I. F. Akyildiz, X. Wang, and W. Wang, Wireless Mesh Networks: A Survey, Computer Networks and ISDN Systems, vol.47, issue.4, 2005.

E. Ayanoglu, I. Chih-lin, R. D. Gitlin, and J. E. Mazo, Diversity coding for transparent self-healing and fault-tolerant communication networks, IEEE Transactions on Communications, vol.41, issue.11, p.41, 1993.
DOI : 10.1109/26.241748

L. Csirmaz, The Size of a Share Must Be Large, Journal of Cryptology, vol.10, issue.4, 1997.

Y. Desmedt, Y. Wang, and M. Burmester, Revisiting Colored Networks and Privacy Preserving Censorship, CRITIS 2006: First International Workshop on Critical Information Infrastructures Security, 2006.
DOI : 10.1007/11962977_12

P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum et al., Optimized link state routing protocol for ad hoc networks, Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century., 2001.
DOI : 10.1109/INMIC.2001.995315

URL : https://hal.archives-ouvertes.fr/inria-00471622

D. B. Johnson, D. A. Maltz, and J. Broch, Ad hoc networking, chapter DSR: the Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks, pp.139-172, 2001.

H. Krawczyk, Secret Sharing Made Short, CRYPTO '93: Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, 1994.
DOI : 10.1007/3-540-48329-2_12

R. Krishnan and J. A. Silvester, Choice of allocation granularity in multipath source routing schemes, IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings, 1993.
DOI : 10.1109/INFCOM.1993.253345

W. S. Lai, Bifurcated routing in computer networks, ACM SIGCOMM Computer Communication Review, vol.15, issue.3, 1985.
DOI : 10.1145/1015621.1015625

S. Lee and M. Gerla, AODV-BR: backup routing in ad hoc networks, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540), 2000.
DOI : 10.1109/WCNC.2000.904822

W. Liao, S. Wang, J. Sheu, and Y. Tseng, A Multi-path QoS Routing Protocol in a Wireless Mobile ad Hoc Network, Telecommunication Systems, vol.19, pp.3-4, 2002.
DOI : 10.1007/3-540-47734-9_16

W. Lou, W. Liu, and Y. Fang, SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks, INFOCOM 2004: Proceedings of the Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, 2004.

M. K. Marina and S. R. Das, On-demand multipath distance vector routing in ad hoc networks, Proceedings Ninth International Conference on Network Protocols. ICNP 2001, 2001.
DOI : 10.1109/ICNP.2001.992756

S. Mueller, R. P. Tsang, and D. Ghosal, Performance Tools and Applications to Networked Systems, chapter Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges, 2004.

A. Nasipuri and S. R. Das, On-demand multipath routing for mobile ad hoc networks, Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370), 1999.
DOI : 10.1109/ICCCN.1999.805497

M. R. Pearlman, Z. J. Haas, P. Sholander, and S. S. Tabrizi, On the impact of alternate path routing for load balancing in mobile ad hoc networks, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444), 2000.
DOI : 10.1109/MOBHOC.2000.869207

C. E. Perkins and E. M. Royer, Ad-hoc on-demand distance vector routing, WMCSA '99: Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications, 1999.
DOI : 10.1109/mcsa.1999.749281

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, 1979.
DOI : 10.1145/359168.359176