R. Ahlswede, N. Cai, S. R. Li, and R. W. Yeung, Network information flow, IEEE Transactions on Information Theory, vol.46, issue.4, pp.1204-1216, 2000.
DOI : 10.1109/18.850663

M. Bellare, R. Canetti, and H. Krawczyk, Message authentication using hash functions: the HMAC construction, CryptoBytes, vol.2, issue.1, 1996.

D. Boneh, D. Freeman, J. Katz, and B. Waters, Signing a Linear Subspace: Signature Schemes for Network Coding, ACM Intern. Conf. on Practice and Theory in Public Key Cryptography (PKC), pp.68-87, 2009.
DOI : 10.1109/ISIT.2007.4557283

URL : http://crypto.stanford.edu/~dabo/papers/netcode.pdf

E. Bulut, W. Zijian, and B. Szymanski, Impact of Social Networks on Delay Tolerant Routing, GLOBECOM 2009, 2009 IEEE Global Telecommunications Conference, 2009.
DOI : 10.1109/GLOCOM.2009.5425860

D. Charles, K. Jain, and K. Lauter, Signatures for network coding, 40th Annual Conf. on Information Sciences and Systems (CISS), 2006.
DOI : 10.1504/ijicot.2009.024044

URL : http://eprint.iacr.org/2006/025.pdf

L. Eschenauer and V. D. Gligor, A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.41-47, 2002.
DOI : 10.1145/586110.586117

M. Garetto, P. Giaccone, and E. Leonardi, On the Capacity Region of MANET: Scheduling and Routing Strategy, IEEE Transactions on Vehicular Technology, vol.58, issue.4, pp.1930-1941, 2009.
DOI : 10.1109/TVT.2008.2004621

T. Ho, B. Leong, R. Koetter, M. Médard, M. Effros et al., Byzantine Modification Detection in Multicast Networks With Random Network Coding, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2798-2803, 2006.
DOI : 10.1109/TIT.2008.921894

URL : https://authors.library.caltech.edu/11451/1/HOTieeetit08.pdf

P. Hui, A. Chaintreau, J. Scott, R. Gass, J. Crowcroft et al., Pocket switched networks and human mobility in conference environments, Proceeding of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking , WDTN '05, 2005.
DOI : 10.1145/1080139.1080142

URL : http://www.thlab.net/%7Echaintre/pub/hui05pocket.pdf

S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi et al., Resilient Network Coding in the Presence of Byzantine Adversaries, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2596-2603, 2008.
DOI : 10.1109/TIT.2008.921711

T. Karagiannis, J. L. Boudec, and M. Vojnovi´cvojnovi´c, Power law and exponential decay of inter contact times between mobile devices, Proceedings of the 13th annual ACM international conference on Mobile computing and networking , MobiCom '07, 2007.
DOI : 10.1145/1287853.1287875

URL : http://reality.media.mit.edu/pdfs/Karagiannis07.pdf

L. Keller, A. Le, B. Cici, H. Seferoglu, C. Fragouli et al., Microcast: Cooperative video streaming on smartphones, ACM MobiSys, 2012.

M. Kim, L. Lima, F. Zhao, J. Barros, M. Médard et al., On counteracting Byzantine attacks in network coded peer-to-peer networks, IEEE Journal on Selected Areas in Communications, vol.28, issue.5, pp.692-702, 2010.
DOI : 10.1109/JSAC.2010.100607

R. Koetter and F. Kschischang, Coding for Errors and Erasures in Random Network Coding, IEEE Transactions on Information Theory, vol.54, issue.8, pp.3579-3591, 2008.
DOI : 10.1109/TIT.2008.926449

R. Koetter and M. Médard, An algebraic approach to network coding, IEEE/ACM Transactions on Networking, vol.11, issue.5, pp.782-795, 2003.
DOI : 10.1109/TNET.2003.818197

URL : http://pdos.lcs.mit.edu/decouto/papers/koetter03.pdf

Y. Lin, B. Li, and B. Liang, Efficient Network Coded Data Transmissions in Disruption Tolerant Networks, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, 2008.
DOI : 10.1109/INFOCOM.2008.210

Y. Lin, B. Li, and B. Liang, Stochastic analysis of network coding in epidemic routing, IEEE Journal on Selected Areas in Communications, vol.26, issue.5, pp.794-808, 2008.
DOI : 10.1109/JSAC.2008.080606

A. Picu and T. Spyropoulos, DTN-Meteo: Forecasting the Performance of DTN Protocols Under Heterogeneous Mobility, IEEE/ACM Transactions on Networking, vol.23, issue.2, 2015.
DOI : 10.1109/TNET.2014.2301376

R. A. Popa, A. Chiesa, T. Badirkhanli, and M. Médard, Going beyond pollution attacks: Forcing byzantine clients to code correctly, 2011.

T. Roeder and F. B. Schneider, Hashes and message digests, Lecture Notes, 2005.

N. Shrestha and L. Sassatelli, On control of inter-session network coding in delay-tolerant mobile social networks, Proceedings of the 17th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems, MSWiM '14, 2014.
DOI : 10.1145/2641798.2641833

URL : https://hal.archives-ouvertes.fr/hal-01303542

N. Shrestha and L. Sassatelli, Inter-Session Network Coding-Based Policies for Delay Tolerant Mobile Social Networks, IEEE Transactions on Wireless Communications, vol.15, issue.11, p.2016
DOI : 10.1109/TWC.2016.2600664

URL : https://hal.archives-ouvertes.fr/hal-01351925

T. Spyropoulos, K. Psounis, and C. Raghavendra, Efficient Routing in Intermittently Connected Mobile Networks: The Multiple-Copy Case, IEEE/ACM Transactions on Networking, vol.16, issue.1, pp.63-76, 2008.
DOI : 10.1109/TNET.2007.897964

D. Wang, D. Silva, and F. R. Kschischang, Constricting the adversary: A broadcast transformation for network coding, Allerton Conference on Comm., Control, and Computing, 2007.

R. W. Yeung and N. Cai, Network error correction, part I: Basic concepts and upper bounds, Comm. in Information and Systems, vol.6, 2006.

E. Yoneki, P. Hui, S. Chan, and J. Crowcroft, A socio-aware overlay for publish/subscribe communication in delay tolerant networks, Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems , MSWiM '07, 2007.
DOI : 10.1145/1298126.1298166

F. Zhao, T. Kalker, M. Médard, and K. J. Han, Signatures for Content Distribution with Network Coding, 2007 IEEE International Symposium on Information Theory, pp.556-560, 2007.
DOI : 10.1109/ISIT.2007.4557283

URL : http://www.mit.edu/~medard/papers08/security_for_NC_v3.pdf