H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, Security in mobile ad hoc networks: challenges and solutions, IEEE Wireless Communications, vol.11, issue.1, pp.38-47, 2004.
DOI : 10.1109/MWC.2004.1269716

J. Yedidia, W. Freeman, and Y. Weiss, Constructing Free-Energy Approximations and Generalized Belief Propagation Algorithms, IEEE Transactions on Information Theory, vol.51, issue.7, pp.2282-2312, 2005.
DOI : 10.1109/TIT.2005.850085

J. Park, M. Gerla, D. Lun, Y. Yi, and M. Medard, Codecast: a network-coding-based ad hoc multicast protocol, IEEE Wireless Communications, vol.13, issue.5, pp.76-81, 2006.
DOI : 10.1109/WC-M.2006.250362

D. Nguyen, T. Tran, T. Nguyen, and B. Bose, Wireless Broadcast Using Network Coding, IEEE Transactions on Vehicular Technology, vol.58, issue.2, pp.914-925, 2009.
DOI : 10.1109/TVT.2008.927729

Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana, MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming, 2010 Proceedings IEEE INFOCOM, pp.1-5, 2010.
DOI : 10.1109/INFCOM.2010.5462226

M. N. Krohn, M. J. Freedman, and D. Mazieres, On-thefly verification of rateless erasure codes for efficient content distribution, Security and Privacy, IEEE Symposium on, 2004.

C. Gkantsidis and P. Rodriguez, Cooperative Security for Network Coding File Distribution, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006.
DOI : 10.1109/INFOCOM.2006.233

Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, 2008.
DOI : 10.1109/INFOCOM.2008.199

E. Kehdi and B. Li, Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding, IEEE INFOCOM 2009, The 28th Conference on Computer Communications
DOI : 10.1109/INFCOM.2009.5062036

Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks, IEEE INFOCOM 2009, The 28th Conference on Computer Communications
DOI : 10.1109/INFCOM.2009.5061945

M. Luby, LT codes, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings., pp.271-280, 2002.
DOI : 10.1109/SFCS.2002.1181950

M. Luby, M. Mitzenmacher, M. Shokrollahi, and D. Spielman, Improved low-density parity-check codes using irregular graphs Information Theory, IEEE Transactions on, vol.47, issue.2, pp.585-598, 2001.

T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros et al., Byzantine modification detection in multicast networks with random network coding Information Theory, IEEE Transactions on, vol.54, issue.6, pp.2798-2803, 2008.

S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi et al., Resilient network coding in the presence of byzantine adversaries Information Theory, IEEE Transactions on, vol.54, issue.6, pp.2596-2603, 2008.

R. Koetter and F. Kschischang, Coding for errors and erasures in random network coding Information Theory, IEEE Transactions on, vol.54, issue.8, pp.3579-3591, 2008.

Y. Li and J. C. Lui, Stochastic analysis of a randomized detection algorithm for pollution attack in P2P live streaming systems, Performance Evaluation, vol.67, issue.11, pp.1273-1288, 2010.
DOI : 10.1016/j.peva.2010.08.005

X. Jin and S. G. Chan, Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring, ACM Transactions on Multimedia Computing, Communications, and Applications, vol.6, issue.2, pp.1-918, 2010.
DOI : 10.1145/1671962.1671965