A. Appendix, Notes on the Storage Layer Implementation, p.127

. Bibliography and . Aad, Packet Coding for Strong Anonymity in Ad Hoc Networks, Proc. of the nternationalConf. on Security and Privacy in Communication Networks (Securecomm), pp.1-10, 2005.

A. S. Aiyer, L. Alvisi, A. Clement, M. Dahlin, J. Martin et al., BAR Fault Tolerance for Cooperative Services Allmydata Tahoe: A Distributed Storage and Backup Tool Retrivability of Data in Ad-Hoc Backup (Master Thesis) Basic Concepts and Taxonomy of Dependable and Secure Computing, Proc. of the ACM Symp. on Operating Systems Principles IEEE Transactions on Dependable and Secure ComputingBackus 1978] J. BACKUS. Can Programming Be Liberated from the von Neumann Style? A Functional Style and Its Algebra of Programs. In Communications of the ACM, pp.45-58, 1978.

]. K. Barr and K. Asanovic, Energy-aware lossless data compression, ACM Transactions on Computer Systems, vol.24, issue.3, pp.250-291, 2006.
DOI : 10.1145/1151690.1151692

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Barreto, P. C. Ferreira, K. Batten, A. Barr, S. Saraf et al., A Replicated File System for Resource Constrained Mobile Devices pStore: A Secure Peer-to-Peer Backup System, Proc. of the IADIS Int. Conf. on Applied Computing, 2001.

K. Bennett, C. Grothoff, T. Horozov, and J. T. Lindgren, An Encoding for Censorship- Resistant Sharing, Proc. of the 7th Australasian Conf. on Information Security and Privacy, 2002.

R. Bhagwan, K. Tati, Y. Cheng, S. Savage, and G. M. Voelker, Total Recall: System Support for Automated Availability Management, Proc. of the ACM/USENIX Symp. on Networked Systems Design and Implementation, 2004.

J. Bicket, D. Aguayo, S. Biswas, and R. , Architecture and Evaluation of an Unplanned 802.11b Mesh Network A Simple and Efficient Implementation for Small Databases Compare-by-Hash: A Reasoned Analysis, Proc. of the Int. Conf. on Mobile Computing and Networking (MobiCom) Proc. of the 11th ACM Symp. on Operating System Principles Proc. of the USENIX Annual Technical Conf., Systems and Experience Track, pp.31-42, 1979.

W. J. Bolosky, J. R. Douceur, D. Ely, M. M. Theimer, V. Boulkenafed et al., Feasibility of a Serverless Distributed File System Deployed on an Existing Set of Desktop PCs AdHocFS: Sharing Files in WLANs The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks Enforcing Service Availability in Mobile Ad-Hoc WANs, Proc. of the Int. Conf . on Measurement and Modeling of Computer Systems Proc. of the 2nd Int. Symp. on Network Computing and Applications Proc. of WiOpt '03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks Proc. of the 1st ACM Int. Symp. on Mobile Ad Hoc Networking & Computing, pp.34-43, 2000.

L. Buttyán and J. Hubaux, Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks, ACM/Kluwer Mobile Networks and Applications, pp.579-592, 2003.

C. Béounes, M. Aguéra, J. Arlat, K. Kanoun, J. Laprie et al., SURF-2: A program for dependability evaluation of complex hardware and software systems, FTCS-23 The Twenty-Third International Symposium on Fault-Tolerant Computing, pp.668-673, 1993.
DOI : 10.1109/FTCS.1993.627372

J. Callas, L. Donnerhacke, H. Finney, R. C. Thayer, C. Campo et al., OpenPGP Message Format (RFC 2440) Internet Engineering Task Force (IETF) DNS-Based Service Discovery in Ad Hoc Networks: Evaluation and Improvements Small Worlds in Security Systems: an Analysis of the PGP Certificate Graph, Proc. of the Int. Conf. on Personal Wireless Communications Proc. of the Workshop on New Security Paradigms IEEE Transactions on Mobile Computing, pp.111-122, 1998.

. Cerf, Delay-Tolerant Networking Architecture (RFC 4838) Google Corporation MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card DNS-Based Service Discovery, Proc. of the Annual Joint Conf. of the IEEE Computer and Communications Societies, pp.882-893, 2004.

