S. Aceda?ski, S. Deb, M. Médard, and R. Koetter, How good is random linear coding based distributed networked storage? In NetCod, 2005.

R. Ahlswede, N. Cai, S. Li, and R. W. Yeung, Network information flow, IEEE Transactions on Information Theory, vol.46, issue.4, pp.1204-1216, 2000.
DOI : 10.1109/18.850663

S. A. Aly, Z. Kong, and E. Soljanin, Raptor codes based distributed storage algorithms for wireless sensor networks, 2008 IEEE International Symposium on Information Theory, pp.2051-2055, 2008.
DOI : 10.1109/ISIT.2008.4595350

A. Salah, Z. Aly, E. Kong, and . Soljanin, Fountain Codes Based Distributed Storage Algorithms for Large-Scale Wireless Sensor Networks, IPSN, pp.171-182, 2008.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner et al., Provable data possession at untrusted stores, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007.
DOI : 10.1145/1315245.1315318

J. Bang-jensen and G. Gutin, Digraphs: Theory, Algorithms and Applications, 2001.
DOI : 10.1007/978-1-84800-998-1

R. Bhagwan, K. Tati, Y. Cheng, S. Savage, and G. M. Voelker, Total Recall: System Support for Automated Availability Management, NSDI, pp.337-350, 2004.

C. Blake and R. Rodrigues, High Availability, Scalable Storage, Dynamic Peer Networks: Pick Two, HotOS, pp.1-6, 2003.

J. Blöemer, M. Kalfane, M. Karpinski, R. Karp, M. Luby et al., An XOR-Based Erasure-Resilient Coding Scheme, 1995.

W. J. Bolosky, J. R. Douceur, D. Ely, and M. Theimer, Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs, SIGMETRICS, 2000.

T. Bonald, L. Massoulié, F. Mathieu, D. Perino, and A. Twigg, Epidemic Live Streaming: Optimal Performance Trade-Offs, SIGMETRICS, pp.325-336, 2008.
URL : https://hal.archives-ouvertes.fr/hal-00668529

J. Byers, J. Considine, M. Mitzenmacher, and S. Rost, Informed Content Delivery Across Adaptive Overlay Networks, IEEE/ACM Transactions on Networking, vol.12, issue.5, pp.767-780, 2004.
DOI : 10.1109/TNET.2004.836103

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.9552

J. Byers, M. Luby, and M. Mitzenmacher, A digital fountain approach to asynchronous reliable multicast, IEEE Journal on Selected Areas in Communications, vol.20, issue.8, pp.1528-1540, 2002.
DOI : 10.1109/JSAC.2002.803996

J. W. Byers, J. Considine, M. Mitzenmacher, and S. Rost, Informed Content Delivery Across Adaptive Overlay Networks, IEEE/ACM Transactions on Networking, vol.12, issue.5, pp.767-780, 2004.
DOI : 10.1109/TNET.2004.836103

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.9552

N. Carlsson and D. L. Eager, Peer-Assisted On-Demand Streaming of Stored Media Using BitTorrent-Like Protocols, IFIP/Networking, 2007.
DOI : 10.1109/JSAC.2003.818799

M. Castro, P. Druschel, A. Kermarrec, A. Nandi, A. Rowstron et al., SplitStream: High-Bandwidth Multicast in Cooperative Environments, SOSP, 2003.

M. Castro, P. Druschel, A. Kermarrec, and A. Rowstron, Scribe: a large-scale and decentralized application-level multicast infrastructure, IEEE Journal on Selected Areas in Communications, vol.20, issue.8, pp.1489-1499, 2002.
DOI : 10.1109/JSAC.2002.803069

M. Champel, K. Huguenin, A. Kermarrec, and N. L. Scouarnec, Lt network codes: Low complexity network codes (short paper), ACM CoNEXT'09 (Student Workshop): 5th ACM International Conference on emerging Networking EXperiments and Technologies, 2009.

M. Champel, K. Huguenin, A. Kermarrec, and N. L. Scouarnec, Lt network codes, IEEE ICDCS'2010: 30th International Conference on Distributed Computing Systems, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00455639

M. Champel, A. Kermarrec, and N. L. Scouarnec, FoG: Fighting the Achilles??? Heel of Gossip Protocols with Fountain Codes, SSS'2009: 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, 2009.
DOI : 10.1007/978-3-642-05118-0_13

URL : https://hal.archives-ouvertes.fr/inria-00429998

M. Champel, A. Kermarrec, and N. L. Scouarnec, Phosphite : Guaranteeing out-of-order download in p2p video on demand Phosphite : Incitation à la collaboration pour la vidéo la demande en p2p, P2P'2009: 9th IEEE International Conference on Peer-to-Peer Computing Algotel'2009: 11eme Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, 2009.

