Brief Announcment: Corruption Resilient Fountain Codes

Shlomi Dolev, Nir Tzachar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

A new aspect for erasure coding is considered, namely, the possibility that some portion of the arriving packets are corrupted in an undetectable fashion. In practice, the corrupted packets may be attributed to a portion of the communication paths that are leading to the receiver and are controlled by an adversary. Alternatively, in case packets are collected from several sources, the corruption may be attributed to a portion of the sources that are malicious.
Original languageEnglish
Title of host publicationDistributed Computing, 22nd International Symposium, DISC 2008, Arcachon, France, September 22-24, 2008. Proceedings
EditorsGadi Taubenfeld
PublisherSpringer
Pages502-503
Number of pages2
Volume5218
DOIs
StatePublished - 2008

Publication series

NameLecture Notes in Computer Science
PublisherSpringer

Fingerprint

Dive into the research topics of 'Brief Announcment: Corruption Resilient Fountain Codes'. Together they form a unique fingerprint.

Cite this