]. A. Chiu, O. Clarke, B. Sandberg, T. W. Wiley, . H. Hong-]-t et al., Authentication Mechanisms for ONC RPC (RFC 2695) Internet Engineering Task Force (IETF) Freenet: A Distributed Anonymous Information Storage and Retrieval System, Proc. of the Int. Workshop on Designing Privacy Enhancing Technologies Optimized Link State Routing Protocol (RFC 3626). INRIA, pp.46-66, 1999.

J. Cooley, C. Taylor, A. B. Peacock, P. Cornell, F. Dinda et al., ABS: The Apportioned Backup System Wayback: A User-level Versioning File System for Linux, Proc. of the USENIX Annual Technical Conf., FREENIX Track, pp.19-28, 2002.

F. Cornelli, E. Damiani, S. D. Vimercati, S. Paraboschi, and P. Samaraticourtès, Choosing Reputable Servents in a P2P Network Storage Tradeoffs in a Collaborative Backup Service for Mobile Devices Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices Security Rationale for a Cooperative Backup Service for Mobile Devices, Proc. of the 11th World Wide Web Conf Proc. of the 6th European Dependable Computing Conf Proc. of the IEEE Int. Symp. on Pacific Rim Dependable Computing Proc. of the Latin-American Symp. on Dependable ComputingCourtès 2007] L. COURTÈS. Using Avahi in Guile Scheme Programs, pp.129-138, 2002.

. Cox, Making Backup Cheap and Easy Samsara: Honor Among Thieves in Peer-to-Peer Storage, 5th USENIX Symp. on Operating Systems Design and Implementation Proc. 19th ACM Symp. on Operating Systems Principles, pp.285-298, 2001.

F. Dabek, M. F. Kaashoek, D. Karger, R. Morris, I. Stoica et al., The Bayou Architecture: Support for Data Sharing Among Mobile Users Intrusion Tolerance in Distributed Computing Systems [Deutsch 1996] P. DEUTSCH. DEFLATE Compressed Data Format Specification Version 1.3 (RFC 1951) Internet Engineering Task Force (IETF) ZLIB Compressed Data Format Specification Version 3.3 (RFC 1950) Internet Engineering Task Force (IETF), Proc. 18th ACM Symp. on Operating Systems Principles Proc. of the Workshop on Mobile Computing Systems and Applications Proc. of the IEEE Symp Security and Privacy The Transport Layer Security (TLS) Protocol, Version 1.1 (RFC 4346). Internet Engineering Task Force (IETF) Peer-to-Peer: Harnessing the Power of Disruptive Technologies Chapter 16Dolstra & Hemel 2007] E. DOLSTRA, A. HEMEL. Purely Functional System Configuration Management Proc. of the Workshop on Hot Topics in Operating Systems (HotOS XI), USENIX Association, pp.202-215, 1991.

]. J. Douceur, The Sybil Attack, Revised Papers from the 1st Int. Workshop on Peer-to-Peer Systems (IPTPS), pp.251-260, 1997.
DOI : 10.1007/3-540-45748-8_24

M. Eisler, A. Chiu, L. Ling-]-m, . M. Eisler-]-c, and . Ellison, RPCSEC_GSS Protocol Specification (RFC 2203) Internet Engineering Task Force (IETF) http://tools.ietf.org/html/rfc2203 XDR: External Data Representation Standard (RFC 4506) Internet Engineering Task Force (IETF) Establishing Identity Without Certification Authorities, Proc. of the 6th USENIX Security Symp, pp.67-76, 1996.

C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas et al., SPKI Certificate Theory (RFC 2693) Internet Engineering Task Force (IETF) Cooperative Backup System, The USENIX Conf. on File and Storage Technologies Progress Report) ELNOZAHY. A Survey of Rollback-Recovery Protocols in Message-Passing Systems. In ACM Computing Surveys, pp.375-408, 1999.

]. S. Farrell, V. M. Cahill-]-l, M. Feeney, and . Nilssonfischer, A Delay-Tolerant Network Architecture for Challenged Internets Security Considerations in Space and Delay Tolerant Networks Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment, ERSHOV. On Programming of Arithmetic Operations Proc. of the Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM) Proc. of the 2nd IEEE Int. Conf. on Space Mission Challenges for Information Technology Proc. of the 20th IEEE Conf. on Computer Communications (IEEE InfoCom, pp.3-6, 1958.