D. Charles, K. Jian, and K. Lauter, Signature for Network Coding, 2005.

D. L. Yung-ryn-choe, J. M. Schuff, V. S. Dyaberi, and . Pai, Improving VoD Server Efficiency with BitTorrent, MM, 2007.

F. Byung-gon-chun, A. Dabek, E. Haeberlen, H. Sit, F. Weatherspoon et al., Efficient Replica Maintenance for Distributed Storage Systems, NSDI, pp.45-58, 2006.

B. Cohen, Incentives build robustness in BitTorrent, P2PEcon, 2003.

J. Considine, Generating Good Degree Distributions for Sparse Parity Check Codes using Oracles, 2001.

F. Dabek, F. Kaashoek, D. Karger, R. Morris, and I. Stoica, Wide-area Cooperative Storage with CFS, SOSP, pp.202-215, 2001.

O. Dalle, F. Giroire, J. Monteiro, and S. Pérennes, Analysis of failure correlation impact on peer-to-peer storage systems, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, pp.184-193, 2009.
DOI : 10.1109/P2P.2009.5284518

URL : https://hal.archives-ouvertes.fr/inria-00485847

A. Datta and K. Aberer, Internet-Scale Storage Systems under Churn -- A Study of the Steady-State using Markov Models, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), pp.133-144, 2006.
DOI : 10.1109/P2P.2006.22

A. G. Dimakis, P. Godfrey, Y. Wu, M. O. Wainwright, and K. Ramchandran, Network Coding for Distributed Storage Systems, INFOCOM, pp.2000-2008, 2007.

A. G. Dimakis, P. Godfrey, Y. Wu, M. O. Wainwright, and K. Ramchandran, Network Coding for Distributed Storage Systems, IEEE Transactions on Information Theory, vol.56, issue.9, pp.4539-4551, 2010.
DOI : 10.1109/TIT.2010.2054295

A. G. Dimakis, V. Prabhakaran, and K. Ramchandran, Ubiquitous access to distributed data in large-scale sensor networks through decentralized erasure codes, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005., 2005.
DOI : 10.1109/IPSN.2005.1440909

A. G. Dimakis, V. Prabhakaran, and K. Ramchandran, Decentralized erasure codes for distributed networked storage, Joint special issue, 2006.
DOI : 10.1109/TIT.2006.874535

A. G. Dimakis, K. Ramchandran, Y. Wu, and C. Suh, A Survey on Network Codes for Distributed Storage, Proceedings of the IEEE, vol.99, issue.3, 2010.
DOI : 10.1109/JPROC.2010.2096170

A. Duminuco and E. Biersack, Hierarchical Codes: How to Make Erasure Codes Attractive for Peer-to-Peer Storage Systems, 2008 Eighth International Conference on Peer-to-Peer Computing, 2008.
DOI : 10.1109/P2P.2008.9

A. Duminuco and E. Biersack, A Pratical Study of Regenerating Codes for Peer-to-Peer Backup Systems, ICDCS, 2009.

T. Patrick, R. Eugster, A. Guerraoui, L. Kermarrec, and . Massoulieacute, Epidemic Information Dissemination in Distributed Systems, Computer, vol.37, issue.5, pp.60-67, 2004.

P. Felber, A. Kermarrec, L. Leonini, E. Rivière, and S. Voulgaris, Pulp: Un protocole épidémique hybride, Algotel, 2009.

R. G. Gallager, Low Density Parity Check Codes. Transactions of the IRE Professional Group on Information Theory, pp.21-28, 1962.

S. Ghemawat, H. Gobioff, and S. Leung, The Google File System, SOSP, pp.29-43, 2003.

C. Gkantsidis, J. Miller, and P. Rodriguez, Anatomy of a P2P Content Distribution System with Network Coding, IPTPS, pp.1-6, 2006.

C. Gkantsidis and P. Rodriguez, Network coding for large scale content distribution, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., pp.2235-2245, 2005.
DOI : 10.1109/INFCOM.2005.1498511

S. Guha, N. Daswani, and R. Jain, An Experimental Study of the Skype Peer-to-Peer VoIP System, IPTPS, 2006.

R. Gummadi and R. Sreenivas, Relaying a Fountain Code Accross Multiple Nodes, ITW, pp.483-484, 2008.

R. W. Hamming, Error Detecting and Error Correcting Codes, Bell System Technical Journal, vol.29, issue.2, 1950.
DOI : 10.1002/j.1538-7305.1950.tb00463.x

T. Ho, B. Leong, R. Koetter, M. Médard, M. Effros et al., Byzantine modification detection in multicast networks using randomized network coding, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings., p.143, 2003.
DOI : 10.1109/ISIT.2004.1365180

T. Ho, M. Médard, R. Koetter, D. Karger, M. E. Shi et al., A Random Linear Network Coding Approach to Multicast, IEEE Transactions on Information Theory, vol.52, issue.10, pp.524413-4430, 2006.
DOI : 10.1109/TIT.2006.881746

Y. Hu, Y. Xu, X. Wang, C. Zhan, and P. Li, Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding, IEEE Journal on Selected Areas in Communications, vol.28, issue.2, pp.268-276, 2010.
DOI : 10.1109/JSAC.2010.100216

S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi et al., Resilient Network Coding in the Presence of Byzantine Adversaries, INFOCOM, pp.616-624, 2007.

