A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken et al., FARSITE : Federated, available, and reliable storage for an incompletely trusted environment Efficient computation modulo a shared secret with application to the generation of shared safe-prime products, Proceedings of the 5th ACM Symposium on Operating System Design and Implementation (OSDI) Proceedings of the 22nd Annual International Cryptology Conference, volume 2442 of Lecture Notes in Computer Science, pp.1-14, 2002.

[. Amann, B. Elser, Y. Houri, and T. Fuhrmann, IgorFs: A Distributed P2P File System, 2008 Eighth International Conference on Peer-to-Peer Computing, 2008.
DOI : 10.1109/P2P.2008.19

P. David, G. Anderson, B. A. Adar, and . Huberman, Free riding on gnutella Chord-PKI : Embedding a public key infrastructure into the chord overlay network, Proceedings of the 6th IEEE International Symposium on Cluster Computing and the Grid (CCGRID)AKD07] Agapios Avramidis, Panayiotis Kotzanikolaou, and Christos Douligeris Proceedings of the 4th European Public Key Infrastructure Workshop (EuroPKI), volume 4582 of Lecture Notes in Computer Science, pp.73-80, 2000.

I. Baumgart and . P2pns, A secure distributed name service for P2PSIP IEEE Computer Society. [BF97] Boneh and Franklin. Efficient generation of shared RSA keys Safeguarding cryptographic keys, Proceedings of the 6th IEEE International Conference on Pervasive Computing and Communications (PerCom) Proceedings of the 17th Annual International Cryptology Conference (CRYPTO), pp.480-485, 1997.

J. T. Merwin, M. Zanca, A. David, B. B. Bryan, C. Lowekamp et al., SO- SIMPLE : A serverless, standards-based, P2P SIP communication system, Proceedings of the AFIPS National Computer Conference Proceedings of the International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications (AAA-IDEA), pp.313-317, 1979.

H. Burton and . Bloom, Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, pp.422-426, 1970.

S. Balfe, A. D. Lakhani, and K. G. Paterson, Trusted computing : Providing security for peer-to-peer networks Computational puzzles as sybil defenses, Proceedings of the 5th IEEE International Conference on Peer-to-Peer Computing (P2P) Proceedings of the 6th IEEE International Conference on Peer-to- Peer Computing (P2P), pp.117-124, 2005.

C. Boyd, [. Busca, F. Picconi, and P. Sens, Digital multisignatures Pastis : A highly-scalable multi-user peer-to-peer file system, Cryptography and Coding Proceedings of 11th International Euro-Par Conference, pp.241-246, 1989.

[. Bhattacharjee, R. Rodrigues, and P. Kouznetsov, Secure lookup without (constrained) flooding An analysis of the skype peer-to-peer internel telephony protocol, Proceedings of the 1st Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS)BS06] Salman Baset and Henning Schulzrinne Proceedings of the 25th IEEE Conference on Computer Communications (INFOCOM), 2006.

L. Cbh03-]-srdjan-capkun, J. Buttyán, M. Castro, A. I. Costa, and . Rowstron, Self-organized public-key management for mobile ad hoc networks, Proceedings of the 2nd USENIX Symposium on Networked Systems Design and Implementation (NSDI). USENIX, pp.52-64, 2003.
DOI : 10.1109/TMC.2003.1195151

M. Castro, P. Druschel, A. J. Ganesh, A. I. Rowstron, and D. S. Wallach, Secure routing for structured peerto-peer overlay networks, Proceedings of the 5th ACM Symposium on Operating System Design and Implementation (OSDI), Operating Systems Review, pp.299-314, 2002.
DOI : 10.1145/1060289.1060317

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.1870

M. Castro, P. Druschel, A. Kermarrec, A. Nandi, A. I. Rowstron et al., Splitstream : high-bandwidth multicast in cooperative environments, Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP) of Operating Systems Review, pp.298-313, 2003.

A. Cheng and E. Friedman, Sybilproof reputation mechanisms, Proceeding of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems , P2PECON '05, pp.128-132, 2005.
DOI : 10.1145/1080192.1080202

V. Tyson-condie, S. Kacholia, . Sank, and M. Joseph, Hellerstein , and Petros Maniatis. Induced churn as shelter from routingtable poisoning, Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS), 2006.

