11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BIBLIOGRAPHY 121<br />

[21] F.A. Hayek, “Competition as A Discovery Procedure,” Quarterly journal of Austrian<br />

economics, vol. 5, iss. 3, pp. 9-24, Sep. 2002.<br />

[22] G.A. Spanos <strong>and</strong> T.B. Maples, “Performance Study of a Selective Encryption Scheme<br />

for the Security of <strong>Network</strong>ed Real-time Video,” Int. Conf. Computer <strong>and</strong> Communications,<br />

Las Vegas, 1995.<br />

[23] H. Schwarz, D. Marpe, <strong>and</strong> T. Wieg<strong>and</strong>, “Overview of the Scalable Video <strong>Coding</strong><br />

Extension of the H.264/AVC St<strong>and</strong>ard,” IEEE Trans. Circuits <strong>and</strong> Systems for Video<br />

Technology, vol. 17, no. 9, pp. 1103-1120, Sep. 2007.<br />

[24] H. von Stackelberg, Marktform und Gleichgewicht, Springer-Verlag, Berlin, 1934.<br />

[25] http://personal.ie.cuhk.edu.hk/ITIP/ISIT02/secure.ps<br />

[26] I.A. Glover <strong>and</strong> P.M. Grant, Digital Communications, Prentice Hall, 2004.<br />

[27] I. Agi <strong>and</strong> L. Gong, “An Empirical Study of Secure MPEG Video Transmissions,”<br />

ISOC Symp. <strong>Network</strong> <strong>and</strong> Distributed System Security, San Diego, 1996.<br />

[28] J.F. Nash, Jr., “The Bargaining Problem” Econometrica, vol. 18, no. 2, pp. 155-162,<br />

Apr. 1950.<br />

[29] J. Feldman, T. Malkin, R.A. Servedio, <strong>and</strong> C. Stein, “On the Capacity of Secure<br />

<strong>Network</strong> <strong>Coding</strong>,” Proc. 42nd Annual Allerton Conf. Communication, Control, <strong>and</strong><br />

Computing, Sep. 2004.<br />

[30] J.G. Proakis, Digital Communications, McGraw-Hill, Boston, 2001.<br />

[31] J.L. Massey, “An Introduction to Contemporary Cryptology,” Proceedings of the<br />

IEEE, vol. 76, no. 5, May 1998.<br />

[32] J. Meyer <strong>and</strong> F. Gadegast, “Security Mechanisms for Multimedia Data with the<br />

Example MPEG-1 Video,” SECMPEG Project Report, 1995.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!