Network information flow, IEEE Transactions on Information Theory, vol.46, issue.4, pp.1204-1216, 2000. ,
DOI : 10.1109/18.850663
XORs in the Air: Practical Wireless Network Coding, IEEE/ACM Transactions on Networking, vol.16, issue.3, pp.497-510, 2008. ,
DOI : 10.1109/TNET.2008.923722
Secure network coding for wireless mesh networks: Threats, challenges, and directions, Computer Communications, vol.32, issue.17, pp.1790-1801, 2009. ,
DOI : 10.1016/j.comcom.2009.07.010
Handbook of Applied Cryptography, 1996. ,
DOI : 10.1201/9781439821916
LFSR-based Hashing and Authentication, Lecture Notes in Computer Science, vol.839, pp.129-139, 1994. ,
DOI : 10.1007/3-540-48658-5_15
Homomorphic MACs: MAC-Based Integrity for Network Coding, Applied Cryptography and Network Security -ACNS 2009, ser, pp.292-305, 2009. ,
DOI : 10.1007/978-3-642-01957-9_18
Signing a Linear Subspace: Signature Schemes for Network Coding, Public Key Cryptography -PKC 2009, pp.68-87, 2009. ,
DOI : 10.1007/978-3-642-00468-1_5
Energy Friendly Integrity for Network Coding in Wireless Sensor Networks, 2010 Fourth International Conference on Network and System Security, pp.1-8, 2010. ,
DOI : 10.1109/NSS.2010.32
Security in wireless sensor networks, Communications of the ACM, vol.47, issue.6, pp.53-57, 2004. ,
DOI : 10.1145/990680.990707
Embedded software energy characterization: Using non-intrusive measures for application source code annotation, Journal of Embedded Computing INRIA Contents, vol.3, issue.1 3, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00391186