[. Congos and F. Lesueur, Experimenting with distributed generation of RSA keys, Proceedings of the 5th International Workshop on Security and Trust Management (STM), Electronic Notes in Theoretical Computer Science, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00423326

[. Cox, A. Muthitacharoen, and R. Morris, Serving DNS Using a Peer-to-Peer Lookup Service, First International Workshop on Peer-to-Peer Systems (IPTPS), volume bridge, 2000.
DOI : 10.1007/3-540-45748-8_15

B. Cohen, Incentives build robustness in bittorrent, Proceedings of the Workshop on Economics of Peer-to-Peer Systems, 2003.

S. Ratnasamy, L. Breslau, N. Lanham, and S. Shenker, Making gnutella-like P2P systems scalable Freenet : A distributed anonymous information storage and retrieval system, Proceedings of the ACM Conference on Applications , Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM) Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, pp.407-418, 2003.

. Springer, Compliance defects in public key cryptography, Proceedings of the 6th USENIX Security Symposium, pp.171-178, 1996.

Y. Desmedt, Society and Group Oriented Cryptography: a New Concept, Proceedings of Advances in Cryptology (CRYPTO), pp.120-127, 1987.
DOI : 10.1007/3-540-48184-2_8

Y. Desmedt, [DF89] Yvo Desmedt and Yair Frankel. Threshold cryptosystems International Association for Cryptologic Research Shared generation of authenticators and signatures, Proceedings of the 1st International Workshop on Information Security (ISW), volume 1396 of Lecture Notes in Computer Science Proceedings of Advances in Cryptology (CRYPTO) Proceedings of Advances in Cryptology (CRYPTO), volume 576 of Lecture Notes in Computer Science International Association for Cryptologic Research, pp.158-173, 1989.

C. R. Davis, J. Fernandez, S. Neville, J. Robert, and J. Mchugh, Sybil attacks as a mitigation strategy against the Storm botnet, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE), pp.32-40, 2008.
DOI : 10.1109/MALWARE.2008.4690855

J. Dinger and H. Hartenstein, Defending the sybil attack in P2P networks : Taxonomy, challenges, and a proposal for selfregistration, Proceedings of the 1st International Conference on Availability, Reliability and Security (ARES), pp.756-763, 2006.

Y. Desmedt and S. Jajodia, Redistributing secret shares to new access structures and its applications, 1997.

M. F. Kaashoek, D. R. Karger, R. Morris, and I. Stoica, Wide-area cooperative storage with CFS, Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP), pp.202-215, 2001.

[. Danezis, C. Lesniewski-laas, M. F. Kaashoek, and R. Anderson, Sybil-Resistant DHT Routing, Proceedings of the 10th European Symposium on Research in Computer Security (ESORICS), pp.305-318, 2005.
DOI : 10.1007/11555827_18

G. Danezis and P. Mittal, Sybilinfer : Detecting sybil nodes using social networks, Proceedings of the 16th Annual Symposium on Network and Distributed System Security, 2009.

R. John and . Douceur, The sybil attack, Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), volume 2429 of Lecture Notes in Computer Science, pp.251-260, 2002.

P. Druschel and A. I. Rowstron, PAST: a large-scale, persistent peer-to-peer storage utility, Proceedings Eighth Workshop on Hot Topics in Operating Systems, pp.75-80, 2001.
DOI : 10.1109/HOTOS.2001.990064

B. [. Ellison and . Schneier, Ten risks of PKI : What you're not being told about public-key infrastructure, Desmedt. Parallel reliable threshold multisignature, pp.31469-4721, 1985.

[. Frankel, P. Gemmell, P. D. Mackenzie, and M. Yung, Optimal-resilience proactive public-key cryptosystems, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.384-393, 1997.
DOI : 10.1109/SFCS.1997.646127

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.46.6651

[. Frankel, P. Gemmell, P. D. Mackenzie, M. Yung, and R. Proactive, Witness-based cryptographic program checking and robust function sharing, Proceedings of the twenty-eighth annual ACM symposium on Theory of computing , STOC '96, pp.440-454, 1996.
DOI : 10.1145/237814.237998

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.55.2885

[. Frankel, P. D. Mackenzie, and M. Yung, Robust efficient distributed RSA-key generation, Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing , PODC '98, pp.663-672, 1998.
DOI : 10.1145/277697.277779

A. Fiat, J. Saia, and M. Young, Making chord robust to byzantine attacks Gosskip, an efficient, fault-tolerant and self organizing overlay using gossip-based construction and skip-lists principles, Proceedings of the 13th Annual European Symposium on Algorithms (ESA), volume 3669 of Lecture Notes in Computer Science Proceedings of the 6th IEEE International Conference on Peer-to- Peer Computing (P2P), pp.803-814, 2005.

[. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, Robust and Efficient Sharing of RSA Functions, Proceedings of the 16th Annual International Cryptology Conference (CRYPTO), pp.157-172, 1996.
DOI : 10.1007/3-540-68697-5_13

[. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, Robust Threshold DSS Signatures, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT) International Association for Cryptologic Research, pp.354-371, 1996.
DOI : 10.1007/3-540-68339-9_31

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.32.1659

[. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, Secure distributed key generation for discrete-log based cryptosystems, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT), volume 1599 of Lecture Notes in Computer Science, pp.295-310, 1999.

[. Gupta, O. D. Sahin, D. Agrawal, and . Abbadi, Meghdoot: Content-Based Publish/Subscribe over P2P Networks, Proceedings of the ACM/IFIP/USENIX International Middleware Conference (Middleware), pp.254-273, 2004.
DOI : 10.1007/3-540-45518-3_18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.167.3996

]. Har94, M. Douglas, and . Blough, Group-oriented (t, n) threshold digital signature scheme and digital multisignature Computers and Digital Techniques The effect of replica placement on routing robustness in distributed hash tables, Proceedings of the 6th IEEE International Conference on Peer-to- Peer Computing (P2P), pp.307-313, 1994.

A. Oliver-heckmann, A. Bock, R. Mauthe, and . Steinmetz, The eDonkey file-sharing network, Proceedings of the Workshop on Algorithms and Protocols for Efficient Peer-to-Peer Applications (Informatik ), volume 51 of LNI, pp.224-228, 2004.

A. Harrington and C. Jensen, Cryptographic access control in a distributed file system [HS05] David Hausheer and Burkhard Stiller. Peermint : Decentralized and secure accounting for peer-to-peer applications, Proceedings of the 8th ACM Symposium on Access Control Models and Technologies (SACMAT) Proceedings of the 4th International IFIP-TC6 Networking Conference, pp.158-168, 2003.

[. Jelasity, A. Montresor, G. P. Jesi, and S. Voulgaris, The Peersim simulator

K. William, . Josephson, F. B. Emin-gün-sirer, and . Schneider, Peer-to-peer authentication with a distributed single sign-on service, Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS), pp.250-258, 2004.

[. Jarecki, N. Saxena, and J. Yi, An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks , SASN '04, pp.1-9, 2004.
DOI : 10.1145/1029102.1029105

J. Kleinberg, The small-world phenomenon, Proceedings of the thirty-second annual ACM symposium on Theory of computing , STOC '00, pp.163-170, 2000.
DOI : 10.1145/335305.335325

[. Kim, D. Mazzochi, and G. Tsudik, Admission control in peer groups, Proceedings of the IEEE International Symposium on Network Computing and Applications (NCA), pp.131-139, 2003.

P. Kong, H. Zerfos, S. Luo, L. Lu, and . Zhang, Providing robust and ubiquitous security support for mobile ad hoc networks, Proceedings of the 9th IEEE International Conference on Network Protocols (ICNP), pp.251-260, 2001.

[. Liang, R. Kumar, and K. W. Ross, Understanding KaZaA, 2004.

H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks, IEEE/ACM Transactions on Networking, vol.12, issue.6, pp.1049-1063, 2004.
DOI : 10.1109/TNET.2004.838598

[. Lesueur, L. Mé, and V. Tong, Contrôle d'accès distribué à un réseau pair-à-pair, Proceedings of SAR-SSI, 2007.

[. Lesueur, L. Mé, and V. Tong, Gestion distribuée d'identités résistante à la sybil attack pour un réseau pair-à-pair, Proceedings of SAR-SSI, 2007.