M. J. Fischer, N. A. Lynch, and M. S. Paterson, Impossibility of distributed consensus with one faulty process, Journal of the ACM, vol.32, issue.2, pp.374-382, 1985.
DOI : 10.1145/3149.214121

J. Flinn, S. Sinnamohideen, N. Tolia, and M. Satyanarayanangamma, Data Staging on Untrusted Surrogates Design Patterns?Elements of Reusable Object-Oriented Software, Proc. of the USENIX Conf. on File and Storage Technologies (FAST), 1995.

E. R. Gansner, S. C. Koutsofios, K. North, and . Vo, A technique for drawing directed graphs, Proc. of the DARPA Information Survivability Conf, pp.184-195, 1993.
DOI : 10.1109/32.221135

]. T. Gibson and E. L. Miller, Long-Term File Activity Patterns in a UNIX Workstation Environment, Proc. of the 15th IEEE Symp. on Mass Storage Systems, pp.355-372, 1998.

J. Girao, D. Westhoff, E. Mykletun, and T. Araki, TinyPEDS: Tiny persistent encrypted data storage in asynchronous wireless sensor networks, Ad Hoc Networks, pp.1073-1089, 2007.
DOI : 10.1016/j.adhoc.2006.05.004

Y. Y. Goland, T. Cai, P. Leach, Y. Gu, S. V. Albright et al., Simple Service Discovery Protocol/1. 0 Operating without an Arbiter. Internet Engineering Task Force (IETF) Towards an Archival Intermemory, Proc. IEEE Int. Forum on Research and Technology Advances in Digital Libraries (ADL'98), pp.147-156, 1981.

J. Gray-]-a and . Green, The Transaction Concept: Virtues and Limitations The Penumbra Broadcast-Based Wireless Network] C. GROTHOFF. An Excess-Based Economic Model for Resource Allocation in Peer-to- Peer Networks, Proc. of the Int. Conf . on Very Large Data Bases Wirtschaftsinformatik, pp.144-154, 1981.

. Bibliography and . Guttman, RFC 2608 --Service Location Protocol, Version 2 http://tools.ietf . org/html/rfc2608 GIT?A Stupid Content Tracker Évaluation de la sûreté de fonctionnement d'un système de sauvegarde coopérative pour des dispositifs mobiles, Proc. of the Linux Symp., Volume One, pp.385-393, 1968.

K. A. Harras, M. P. Wittie, K. C. Almeroth, E. M. Belding, . Paranets-]-v et al., A Parallel Network Architecture for Challenged Networks Efficient Resource Discovery in Wireless Ad Hoc Networks: Contacts Do Help An Analysis of Compare-by-hash The Vesta Approach to Software Configuration Management File System Design for an NFS File Server Appliance The USENIX Association The Quest for Security in Mobile Ad Hoc Networks An Empirical Study of Delta Algorithms, Proc Resource Management in Wireless Networking Proc. of HotOS IX: The 9th Workshop on Hot Topics in Operating Systems Proc. of the USENIX Winter Technical Conf. Proc. of the 2nd ACM Int. Symp. on Mobile Ad Hoc Networking & Computing Software configuration management: ICSE 96 SCM-6 Workshop, pp.13-18, 1994.

. Jaffer, GNU's Ubiquitous Intelligent Language for Extension, 1996.

. Jain, Using Redundancy to Cope with Failures in a Delay Tolerant Network Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet, Proc. of the Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), pp.109-120, 2002.

A. Karypidis, S. A. Lalis, S. Karypidis, and . Laliskelsey, Exploiting Co-Location History for Efficient Service Selection in Ubiquitous Computing Systems OmniStore: A System for UbiquitousPersonal Storage Management, Proc. of the Int. Conf. on Mobile and Ubiquitous Systems (MobiQuitous) Proc. of the Annual IEEE Int. Conf. on Pervasive Computing and Communications (PerCom) Higher-Order and Symbolic Computation, pp.202-209, 1998.

J. G. Kemeny, J. L. Snell-]-m, M. Kim, B. A. Kumar, and . Shirazi, Finite Markov Chains Service Discovery using Volunteer Nodes for Pervasive Environments, Proc. of the Int. Conf. on Pervasive Services (ICPS), pp.188-197, 1960.

