J. Cardoso, DETIboot: distribuição e arranque de sistemas Linux com redes WiFi, Portugal, 2013.

C. Faneca, J. Vieira, and A. Zúquete, Fast image file distribution with Fountain codes via a Wi-Fi ad-hoc network, using low power processors, 2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks), 2014.
DOI : 10.1109/NETWKS.2014.6959232

C. Faneca, J. Vieira, A. Zúquete, and J. Cardoso, DETIboot: A fast, wireless system to install operating systems on students laptops, 2nd Int. Conf. on Advances in Computing, Electronics and Communication, 2014.

J. Byers, M. Luby, and M. Mitzenmacher, A digital fountain approach to asynchronous reliable multicast, IEEE Journal on Selected Areas in Communications, vol.20, issue.8, pp.1528-1540, 2002.
DOI : 10.1109/JSAC.2002.803996

D. J. Mackay, Fountain codes, IEE Proceedings - Communications, vol.152, issue.6, pp.1062-1068, 2005.
DOI : 10.1049/ip-com:20050237

A. Perrig and J. D. Tygar, Secure Broadcast Communication: In Wired and Wireless Networks, 2003.
DOI : 10.1007/978-1-4615-0229-6

E. B. Barker and A. L. Roginsky, Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths, pp.800-131, 2011.
DOI : 10.6028/NIST.SP.800-131a

J. M. Bohli, A. Hessler, O. Ugus, and D. Westhoff, Security enhanced multi-hop over the air reprogramming with Fountain Codes, 2009 IEEE 34th Conference on Local Computer Networks, pp.850-857, 2009.
DOI : 10.1109/LCN.2009.5355011

J. M. Park, E. K. Chong, and H. J. Siegel, Efficient Multicast Packet Authentication Using Signature Amortization, Proc. of IEEE Symposium on Security and Privacy, 2002.

C. K. Wong and S. S. Lam, Digital signatures for flows and multicasts, IEEE/ACM Transactions on Networking, vol.7, issue.4, pp.502-513, 1999.
DOI : 10.1109/90.793005

A. Perrig, R. Canetti, J. Tygar, and D. Song, Efficient authentication and signing of multicast streams over lossy channels, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp.56-73, 2000.
DOI : 10.1109/SECPRI.2000.848446

A. Yavuz, An Efficient Real-Time Broadcast Authentication Scheme for Command and Control Messages, IEEE Transactions on Information Forensics and Security, vol.9, issue.10, pp.1733-1742, 2014.
DOI : 10.1109/TIFS.2014.2351255