INFCOM.2013.6566776" }