. Bibliography and . Klemm, A Special-Purpose Peer-to-Peer File Sharing System for Mobile Ad Hoc Networks, Proc. of the 58th Vehicular Technology Conf, pp.2758-2763, 2000.

J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton et al., OceanStore: An Architecture for Global- Scale Persistent Storage Redundancy Elimination Within Large Collections of Files An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks Incentives for Cooperation in Peer-to-Peer Networks, Proc. of the 9th Int. Conf. on Architectural Support for Programming Languages and Operating Systems Proc. of the USENIX Annual Technical Conf. Proc. of the Conf. on Privacy Enhancing Technologies , Lecture Notes in Computer Science Proc. of the Workshop on Economics of Peer-to-Peer Systems, pp.190-201, 2000.

M. Landers, H. Zhang, K. Tan, and . Peerstorelee, Better Performance by Relaxing in Peerto-Peer Backup Conf. on Peer-to-Peer Computing Operation-based Update Propagation in a Mobile File System Estimation Based Erasure Coding Routing in Delay Tolerant Networks, Proc. of the 4th Int Proc. of the USENIX Annual Technical Conf Proc. of the Int. Conf. on Communications and Mobile ComputingLiedtke 1993] J. LIEDTKE. A Persistent System in Real Use ? Experiences of the First 13 Years Proc. of the Int. Workshop on Object-Orientation in Operating Systems (I-WOOOS)Liefke & Suciu 2000] H. LIEFKE, D. SUCIU. XMill: an Efficient Compressor for XML Data Proc. of the ACM SIGMOD Int. Conf. on Management of Data, pp.72-79, 1993.

M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard, A Cooperative Internet Backup Scheme, Proc. of the USENIX Annual Technical Conf, pp.29-42, 2003.

W. K. Lin, D. M. Chiu, and Y. B. Lee, Erasure code replication revisited, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings., pp.90-97, 2004.
DOI : 10.1109/PTP.2004.1334935

]. B. Loo, A. Lamarca, and G. Berkeley, Peer-To-Peer Backup for Personal Area Networks, Proc. of the 5th Workshop on Hot Topics in Networks The GNU Arch Distributed Revision Control System MANBER. Finding Similar Files in a Large File System Proc. of the USENIX Winter 1994 Conf, pp.85-90, 1994.

M. A. Marsan, G. Balbo, G. Conte, S. Donatelli, G. Franceschinismarti et al., Modeling with Generalized Stochastic Petri Nets Identity Crisis: Anonymity vs Reputation in P2P Systems Increasing Data Resilience of Mobile Devices with a Collaborative Backup Service, IEEE Conf. on Peer-to-Peer Computing Supplemental Proc. of the Int. Conf. on Dependable Systems and Networks (DSN'06) MARTINIAN. Distributed Internet Backup System. MIT, USA MAVROGIANNOPOULOS. Using OpenPGP Keys for Transport Layer Security Authentication (RFC 5081). Internet Engineering Task Force (IETF), pp.134-141, 1995.

]. E. Burt, The Backup and Recovery Tool, Proc. of the USENIX Conf. on System AdministrationMenascé 2003] D. A. MENASCÉ. Security Performance IEEE Internet Computing, pp.207-218, 1999.

]. R. Merkle, . Protocols, ]. P. For-public-key-cryptosystems, R. Michiardi, and . Molva, CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks [Milgram 1967] S. MILGRAM. The Small World Problem, Proc. of the IEEE Symp Proc. of the 6th IFIP TC6/TC11 Joint Conf. on Communications and Multimedia Security Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control, pp.122-134, 1967.

M. Mitzenmacher-]-g, C. Montenegro, . F. Castelluccia, T. Morcos, P. Chantem et al., Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses iDIBS: An Improved Distributed Backup System, Digital Fountains: A Survey and Look Forward Proc Proc. of the Network and Distributed System Security Symp. (NDSS) Proc. of the Int. Conf. on Parallel and Distributed Systems (ICPADS)Mummert et al. 1995] L. B. MUMMERT, M. R. EBLING, M. SATYANARAYANAN. Exploiting Weak Connectivity for Mobile File Access Proc. of the 15th ACM Symp. on Operating Systems Principles, pp.271-276, 1995.

