R. Ahlswede, N. Cai, S. R. Li, and R. W. Yeung, Network information flow, IEEE Transactions on Information Theory, vol.46, issue.4, pp.1204-1216, 2000.
DOI : 10.1109/18.850663

N. Cai and R. W. Yeung, Secure Network Coding, Proc. IEEE Int. Symp. on Information Theory, 2002.

P. A. Chou, Y. Wu, and K. Jain, Practical network coding, Proc. Annual Allerton Conference on Communication, Control, and Computing, 2003.

J. Dong, R. Curtmola, and C. Nita-rotaru, Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks, Proceedings of the second ACM conference on Wireless network security, WiSec '09, 2009.
DOI : 10.1145/1514274.1514292

J. Dong, R. Curtmola, and C. Nita-rotaru, Secure network coding for wireless mesh networks: Threats, challenges, and directions, Computer Communications, vol.32, issue.17, pp.1790-1801, 2009.
DOI : 10.1016/j.comcom.2009.07.010

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.8221

C. Fragouli, J. Boudec, and J. Widmer, Network coding, ACM SIGCOMM Computer Communication Review, vol.36, issue.1, pp.63-68, 2006.
DOI : 10.1145/1111322.1111337

E. Franz, S. Pfennig, and A. Fischer, Communication overhead of network coding schemes secure against pollution attacks, 2012.

R. Gennaro, J. Katz, H. Krawczyk, and T. Rabin, Secure Network Coding over the Integers, Proc. PKC 2010, pp.142-160, 2010.
DOI : 10.1007/978-3-642-13013-7_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.4176

C. Gkantsidis and P. R. Rodriguez, Cooperative Security for Network Coding File Distribution, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006.
DOI : 10.1109/INFOCOM.2006.233

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.3400

T. Ho, R. Koetter, M. Médard, D. R. Karger, and M. Effros, The benefits of coding over routing in a randomized setting, IEEE International Symposium on Information Theory, 2003. Proceedings., 2003.
DOI : 10.1109/ISIT.2003.1228459

T. Ho, B. Leong, R. Koetter, M. Médard, M. Effros et al., Byzantine Modification Detection in Multicast Networks With Random Network Coding, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2798-2803, 2008.
DOI : 10.1109/TIT.2008.921894

S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi et al., Resilient network coding in the presence of byzantine adversaries, Proc. 26th Annual IEEE Conf. on Computer Commun., INFOCOM, pp.616-624, 2007.

L. Lima, J. P. Vilela, P. F. Oliveira, and J. Barros, Network coding security: Attacks and countermeasures. CoRR, abs/0809, 1366.

A. Perrig, R. Canetti, J. D. Tygar, and D. Song, The TESLA broadcast authentication protocol, RSA CryptoBytes, vol.5, issue.2, pp.2-13, 2002.
DOI : 10.1007/978-1-4615-0229-6_3

J. P. Vilela, L. Lima, and J. Barros, Lightweight Security for Network Coding, 2008 IEEE International Conference on Communications, 2008.
DOI : 10.1109/ICC.2008.336

URL : http://arxiv.org/abs/0807.0610

Y. Wang, Insecure " provably secure network coding " and homomorphic authentication schemes for network coding, 2010.

R. W. Yeung, Information Theory and Network Coding, 2008.