M. Jelasity, S. Voulgaris, R. Guerraoui, A. Kermarrec, and M. Van-steen, Gossip-based peer sampling, ACM Transactions on Computer Systems, vol.25, issue.3, 2007.
DOI : 10.1145/1275517.1275520

M. Jelasity, A. Montresor, G. P. Jesi, and S. Voulgaris, The PeerSim Simulator

A. Kamra, V. Misra, J. Feldman, and D. Rubenstein, Growth Codes: Maximizing Sensor Network Data Persistence, SIGCOMM, pp.255-266, 2006.

R. Karp, C. Schindelhauer, S. Shenker, and B. Vöcking, Randomized rumor spreading, Proceedings 41st Annual Symposium on Foundations of Computer Science, pp.566-574, 2000.
DOI : 10.1109/SFCS.2000.892324

S. Katti, H. Rahul, W. Hu, D. Katabi, M. Médard et al., XORs in the Air: Practical Wireless Network Coding, SIGCOMM, 2006.

R. Koetter and M. Médard, An algebraic approach to network coding, IEEE/ACM Transactions on Networking, vol.11, issue.5, pp.782-795, 2003.
DOI : 10.1109/TNET.2003.818197

J. Li, S. Yang, X. Wang, and B. Li, Tree-structured Data Regeneration in Distributed Storage Systems with Regenerating Codes, 2010 Proceedings IEEE INFOCOM, 2010.
DOI : 10.1109/INFCOM.2010.5462122

R. W. Shuo-yen-robert-li, N. Yeung, and . Cai, Linear Network Coding, IEEE Transactions On Information Theory, vol.49, pp.371-381, 2003.

L. Lima, M. Médard, and J. Barros, Random Linear Network Coding: A free cipher?, 2007 IEEE International Symposium on Information Theory, 2007.
DOI : 10.1109/ISIT.2007.4557282

W. K. Lin, D. M. Chiu, and Y. B. Lee, Erasure code replication revisited, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings., 2004.
DOI : 10.1109/PTP.2004.1334935

Y. Lin, B. Li, and B. Liang, Differentiated Data Persistence with Priority Random Linear Codes, 27th International Conference on Distributed Computing Systems (ICDCS '07), 2007.
DOI : 10.1109/ICDCS.2007.99

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.319.4867

N. Linial, Locality in Distributed Graph Algorithms, SIAM Journal on Computing, vol.21, issue.1, pp.193-201, 1992.
DOI : 10.1137/0221015

T. Locher, S. Schmid, and R. Wattenhofer, Rescuing Tit-for-Tat with Source Coding, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), 2007.
DOI : 10.1109/P2P.2007.10

G. Michael, M. Luby, M. A. Mitzenmacher, D. A. Shokrollahi, V. Spielman et al., Practical Loss-Resilient Codes, STOC, 1997.

G. Ma, Y. Xu, M. Lin, and Y. Xuan, A Content Distribution System Based on Sparse Network Coding, NetCod, 2007.

J. C. David and . Mackay, Information Theory, Inference, and Learning Algorithms, 2002.

L. Massoulié, A. Twigg, C. Gkantsidis, and P. Rodriguez, Randomized decentralised broadcasting algorithms, INFOCOM, 2007.

P. Maymounkov, N. J. Harvey, and D. S. Lun, Methods for Efficient Network Coding, Allerton, 2006.

R. J. Mceliece, A Public-Key Cryptosystem Based on Algebraic Coding Theory, JPL Deep Space Network Progress Report, pp.42-4490, 1978.

M. Mitzenmacher, Digital fountains: a survey and look forward, Manufacturing Engineer, 2004.
DOI : 10.1109/ITW.2004.1405313

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.9463

R. Morales and I. Gupta, AVMON: Optimal and Scalable Discovery of Consistent Availability Monitoring Overlays for Distributed Systems, IEEE Transactions on Parallel and Distributed Systems, vol.20, issue.4, pp.446-459, 2009.
DOI : 10.1109/TPDS.2008.84

F. Oggier and A. Datta, Self-repairing homomorphic codes for distributed storage systems, 2011 Proceedings IEEE INFOCOM, 2010.
DOI : 10.1109/INFCOM.2011.5934901

N. Oualha, M. Önen, and Y. Roudier, A Security Protocol for Self-Organizing Data Storage, IFIPSEC, 2008.
DOI : 10.1007/978-0-387-09699-5_44

K. Parvez and C. Williamson, Anirban Mahanti, and Niklas Carlsson Analysis of BitTorrent-like Protocols for On-Demand Stored Media Streaming, SIGMETRICS, 2008.

