{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2010:A6C57GXJEFTUQLHCA2VPNL4247","short_pith_number":"pith:A6C57GXJ","canonical_record":{"source":{"id":"1011.3879","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2010-11-17T04:00:06Z","cross_cats_sorted":["cs.IT","cs.NI","math.IT"],"title_canon_sha256":"502818c4110aef413cc5bd82fb79faae1d7367378f10117da329c2e72d42e100","abstract_canon_sha256":"3f34607089be1336671a8ec1b85f305f75a0eed7f1d42059bf1d4fffcab5b19e"},"schema_version":"1.0"},"canonical_sha256":"0785df9ae92167482ce206aaf6af9ae7e6bef55543c6843893f5d69c8189200d","source":{"kind":"arxiv","id":"1011.3879","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1011.3879","created_at":"2026-05-18T00:59:10Z"},{"alias_kind":"arxiv_version","alias_value":"1011.3879v1","created_at":"2026-05-18T00:59:10Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1011.3879","created_at":"2026-05-18T00:59:10Z"},{"alias_kind":"pith_short_12","alias_value":"A6C57GXJEFTU","created_at":"2026-05-18T12:26:05Z"},{"alias_kind":"pith_short_16","alias_value":"A6C57GXJEFTUQLHC","created_at":"2026-05-18T12:26:05Z"},{"alias_kind":"pith_short_8","alias_value":"A6C57GXJ","created_at":"2026-05-18T12:26:05Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2010:A6C57GXJEFTUQLHCA2VPNL4247","target":"record","payload":{"canonical_record":{"source":{"id":"1011.3879","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2010-11-17T04:00:06Z","cross_cats_sorted":["cs.IT","cs.NI","math.IT"],"title_canon_sha256":"502818c4110aef413cc5bd82fb79faae1d7367378f10117da329c2e72d42e100","abstract_canon_sha256":"3f34607089be1336671a8ec1b85f305f75a0eed7f1d42059bf1d4fffcab5b19e"},"schema_version":"1.0"},"canonical_sha256":"0785df9ae92167482ce206aaf6af9ae7e6bef55543c6843893f5d69c8189200d","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:59:10.638999Z","signature_b64":"7l5cu23IGVFP+cMjPHBwbAFsPeW/8WQdwt3nQz/KWzIVMlitGebrskUluwZvjxw2WXH68yI0VKvPJ79hJUaAAg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"0785df9ae92167482ce206aaf6af9ae7e6bef55543c6843893f5d69c8189200d","last_reissued_at":"2026-05-18T00:59:10.638348Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:59:10.638348Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1011.3879","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:59:10Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ubixFLQBtF3IDwymcO8Kb+7IFvIK2Ryna+yzBx3p4lwZziKI4rfLSUTLfgnPsBkJtU7x2BAPI8kGv9VtQUSOBA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:51:41.784675Z"},"content_sha256":"08a29922a0f4b4063559e3aaff59e8c2ba8e6a66587b14bd004289617bdb823a","schema_version":"1.0","event_id":"sha256:08a29922a0f4b4063559e3aaff59e8c2ba8e6a66587b14bd004289617bdb823a"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2010:A6C57GXJEFTUQLHCA2VPNL4247","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Algebraic Watchdog: Mitigating Misbehavior in Wireless Network Coding","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.IT","cs.NI","math.IT"],"primary_cat":"cs.CR","authors_text":"Joao Barros, MinJi Kim, Muriel Medard","submitted_at":"2010-11-17T04:00:06Z","abstract_excerpt":"We propose a secure scheme for wireless network coding, called the algebraic watchdog. By enabling nodes to detect malicious behaviors probabilistically and use overheard messages to police their downstream neighbors locally, the algebraic watchdog delivers a secure global self-checking network. Unlike traditional Byzantine detection protocols which are receiver-based, this protocol gives the senders an active role in checking the node downstream. The key idea is inspired by Marti et al.'s watchdog-pathrater, which attempts to detect and mitigate the effects of routing misbehavior.\n  As an ini"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1011.3879","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:59:10Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"8kSVt+5iBcK+/PW9DZdDqNayH9SZ2nQKaiePPVq4uBAvzB1reMkfsZz0UiT24HxqXNLcn07xlAo5xU08CHyUCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T22:51:41.785103Z"},"content_sha256":"76b213e788e9634530495c416efb6f1b2bc7acef3e019d96f349c8d7b7b2b476","schema_version":"1.0","event_id":"sha256:76b213e788e9634530495c416efb6f1b2bc7acef3e019d96f349c8d7b7b2b476"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/A6C57GXJEFTUQLHCA2VPNL4247/bundle.json","state_url":"https://pith.science/pith/