@inproceedings{5388629043254c31a8a9bbcdaf3fafa5,
title = "Brief Announcment: Corruption Resilient Fountain Codes",
abstract = "A new aspect for erasure coding is considered, namely, the possibility that some portion of the arriving packets are corrupted in an undetectable fashion. In practice, the corrupted packets may be attributed to a portion of the communication paths that are leading to the receiver and are controlled by an adversary. Alternatively, in case packets are collected from several sources, the corruption may be attributed to a portion of the sources that are malicious.",
author = "Shlomi Dolev and Nir Tzachar",
year = "2008",
month = sep,
doi = "10.1007/978-3-540-87779-0_37",
language = "English",
isbn = "9783540877783",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "502--503",
editor = "Gadi Taubenfeld",
booktitle = "Distributed Computing",
address = "Germany",
}