[. Lesueur, L. Mé, and V. Tong, Detecting and excluding misbehaving nodes in a P2P network, Proceedings of the 8th International Conference on Innovative Internet Community Systems (I2CS), 2008.
URL : https://hal.archives-ouvertes.fr/hal-00353016

[. Lesueur, L. Mé, and V. Tong, A Distributed Certification System for Structured P2P Networks, Proceedings of the 2nd International Conference on Autonomous Infrastructure, Management and Security (AIMS), pp.40-52, 2008.
DOI : 10.1007/BFb0052253

URL : https://hal.archives-ouvertes.fr/hal-00287656

[. Lesueur, L. Mé, and V. Tong, A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification, 2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2008.
DOI : 10.1109/WETICE.2008.7

URL : https://hal.archives-ouvertes.fr/hal-00287700

[. Lesueur, L. Mé, and V. Tong, A sybilproof distributed identity management for P2P networks, 2008 IEEE Symposium on Computers and Communications, 2008.
DOI : 10.1109/ISCC.2008.4625694

URL : https://hal.archives-ouvertes.fr/hal-00287706

[. Lesueur, L. Mé, and V. Tong, An efficient distributed PKI for structured P2P networks, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 2009.
DOI : 10.1109/P2P.2009.5284491

URL : https://hal.archives-ouvertes.fr/hal-00423320

B. Neil-levine, C. Shields, and N. B. Margolin, A survey of solutions to the sybil attack, 2006.

[. Locher, S. Schmid, and R. Wattenhofer, eQuus: A Provably Robust and Locality-Aware Peer-to-Peer System, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), pp.3-11, 2006.
DOI : 10.1109/P2P.2006.17

[. Morselli, B. Bhattacharjee, J. Katz, and M. Marsh, Keychains : A decentralized public-key infrastructure, 2006.

C. Ralph and . Merkle, A digital signature based on a conventional encryption function, Advances in Cryptology (CRYPTO) International Association for Cryptologic Research, pp.369-378, 1987.

[. Marti, P. Ganesan, and H. Garcia-molina, DHT Routing Using Social Links, Proceedings of the 3rd International Workshop on Peer-to-Peer Systems (IPTPS)Mil67] S. Milgram, pp.100-11160, 1967.
DOI : 10.1007/978-3-540-30183-7_10

[. Mazières, M. Kaminsky, M. F. Kaashoek, and E. Witchel, Separating key management from file system security, Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), volume 2429 of Lecture Notes in Computer Science, pp.19-20, 2000.
DOI : 10.1145/346152.346183

T. D. Michael-malkin, D. Wu, and . Boneh, Experimenting with shared generation of RSA keys, Proceedings of the Symposium on Network and Distributed Systems Security (NDSS), pp.43-56, 1999.

D. Liben, J. Nowell, R. Novak, P. Kumar, A. Raghavan et al., Geographic routing in social networks [Ped91] Torben Pryds Pedersen. A threshold cryptosystem without a trusted party (extended abstract), Proceedings of the National Academy of Sciences Proceedings of the International Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT), pp.11623-11628, 1991.

T. Rabin, A simplified approach to threshold and proactive RSA, Proceedings of the 18th Annual International Cryptology Conference (CRYPTO), volume 1462 of Lecture Notes in Computer Science, pp.89-104, 1998.
DOI : 10.1007/BFb0055722

I. T. Antony, P. Rowstron, and . Druschel, Pastry : scalable, decentralized object location and routing for large-scale peer-topeer systems Limiting sybil attacks in structured P2P networks, Proceedings of the 18th IFIP/ACM International Conference on Distributed Systems Platforms (Middleware) Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM), pp.329-350, 2001.

S. Ratnasamy, P. Francis, M. Handley, R. M. Karp, and S. Shenker, A scalable content-addressable network, Proceedings of the ACM Conference on Applications , Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM) of Computer Communication Review, pp.161-172, 2001.

[. Rodrigues, B. Liskov, and L. Shrira, The design of a robust peer-to-peer system, Proceedings of the 10th workshop on ACM SIGOPS European workshop: beyond the PC , EW10, pp.117-124, 2002.
DOI : 10.1145/1133373.1133396

L. Ronald, R. D. Rivest, and . Silverman, Are 'strong' primes need for RSA ? Technical report, RSA Data Security, Inc., pub- RSA :adr, dec, 1998.

R. Rao and S. K. Singhal, P2P-IM: A P2P Presence System for the Internet, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), pp.233-234, 2007.
DOI : 10.1109/P2P.2007.28

R. L. Rivest, A. Shamir, and L. M. Adleman, A method for obtaining digital signature and public-key cryptosystems. Communication of the ACM : Password-Based Cryptography Standard, RSA02] RSA Laboratories. PKCS #1 v2.1 : RSA Cryptography Standard, pp.120-126, 1978.

[. Schultz, Mobile proactive secret sharing. Master's thesis, 2007.
DOI : 10.1145/1400751.1400856

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.7871

A. De-santis, Y. Desmedt, Y. Frankel, and M. Yung, How to share a function securely (extended summary), Proceedings of the 26th Annual ACM Symposium on the Theory of Computing (STOC), pp.522-533, 1994.