. Nessie-consortium, /. Nessie-security-report, W. N. Doc-/-ens-/, J. Nethercote, and . Seward, [NESSIE Consortium 2003b] NESSIE Consortium. Portfolio of Recommended Cryptographic Primitives Valgrind: A Framework for Heavyweight Dynamic Binary Instrumentation, Proc. of the 18th ACM Symp. on Operating Systems Principles Proc. of the ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI), pp.174-187, 2001.

E. B. Nightingale, J. F. Flinn-]-m, . Oberhumer-]-n, P. Oualha, Y. Michiardi et al., LZO Real-Time Data Compression LibraryOne Laptop Per Child Project 2007] One Laptop Per Child Project. Mesh Networking in OLPC Version 1.0.1 A Game Theoretic Model of a Protocol for Data Possession Verification, Energy-Efficiency and Storage Flexibility in the Blue File System Proc. of the 6th Symp. on Operating Systems Design and Implementation Proc. of the IEEE Int. Workshop on Trust, Security, and Privacy for Ubiquitous Computing (TSPUC)Oualha et al. 2007b] N. OUALHA, S. M. ÖNEN, Y. ROUDIER. Verifying Self-Organized Storage with Bilinear PairingsPapadopouli & Schulzrinne 2000] M. PAPADOPOULI, H. SCHULZRINNE. Seven Degrees of Separation in Mobile Ad Hoc Networks IEEE Conf. on Global Communications (GLOBECOM), 2000.

C. Park, J. Kang, S. Park, J. K. Perkins, E. M. Belding-royer et al., Energy-Aware Demand Paging on NAND Flash-Based Embedded Storages] A. PEACOCK. flud Backup: A Free Peer-to-Peer Backup System, Proc. of the Int. Symp. on Low Power Electronics and Design RFC3561 ? Ad hoc On-Demand Distance Vector (AODV) Routing. Internet Engineering Task Force, pp.338-343, 2003.

Z. N. Peterson and R. C. Burns, Ext3cow: The Design, Implementation, and Analysis of Metadata for a Time-Shifting File System, Libckpt: Transparent Checkpointing Under Unix, 2003.

]. L. Poettering, The Avahi DNS-SD/mDNS Free Implementation, Proc. of the USENIX Annual Technical Conf., USENIX Association] L. POETTERING. Diensteverwaltung in Ad-Hoc-Netzwerken (Diplomarbeit). Fakultät für Mathematik, Informatik und Naturwissenschaften, 1995.

N. Preguica, C. Baquero, J. L. Martins, M. Shapiro, P. S. Almeida et al., FEW: File Management for Portable Devices, Proc. of the Int. Workshop on Software Support for Portable StoragePrevayler.Org 2006] Prevayler.Org. Prevayler, a Java Implementation of " Object Prevalence, 2005.
URL : https://hal.archives-ouvertes.fr/inria-00444798

&. Quinlan, S. Dorward, S. D. Quinlan, A. Rahman, T. Inomata et al., Venti: A New Approach to Archival Storage Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks, Proc. of the 1st USENIX Conf. on File and Storage Technologies Proc. of the 1st Int. Conf. on Ubiquitous Convergence Technology, pp.89-101, 2002.

. Ranganathan, tel-00196822, version 1 -13, 2002.

K. Ranganathan, A. Iamnitchi, and I. F. , Improving Data Availability Through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities Hibernate: Relational Persistence for Java and .NET, Proc. of the Workshop on Global and Peer-to-Peer Computing on Large Scale Distributed Systemswww.hibernate.org/. [Rubel 2005] M. RUBEL. Rsnapshot: A Remote Filesystem Snapshot Utility Based on Rsync, pp.376-381, 2002.

F. Sailhan, V. I. Scalable-service, M. J. Discovery-for, . S. Saltzer, M. J. Santry et al., Naming and Binding of Objects Deciding When to Forget in the Elephant File System The MITRE Corporation, Proc. of the IEEE Int. Conf. on Pervasive Computing and Communication Operating Systems, An Advanced Course Proc. of the 17th ACM Symp. on Operating Systems Principles, pp.99-208, 1978.

]. J. Seward, L. Bzip2, ]. J. Website, J. Shapiro, . S. Adams-]-j et al., Design Evolution of the EROS Single-Level Store CPCMS: A Configuration Management System Based on Cryptographic Names] O. SHIVERS. SRFI-1 ? List Library. Massachusetts Institute of Technology, Proc. of the USENIX Annual Technical Conf. Proc. of the USENIX Annual Technical Conf., FREENIX Track 2003] E. SIT, J. CATES, R. COX. A DHT-based Backup System, pp.207-220, 1999.