A6C57GXJEFTUQLHCA2VPNL4247/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/A6C57GXJEFTUQLHCA2VPNL4247/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T22:51:41Z","links":{"resolver":"https://pith.science/pith/A6C57GXJEFTUQLHCA2VPNL4247","bundle":"https://pith.science/pith/A6C57GXJEFTUQLHCA2VPNL4247/bundle.json","state":"https://pith.science/pith/A6C57GXJEFTUQLHCA2VPNL4247/state.json","well_known_bundle":"https://pith.science/.well-known/pith/A6C57GXJEFTUQLHCA2VPNL4247/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2010:A6C57GXJEFTUQLHCA2VPNL4247","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"3f34607089be1336671a8ec1b85f305f75a0eed7f1d42059bf1d4fffcab5b19e","cross_cats_sorted":["cs.IT","cs.NI","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2010-11-17T04:00:06Z","title_canon_sha256":"502818c4110aef413cc5bd82fb79faae1d7367378f10117da329c2e72d42e100"},"schema_version":"1.0","source":{"id":"1011.3879","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1011.3879","created_at":"2026-05-18T00:59:10Z"},{"alias_kind":"arxiv_version","alias_value":"1011.3879v1","created_at":"2026-05-18T00:59:10Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1011.3879","created_at":"2026-05-18T00:59:10Z"},{"alias_kind":"pith_short_12","alias_value":"A6C57GXJEFTU","created_at":"2026-05-18T12:26:05Z"},{"alias_kind":"pith_short_16","alias_value":"A6C57GXJEFTUQLHC","created_at":"2026-05-18T12:26:05Z"},{"alias_kind":"pith_short_8","alias_value":"A6C57GXJ","created_at":"2026-05-18T12:26:05Z"}],"graph_snapshots":[{"event_id":"sha256:76b213e788e9634530495c416efb6f1b2bc7acef3e019d96f349c8d7b7b2b476","target":"graph","created_at":"2026-05-18T00:59:10Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"We propose a secure scheme for wireless network coding, called the algebraic watchdog. By enabling nodes to detect malicious behaviors probabilistically and use overheard messages to police their downstream neighbors locally, the algebraic watchdog delivers a secure global self-checking network. Unlike traditional Byzantine detection protocols which are receiver-based, this protocol gives the senders an active role in checking the node downstream. The key idea is inspired by Marti et al.'s watchdog-pathrater, which attempts to detect and mitigate the effects of routing misbehavior.\n  As an ini","authors_text":"Joao Barros, MinJi Kim, Muriel Medard","cross_cats":["cs.IT","cs.NI","math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2010-11-17T04:00:06Z","title":"Algebraic Watchdog: Mitigating Misbehavior in Wireless Network Coding"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1011.3879","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:08a29922a0f4b4063559e3aaff59e8c2ba8e6a66587b14bd004289617bdb823a","target":"record","created_at":"2026-05-18T00:59:10Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"3f34607089be1336671a8ec1b85f305f75a0eed7f1d42059bf1d4fffcab5b19e","cross_cats_sorted":["cs.IT","cs.NI","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2010-11-17T04:00:06Z","title_canon_sha256":"502818c4110aef413cc5bd82fb79faae1d7367378f10117da329c2e72d42e100"},"schema_version":"1.0","source":{"id":"1011.3879","kind":"arxiv","version":1}},"canonical_sha256":"0785df9ae92167482ce206aaf6af9ae7e6bef55543c6843893f5d69c8189200d","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"0785df9ae92167482ce206aaf6af9ae7e6bef55543c6843893f5d69c8189200d","first_computed_at":"2026-05-18T00:59:10.638348Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:59:10.638348Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"7l5cu23IGVFP+cMjPHBwbAFsPeW/8WQdwt3nQz/KWzIVMlitGebrskUluwZvjxw2WXH68yI0VKvPJ79hJUaAAg==","signature_status":"signed_v1","signed_at":"2026-05-18T00:59:10.638999Z","signed_message":"canonical_sha256_bytes"},"source_id":"1011.3879","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:08a29922a0f4b4063559e3aaff59e8c2ba8e6a66587b14bd004289617bdb823a","sha256:76b213e788e9634530495c416efb6f1b2bc7acef3e019d96f349c8d7b7b2b476"],"state_sha256":"f5f8293d590b30920662d68d3a1ed3ba9291567eef48478956feea34a7855cbd"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"gzgKkclKGmfT8G2wHELaScRlaWrjRIbTvjXiHqT34/YAXvv2GuJh3TjYGgplX5Xldi4Q1NnfoV910qLp7j0sAw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T22:51:41.788474Z","bundle_sha256":"d55de24429983319877945cfeb59f7dfcd5127526f3ac5d95178d76e66858c70"}}