The following publications are possibly variants of this publication:
- Resilient network codes in the presence of eavesdropping Byzantine adversariesSidharth Jaggi, Michael Langberg. isit 2007: 541-545 [doi]
- Resilient Network Coding in the Presence of Byzantine AdversariesSidharth Jaggi, Michael Langberg, Sachin Katti, Tracey Ho, Dina Katabi, Muriel Médard. infocom 2007: 616-624 [doi]
- Resilient Network Coding in the Presence of Byzantine AdversariesSidharth Jaggi, Michael Langberg, Sachin Katti, Tracey Ho, Dina Katabi, Muriel Médard, Michelle Effros. TIT, 54(6):2596-2603, 2008. [doi]
- Rateless and pollution-attack-resilient network codingWentao Huang, Ting Wang, Xin Hu, Jiyong Jang, Theodoros Salonidis. isit 2015: 2623-2627 [doi]