R. Bradner and S. , Key words for use in RFCs to Indicate Requirement Levels, 1997.
DOI : 10.17487/rfc2119

M. Luby, M. Watson, and L. Vicisano, Layered Coding Transport (LCT) Building Block, Work in Progress, 2007.

B. Adamson, C. Bormann, M. Handley, and J. Macker, Negative-acknowledgment (NACK)-Oriented Reliable Multicast (NORM) Protocol, Progress, 2008.
DOI : 10.17487/rfc3940

T. Paila, R. Walsh, M. Luby, R. Lehtonen, and V. Roca, FLUTE -File Delivery over Unidirectional Transport, Work in Progress, 2007.
DOI : 10.17487/rfc6726

URL : https://hal.archives-ouvertes.fr/hal-00749951

M. Luby, G. Gemmell, L. Vicisano, J. Crowcroft, and B. Lueckenhoff, Asynchronous Layered Coding: a Scalable Reliable Multicast Protocol, Roca & Adamson Expires, 2009.

H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed- Hashing for Message Authentication, 1997.
DOI : 10.17487/rfc2104

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.383.2086

J. Jonsson and B. Kaliski, Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2, RFC, vol.3447, issue.1, 2003.
DOI : 10.17487/rfc3447

A. Perrig, D. Song, R. Canetti, J. Tygar, and B. Briscoe, Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction, RFC, vol.4082, 2005.
DOI : 10.17487/rfc4082

S. Kent, IP Authentication Header, RFC, vol.4302, 2005.
DOI : 10.17487/rfc4302

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.172.3803

A. Appendix, FCAST in practice This section discusses how FCAST/ALC and FCAST/NORM can be used in