Network information flow, IEEE Transactions on Information Theory, vol.46, issue.4, pp.1204-1216, 2000. ,
DOI : 10.1109/18.850663
Message authentication using hash functions: the HMAC construction, CryptoBytes, vol.2, issue.1, 1996. ,
Signing a Linear Subspace: Signature Schemes for Network Coding, ACM Intern. Conf. on Practice and Theory in Public Key Cryptography (PKC), pp.68-87, 2009. ,
DOI : 10.1109/ISIT.2007.4557283
URL : http://crypto.stanford.edu/~dabo/papers/netcode.pdf
Impact of Social Networks on Delay Tolerant Routing, GLOBECOM 2009, 2009 IEEE Global Telecommunications Conference, 2009. ,
DOI : 10.1109/GLOCOM.2009.5425860
Signatures for network coding, 40th Annual Conf. on Information Sciences and Systems (CISS), 2006. ,
DOI : 10.1504/ijicot.2009.024044
URL : http://eprint.iacr.org/2006/025.pdf
A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.41-47, 2002. ,
DOI : 10.1145/586110.586117
On the Capacity Region of MANET: Scheduling and Routing Strategy, IEEE Transactions on Vehicular Technology, vol.58, issue.4, pp.1930-1941, 2009. ,
DOI : 10.1109/TVT.2008.2004621
Byzantine Modification Detection in Multicast Networks With Random Network Coding, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2798-2803, 2006. ,
DOI : 10.1109/TIT.2008.921894
URL : https://authors.library.caltech.edu/11451/1/HOTieeetit08.pdf
Pocket switched networks and human mobility in conference environments, Proceeding of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking , WDTN '05, 2005. ,
DOI : 10.1145/1080139.1080142
URL : http://www.thlab.net/%7Echaintre/pub/hui05pocket.pdf
Resilient Network Coding in the Presence of Byzantine Adversaries, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2596-2603, 2008. ,
DOI : 10.1109/TIT.2008.921711
Power law and exponential decay of inter contact times between mobile devices, Proceedings of the 13th annual ACM international conference on Mobile computing and networking , MobiCom '07, 2007. ,
DOI : 10.1145/1287853.1287875
URL : http://reality.media.mit.edu/pdfs/Karagiannis07.pdf
Microcast: Cooperative video streaming on smartphones, ACM MobiSys, 2012. ,
On counteracting Byzantine attacks in network coded peer-to-peer networks, IEEE Journal on Selected Areas in Communications, vol.28, issue.5, pp.692-702, 2010. ,
DOI : 10.1109/JSAC.2010.100607
Coding for Errors and Erasures in Random Network Coding, IEEE Transactions on Information Theory, vol.54, issue.8, pp.3579-3591, 2008. ,
DOI : 10.1109/TIT.2008.926449
An algebraic approach to network coding, IEEE/ACM Transactions on Networking, vol.11, issue.5, pp.782-795, 2003. ,
DOI : 10.1109/TNET.2003.818197
URL : http://pdos.lcs.mit.edu/decouto/papers/koetter03.pdf
Efficient Network Coded Data Transmissions in Disruption Tolerant Networks, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, 2008. ,
DOI : 10.1109/INFOCOM.2008.210
Stochastic analysis of network coding in epidemic routing, IEEE Journal on Selected Areas in Communications, vol.26, issue.5, pp.794-808, 2008. ,
DOI : 10.1109/JSAC.2008.080606
DTN-Meteo: Forecasting the Performance of DTN Protocols Under Heterogeneous Mobility, IEEE/ACM Transactions on Networking, vol.23, issue.2, 2015. ,
DOI : 10.1109/TNET.2014.2301376
Going beyond pollution attacks: Forcing byzantine clients to code correctly, 2011. ,
Hashes and message digests, Lecture Notes, 2005. ,
On control of inter-session network coding in delay-tolerant mobile social networks, Proceedings of the 17th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems, MSWiM '14, 2014. ,
DOI : 10.1145/2641798.2641833
URL : https://hal.archives-ouvertes.fr/hal-01303542
Inter-Session Network Coding-Based Policies for Delay Tolerant Mobile Social Networks, IEEE Transactions on Wireless Communications, vol.15, issue.11, p.2016 ,
DOI : 10.1109/TWC.2016.2600664
URL : https://hal.archives-ouvertes.fr/hal-01351925
Efficient Routing in Intermittently Connected Mobile Networks: The Multiple-Copy Case, IEEE/ACM Transactions on Networking, vol.16, issue.1, pp.63-76, 2008. ,
DOI : 10.1109/TNET.2007.897964
Constricting the adversary: A broadcast transformation for network coding, Allerton Conference on Comm., Control, and Computing, 2007. ,
Network error correction, part I: Basic concepts and upper bounds, Comm. in Information and Systems, vol.6, 2006. ,
A socio-aware overlay for publish/subscribe communication in delay tolerant networks, Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems , MSWiM '07, 2007. ,
DOI : 10.1145/1298126.1298166
Signatures for Content Distribution with Network Coding, 2007 IEEE International Symposium on Information Theory, pp.556-560, 2007. ,
DOI : 10.1109/ISIT.2007.4557283
URL : http://www.mit.edu/~medard/papers08/security_for_NC_v3.pdf