[. Steiner, T. En-najjary, and E. W. Biersack, Exploiting KAD, ACM SIGCOMM Computer Communication Review, vol.37, issue.5, pp.65-70, 2007.
DOI : 10.1145/1290168.1290176

[. Steiner, T. En-najjary, and E. W. Biersack, A global view of kad, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, pp.117-122, 2007.
DOI : 10.1145/1298306.1298323

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

[. Shoup, Practical Threshold Signatures, Proceedings of Advances in Cryptology (EUROCRYPT), volume 1807 of Lecture Notes in Computer Science, pp.207-220, 2000.
DOI : 10.1007/3-540-45539-6_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.7629

[. Schultz, B. Liskov, and M. Liskov, Mobile proactive secret sharing (brief announcement), Proceedings of the 27th Annual ACM Symposium on Principles of Distributed Computing (PODC), p.458, 2008.
DOI : 10.1145/1400751.1400856

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.7871

R. Sit and . Morris, Security considerations for peer-topeer distributed hash tables, Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), volume 2429 of Lecture Notes in Computer Science, pp.261-269, 2002.
DOI : 10.1007/3-540-45748-8_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.7175

R. Stoica, D. R. Morris, M. F. Karger, H. Kaashoek, and . Balakrishnan, Chord : A scalable peer-to-peer lookup service for internet applications, Proceedings of the ACM Conference on Applications, Technologies, Architectures , and Protocols for Computer Communications (SIGCOMM), pp.149-160, 2001.

. Singh, P. Tsuen-wan-ngan, D. S. Druschel, and . Wallach, Eclipse Attacks on Overlay Networks: Threats and Defenses, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, pp.1-12, 2006.
DOI : 10.1109/INFOCOM.2006.231

[. Shudo, Y. Tanaka, S. Sekigu-chi-nitesh, G. Saxena, J. H. Tsudik et al., Overlay Weaver: An overlay construction toolkit, Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), pp.402-412, 2003.
DOI : 10.1016/j.comcom.2007.08.002

[. Saxena, G. Tsudik, and J. H. Yi, Experimenting with admission control in P2P, Proceedings of the International Workshop on Advanced Developments in System and Software Security (WADIS), 2003.

[. Tang, Z. Xu, and M. Mahalingam, pSearch, ACM SIGCOMM Computer Communication Review, vol.33, issue.1, pp.89-94, 2003.
DOI : 10.1145/774763.774777

[. Wölfl, Public-Key-Infrastructure Based on a Peer-to-Peer Network, Proceedings of the 38th Annual Hawaii International Conference on System Sciences, 2005.
DOI : 10.1109/HICSS.2005.514

N. Rebecca, S. Wright, and . Spalding, Experimental performance of shared RSA modulus generation, Proceedings of the 10th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp.983-984, 1999.

T. M. Wong, C. Wang, and J. M. Wing, Verifiable secret redistribution for archive systems, First International IEEE Security in Storage Workshop, 2002. Proceedings., pp.94-106, 2002.
DOI : 10.1109/SISW.2002.1183515

[. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks, Proceedings of the IEEE Symposium on Security and Privacy (S&P), pp.3-17, 2008.
DOI : 10.1109/TNET.2009.2034047

[. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, SybilGuard : defending against sybil attacks via social networks, Proceedings of the Conference on Applications, Technologies , Architectures, and Protocols for Computer Communications (SIGCOMM), pp.267-278, 2006.
DOI : 10.1109/tnet.2008.923723

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.3018

[. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, SybilGuard : defending against sybil attacks via social networks, 2006.
DOI : 10.1109/tnet.2008.923723

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.3018

T. Ylönen, SSH -secure login connections over the internet, Proceedings of the 6th USENIX Security Symposium (SSYM), pp.37-42, 1996.

R. Philip and . Zimmermann, The Official PGP User's Guide, 1995.

A. Zimmermann, J. Johnston, F. B. Zhou, R. Schneider, and . Van-renesse, ZRTP : Extensions to RTP for Diffie-Hellman key agreement for SRTP. http://zfoneproject.com/zrtp_ietf.html, oct COCA : A secure distributed online certification authority APSS : Proactive secret sharing in asynchronous systems, ZSvR05] Lidong Zhou, Fred B. Schneider, and Robbert van Renesse, pp.329-368259, 2002.