C. A. Soules, G. R. Goodson, J. D. Strunk, G. R. Ganger-]-t, K. Spyropoulos et al., Metadata Efficiency in Versioning File Systems [Spyropoulos et al Efficient Routing in Intermittently Connected Mobile Networks: The Single-Copy Case RPC: Remote Procedure Call Protocol Specification, Version 2 (RFC 1831) Internet Engineering Task Force (IETF) MyriadStore: A Peer-to-Peer Backup System, Proc. of the 2nd USENIX Conf. on File and Storage Technologies, 1995.

M. Stemm, P. Gauthier, D. Harada, and R. H. Katz, Reducing Power Consumption of Network Interfaces in Hand-Held Devices, IEEE Transactions on Communications, pp.80-1125, 1997.

H. Sözer, M. Tekkalmaz, and I. Körpeoglu, A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks, Proc. of the 3rd Annual Mediterranean Ad Hoc Networking Workshop (MedHoc), 1986.

A. S. Tanenbaum, S. J. Mullender, and R. V. Renesse, Using Sparse Capabilities in a Distributed Operating System [The UbiSec Project 2005] The UbiSec Project. Ubiquitous Networks with a Secure Provision of Services, Access, and Content Delivery, Proc. of the Int. Conf. on Distributed Computing Systems (ICDCS) TICHY. RCS?A System for Version Control. In Software?Practice & Experience, pp.558-563, 1985.

N. Tolia, M. Kozuch, M. Satyanarayanan, B. Karp, T. Bressoud et al., Opportunistic Use of Content Addressable Storage for Distributed File Systems Integrating Portable and Distributed Storage, Proc. of the USENIX Annual Technical Conf. Proc. of the USENIX Conf. on File and Storage Technologies, pp.127-140, 2003.

A. Tridgell, P. Mackerras-]-a, P. Tridgell, J. Russel, . Allison-]-a et al., The Rsync Algorithm The Trivial Database Data Durability in Peer to Peer Storage Systems Erasure-Coding Based Routing for Opportunistic Networks Finding Collisions in the Full SHA-1 A Distributed Data Caching Framework for Mobile Ad Hoc Networks, Proc. of the 4th Workshop on Global and Peer to Peer Computing Proc. of the ACM SIGCOMM Workshop on Delay-Tolerant Networking Proc. of the CRYPTO Conf. Proc. of the 2006 Int. Conf. on Communications and Mobile Computing Revised Papers from the 1st Int. Workshop on Peer-to-Peer Systems, pp.90-97, 1996.

J. Widmer and J. L. Boudec, Network coding for efficient communication in extreme networks, Proceeding of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking , WDTN '05, pp.284-291, 2005.
DOI : 10.1145/1080139.1080147

. Xu, Low Density MDS Codes and Factors of Complete Graphs, IEEE Transactions on Information Theory, pp.1817-1826, 1999.

]. L. Xu-l, C. You, and . Karamanolis, Hydra, Proceedings of the 2005 ACM workshop on Storage security and survivability , StorageSS '05, pp.108-114, 2004.
DOI : 10.1145/1103780.1103797

L. L. You, K. T. Pollack, and D. D. Longzhang, Deep Store: An Archival Storage System Architecture Reducing Energy Consumption on Mobile Devices with WiFi Interfaces, Proc. of the 21st Int. Conf. on Data Engineering (ICDE 2005) Proc. of the IEEE Global Telecommunications Conf. (Globecom) Routing in Intermittently Connected Mobile Ad Hoc Networks and Delay Tolerant Networks: Overview and Challenges IEEE Communications Surveys & Tutorials, pp.804-815, 2005.

J. Zheng and M. J. Lee, Will IEEE 802.15.4 Make Ubiquitous Networking a Reality? A Discussion on a Potential Low Power, Low Bit Rate Standard, IEEE Communications Magazine, pp.140-146, 2004.

. Zöls, The Hybrid Chord Protocol: A Peer-to-Peer Lookup Service for Context-Aware Mobile Applications, Proc. of the Int. Conf. on Networking, pp.781-792, 2005.
DOI : 10.1007/978-3-540-31957-3_88