R. Ahlswede, N. Cai, S. R. Li, and R. W. Yeung, Network information flow, IEEE Transactions on Information Theory, vol.46, issue.4, pp.1204-1216, 2000.
DOI : 10.1109/18.850663

S. Katti, H. Rahul, W. Hu, D. Katabi, M. Médard et al., XORs in the Air: Practical Wireless Network Coding, IEEE/ACM Transactions on Networking, vol.16, issue.3, pp.497-510, 2008.
DOI : 10.1109/TNET.2008.923722

J. Dong, R. Curtmola, and C. Nita-rotaru, Secure network coding for wireless mesh networks: Threats, challenges, and directions, Computer Communications, vol.32, issue.17, pp.1790-1801, 2009.
DOI : 10.1016/j.comcom.2009.07.010

A. J. Menezes, S. A. Vanstone, and P. C. Van-oorschot, Handbook of Applied Cryptography, 1996.
DOI : 10.1201/9781439821916

H. Krawczyk, LFSR-based Hashing and Authentication, Lecture Notes in Computer Science, vol.839, pp.129-139, 1994.
DOI : 10.1007/3-540-48658-5_15

S. Agrawal and D. Boneh, Homomorphic MACs: MAC-Based Integrity for Network Coding, Applied Cryptography and Network Security -ACNS 2009, ser, pp.292-305, 2009.
DOI : 10.1007/978-3-642-01957-9_18

D. Boneh, D. Freeman, J. Katz, and B. Waters, Signing a Linear Subspace: Signature Schemes for Network Coding, Public Key Cryptography -PKC 2009, pp.68-87, 2009.
DOI : 10.1007/978-3-642-00468-1_5

A. Apavatjrut, W. Znaidi, A. Fraboulet, C. Goursaud, C. Lauradoux et al., Energy Friendly Integrity for Network Coding in Wireless Sensor Networks, 2010 Fourth International Conference on Network and System Security, pp.1-8, 2010.
DOI : 10.1109/NSS.2010.32

A. Perrig, J. A. Stankovic, and D. Wagner, Security in wireless sensor networks, Communications of the ACM, vol.47, issue.6, pp.53-57, 2004.
DOI : 10.1145/990680.990707

N. Fournel, A. Fraboulet, and P. Feautrier, Embedded software energy characterization: Using non-intrusive measures for application source code annotation, Journal of Embedded Computing INRIA Contents, vol.3, issue.1 3, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00391186