S. Pradhan and K. Ramchandran, Distributed source coding using syndromes (DISCUS): design and construction, IEEE Transactions on Information Theory, vol.49, issue.3, pp.626-643, 2003.
DOI : 10.1109/TIT.2002.808103

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.27.7164

R. Ahlswede, N. Cai, S. Li, and R. Yeung, Network information flow, IEEE Transactions on Information Theory, vol.46, issue.4, pp.1204-1216, 2000.
DOI : 10.1109/18.850663

M. Luby, Lt codes. Symposium on Foundations of Computer Science?FOCS, 2002.
DOI : 10.1109/sfcs.2002.1181950

S. Katti, H. Rahul, W. Hu, D. Katabi, M. Médard et al., XORs in the Air: Practical Wireless Network Coding, IEEE/ACM Transactions on Networking, vol.16, issue.3, pp.497-510, 2008.
DOI : 10.1109/TNET.2008.923722

S. Micali, K. Ohta, and L. Reyzin, Accountable-subgroup multisignatures, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.245-254, 2001.
DOI : 10.1145/501983.502017

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.7419

C. Intanagonwiwat, R. Govindan, and D. Estrin, Directed diffusion, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.56-67, 2000.
DOI : 10.1145/345910.345920

A. Perrig, J. Stankovic, and D. Wagner, Security in wireless sensor networks, Communications of the ACM, vol.47, issue.6, pp.53-57, 2004.
DOI : 10.1145/990680.990707

J. Dong, R. Curtmola, and C. Nita-rotaru, Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks, Proceedings of the second ACM conference on Wireless network security, WiSec '09, pp.111-122, 2009.
DOI : 10.1145/1514274.1514292

J. Dong, R. Curtmola, and C. Nita-rotaru, Secure network coding for wireless mesh networks: Threats, challenges, and directions, Computer Communications, vol.32, issue.17, pp.1790-1801, 2009.
DOI : 10.1016/j.comcom.2009.07.010

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.8221

H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-hashing for message authentication, 1997.
DOI : 10.17487/rfc2104

B. Preneel and P. Van-oorschot, MDx-MAC and Building Fast MACs from Hash Functions, Lecture Notes in Computer Science, vol.963, pp.1-14, 1995.
DOI : 10.1007/3-540-44750-4_1

J. Black and P. Rogaway, CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions, Journal of Cryptology, vol.18, issue.2, pp.111-131, 2005.
DOI : 10.1007/s00145-004-0016-3

W. Nevelsteen and B. Preneel, Software Performance of Universal Hash Functions, Lecture Notes in Computer Science, vol.1592, pp.24-41, 1999.
DOI : 10.1007/3-540-48910-X_3

J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway, UMAC: Fast and Secure Message Authentication, Advances in Cryptology?CRYPTO '99, pp.216-233, 1999.
DOI : 10.1007/3-540-48405-1_14

D. Mcgrew and J. Viega, The Security and Performance of the Galois/Counter Mode (GCM) of Operation, Lecture Notes in Computer Science, vol.3348, pp.343-355, 2004.
DOI : 10.1007/978-3-540-30556-9_27

S. Agrawal and D. Boneh, Homomorphic MACs: MAC-Based Integrity for Network Coding, Lecture Notes in Computer Science, vol.5536, pp.292-305, 2009.
DOI : 10.1007/978-3-642-01957-9_18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.190.831

W. Znaidi, C. Lauradoux, and M. Minier, Aggregated authentification (AMAC) using universal hash functions. International ICST Conference on Security and Privacy in Communication Networks?SecureComm, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol.17, pp.248-264, 2009.
DOI : 10.1007/978-3-642-05284-2_14

P. Sarkar, A new universal hash function and other cryptographic algorithms suitable for resource constrained devices Available at, Cryptology ePrint Archive Report, vol.216, 2008.

Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, pp.406-414, 2009.
DOI : 10.1109/INFCOM.2009.5061945

C. Fontaine and F. Galand, A survey of homomorphic encryption for non-specialists, EURASIP Journal on Information Security, vol.10, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00504233

C. Castelluccia, A. Chan, E. Mykletun, and G. Tsudik, Efficient and provably secure aggregation of encrypted data in wireless sensor networks, ACM Transactions on Sensor Networks, vol.5, issue.3, pp.1-36, 2009.
DOI : 10.1145/1525856.1525858

Y. Xiao, V. Rayi, B. Sun, X. Du, F. Hu et al., A survey of key management schemes in wireless sensor networks, Computer Communications, vol.30, issue.11-12, pp.11-122314, 2007.
DOI : 10.1016/j.comcom.2007.04.009

H. Krawczyk, LFSR-based Hashing and Authentication, Lecture Notes in Computer Science, vol.839, pp.129-139, 1994.
DOI : 10.1007/3-540-48658-5_15

E. Zenner, Nonce Generators and the Nonce Reset Problem, International Conference on Information Security?ISC, pp.411-426, 2009.
DOI : 10.1007/11502760_3

M. Bellare and P. Rogaway, Optimal asymmetric encryption, Lecture Notes in Computer Science, vol.950, pp.92-111, 1994.
DOI : 10.1007/BFb0053428

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.1562

D. Du and F. Hwang, Combinatorial Group Testing and its Applications (Applied Mathematics), 2000.
DOI : 10.1142/4252

G. Zaverucha and D. Stinson, Group Testing and Batch Verification, Lecture Notes in Computer Science, vol.5973, pp.140-157, 2009.
DOI : 10.1007/978-3-642-14496-7_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.4710

R. Johnson, D. Molnar, D. Song, and D. Wagner, Homomorphic Signature Schemes, Lecture Notes in Computer Science, vol.2271, pp.244-262, 2002.
DOI : 10.1007/3-540-45760-7_17

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.1944

A. Fraboulet, G. Chelius, and E. Fleury, Worldsens, Proceedings of the 6th international conference on Information processing in sensor networks , IPSN '07, pp.176-185, 2007.
DOI : 10.1145/1236360.1236385

URL : https://hal.archives-ouvertes.fr/hal-00399617

N. Fournel, A. Fraboulet, and P. Feautrier, Embedded software energy characterization: Using non-intrusive measures for application source code annotation, Journal of Embedded Computing, vol.3, issue.3, p.10, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00391186

J. Liang, R. Kumar, Y. Xi, and K. Ross, Pollution in P2P file sharing systems, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., pp.1174-1185, 2005.
DOI : 10.1109/INFCOM.2005.1498344

M. Krohn, M. Freedman, and D. Mazières, On-the-fly verification of rateless erasure codes for efficient content distribution, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.226-240, 2004.
DOI : 10.1109/SECPRI.2004.1301326

C. Gkantsidis and P. Rodriguez, Cooperative Security for Network Coding File Distribution, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006.
DOI : 10.1109/INFOCOM.2006.233

D. Charles, K. Jain, and K. Lauter, Signatures for network coding, International Journal of Information and Coding Theory, vol.1, issue.1, pp.3-14, 2009.
DOI : 10.1504/IJICOT.2009.024044

D. Boneh, D. Freeman, J. Katz, and B. Waters, Signing a Linear Subspace: Signature Schemes for Network Coding, Public Key Cryptography?PKCLecture Notes in Computer Science, vol.5443, pp.68-87, 2009.
DOI : 10.1007/978-3-642-00468-1_5

S. Riis, Linear versus non-linear boolean functions in network flow, Conference on Information Sciences and System?CISS, 2004.

B. Przydatek, D. Song, and A. Perrig, SIA, Proceedings of the first international conference on Embedded networked sensor systems , SenSys '03, 2003.
DOI : 10.1145/958491.958521

L. Hu and D. Evans, Secure aggregation for wireless networks, Ad hoc Networks, pp.384-394, 2003.

H. Chan, A. Perrig, and D. Song, Secure hierarchical in-network aggregation in sensor networks, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.278-287, 2006.
DOI : 10.1145/1180405.1180440

L. Carter and M. Wegman, Universal classes of hash functions (Extended Abstract) ACM Symposium on Theory of Computing?STOC '77, pp.106-112, 1977.

L. Carter and M. Wegman, Universal classes of hash functions, Journal of Computer and System Sciences, vol.18, issue.2, pp.143-154, 1979.
DOI : 10.1016/0022-0000(79)90044-8

V. Shoup, On Fast and Provably Secure Message Authentication Based on Universal Hashing, Lecture Notes in Computer Science, vol.1109, pp.313-328, 1996.
DOI : 10.1007/3-540-68697-5_24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.54.1783

H. Handschuh and B. Preneel, Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms, Lecture Notes in Computer Science, vol.5157, pp.144-161, 2008.
DOI : 10.1007/978-3-540-85174-5_9