D. A. Patterson, G. Gibson, and R. H. Katz, A Case for Redundant Arrays of Inexpensive Disks (RAID), SIGMOD International Conference on Management of Data, 1988.

F. Picconi and L. Massoulié, Is there a future for mesh-based live-video streaming ? In P2P, 2008.

J. S. Plank, Erasure codes for storage applications, Tutorial Slides, presented at FAST-2005: 4th Usenix Conference on File and Storage Technologies, 2005.

K. V. Rashmi, N. B. Shah, P. V. Kumar, and K. Ramchandran, Explicit construction of optimal exact regenerating codes for distributed storage, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2009.
DOI : 10.1109/ALLERTON.2009.5394538

S. Irving, G. Reed, and . Solomon, Polynomial Codes over Certain Finite Fields, Journal of the Society for Industrial and Applied Mathematics (SIAM), vol.8, pp.300-304, 1960.

S. Rhea, P. Eaton, D. Geels, H. Weatherspoon, B. Zhao et al., Pond: the OceanStore Prototype, FAST, 2003.

L. Rizzo, Effective erasure codes for reliable computer communication protocols, ACM SIGCOMM Computer Communication Review, vol.27, issue.2, 1997.
DOI : 10.1145/263876.263881

R. Rodrigues and B. Liskov, High Availability in DHTs: Erasure Coding vs. Replication, IPTPS, 2005.
DOI : 10.1007/11558989_21

A. Rowstron and P. Druschel, Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems, Middleware, 2001.
DOI : 10.1007/3-540-45518-3_18

S. Sanghavi, B. Hajek, and L. Massoulié, Gossiping with Multiple Messages, INFOCOM, 2007.

B. Schroeder and G. Gibson, A Large-scale Study of Failures in Highperformance-computing Systems, DSN, 2006.

T. Schwarz, S. J. Ethan, and . Miller, Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06), 2006.
DOI : 10.1109/ICDCS.2006.80

B. Nihar, K. V. Shah, P. V. Rashmi, K. Kumar, and . Ramchandran, Explicit Codes Minimizing Repair Bandwidth for Distributed Storage, ITW, 2010.

C. E. Shannon, A Mathematical Theory of Communication. The Bell System Technical Journal, pp.379-423, 1948.

C. E. Shannon, Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

A. Shokrollahi, Raptor Codes, IEEE/ACM Transactions on Networking, vol.14, issue.6, pp.2551-2567, 2006.

R. C. Singleton, Maximum distance<tex>q</tex>-nary codes, IEEE Transactions on Information Theory, vol.10, issue.2, pp.116-118, 1964.
DOI : 10.1109/TIT.1964.1053661

I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications, SIGCOMM, pp.149-160, 2001.

C. Suh and K. Ramchandran, Exact Regeneration Codes for Distributed Storage Repair Using Interference Alignment, ISIT, 2010.

R. and M. Tanner, A recursive approach to low complexity codes, IEEE Transactions on Information Theory, vol.27, issue.5, pp.533-547, 1981.
DOI : 10.1109/TIT.1981.1056404

N. Thomos and P. Frossard, Raptor network video coding, Proceedings of the international workshop on Workshop on mobile video , MV '07, 2007.
DOI : 10.1145/1290050.1290056

S. Gilbert and . Vernam, Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications, Journal of the IEEE, vol.55, pp.109-115, 1926.

M. Wang and B. Li, How Practical is Network Coding?, 200614th IEEE International Workshop on Quality of Service, 2006.
DOI : 10.1109/IWQOS.2006.250480

H. Weatherspoon and J. Kubiatowicz, Erasure Coding Vs. Replication: A Quantitative Comparison, IPTPS, 2002.
DOI : 10.1007/3-540-45748-8_31

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.9064

J. Widmer and J. Boudec, Network coding for efficient communication in extreme networks, Proceeding of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking , WDTN '05, 2005.
DOI : 10.1145/1080139.1080147

Y. Wu and A. G. Dimakis, Reducing repair traffic for erasure coding-based storage via interference alignement, ISIT, 2009.

R. W. Yeung and N. Cai, Secure Network Coding, ISIT, 2002.

Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, 2008.
DOI : 10.1109/INFOCOM.2008.199

X. Zhang, J. Liu, B. Li, and T. Yum, CoolStreaming/DONet: A Data-Driven Overlay Network for Efficient Live Media Streaming, INFOCOM, 2005.