FARSITE : Federated, available, and reliable storage for an incompletely trusted environment Efficient computation modulo a shared secret with application to the generation of shared safe-prime products, Proceedings of the 5th ACM Symposium on Operating System Design and Implementation (OSDI) Proceedings of the 22nd Annual International Cryptology Conference, volume 2442 of Lecture Notes in Computer Science, pp.1-14, 2002. ,
IgorFs: A Distributed P2P File System, 2008 Eighth International Conference on Peer-to-Peer Computing, 2008. ,
DOI : 10.1109/P2P.2008.19
Free riding on gnutella Chord-PKI : Embedding a public key infrastructure into the chord overlay network, Proceedings of the 6th IEEE International Symposium on Cluster Computing and the Grid (CCGRID)AKD07] Agapios Avramidis, Panayiotis Kotzanikolaou, and Christos Douligeris Proceedings of the 4th European Public Key Infrastructure Workshop (EuroPKI), volume 4582 of Lecture Notes in Computer Science, pp.73-80, 2000. ,
A secure distributed name service for P2PSIP IEEE Computer Society. [BF97] Boneh and Franklin. Efficient generation of shared RSA keys Safeguarding cryptographic keys, Proceedings of the 6th IEEE International Conference on Pervasive Computing and Communications (PerCom) Proceedings of the 17th Annual International Cryptology Conference (CRYPTO), pp.480-485, 1997. ,
SO- SIMPLE : A serverless, standards-based, P2P SIP communication system, Proceedings of the AFIPS National Computer Conference Proceedings of the International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications (AAA-IDEA), pp.313-317, 1979. ,
Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, pp.422-426, 1970. ,
Trusted computing : Providing security for peer-to-peer networks Computational puzzles as sybil defenses, Proceedings of the 5th IEEE International Conference on Peer-to-Peer Computing (P2P) Proceedings of the 6th IEEE International Conference on Peer-to- Peer Computing (P2P), pp.117-124, 2005. ,
Digital multisignatures Pastis : A highly-scalable multi-user peer-to-peer file system, Cryptography and Coding Proceedings of 11th International Euro-Par Conference, pp.241-246, 1989. ,
Secure lookup without (constrained) flooding An analysis of the skype peer-to-peer internel telephony protocol, Proceedings of the 1st Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS)BS06] Salman Baset and Henning Schulzrinne Proceedings of the 25th IEEE Conference on Computer Communications (INFOCOM), 2006. ,
Self-organized public-key management for mobile ad hoc networks, Proceedings of the 2nd USENIX Symposium on Networked Systems Design and Implementation (NSDI). USENIX, pp.52-64, 2003. ,
DOI : 10.1109/TMC.2003.1195151
Secure routing for structured peerto-peer overlay networks, Proceedings of the 5th ACM Symposium on Operating System Design and Implementation (OSDI), Operating Systems Review, pp.299-314, 2002. ,
DOI : 10.1145/1060289.1060317
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.1870
Splitstream : high-bandwidth multicast in cooperative environments, Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP) of Operating Systems Review, pp.298-313, 2003. ,
Sybilproof reputation mechanisms, Proceeding of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems , P2PECON '05, pp.128-132, 2005. ,
DOI : 10.1145/1080192.1080202
Hellerstein , and Petros Maniatis. Induced churn as shelter from routingtable poisoning, Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS), 2006. ,
Experimenting with distributed generation of RSA keys, Proceedings of the 5th International Workshop on Security and Trust Management (STM), Electronic Notes in Theoretical Computer Science, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00423326
Serving DNS Using a Peer-to-Peer Lookup Service, First International Workshop on Peer-to-Peer Systems (IPTPS), volume bridge, 2000. ,
DOI : 10.1007/3-540-45748-8_15
Incentives build robustness in bittorrent, Proceedings of the Workshop on Economics of Peer-to-Peer Systems, 2003. ,
Making gnutella-like P2P systems scalable Freenet : A distributed anonymous information storage and retrieval system, Proceedings of the ACM Conference on Applications , Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM) Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, pp.407-418, 2003. ,
Compliance defects in public key cryptography, Proceedings of the 6th USENIX Security Symposium, pp.171-178, 1996. ,
Society and Group Oriented Cryptography: a New Concept, Proceedings of Advances in Cryptology (CRYPTO), pp.120-127, 1987. ,
DOI : 10.1007/3-540-48184-2_8
[DF89] Yvo Desmedt and Yair Frankel. Threshold cryptosystems International Association for Cryptologic Research Shared generation of authenticators and signatures, Proceedings of the 1st International Workshop on Information Security (ISW), volume 1396 of Lecture Notes in Computer Science Proceedings of Advances in Cryptology (CRYPTO) Proceedings of Advances in Cryptology (CRYPTO), volume 576 of Lecture Notes in Computer Science International Association for Cryptologic Research, pp.158-173, 1989. ,
Sybil attacks as a mitigation strategy against the Storm botnet, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE), pp.32-40, 2008. ,
DOI : 10.1109/MALWARE.2008.4690855
Defending the sybil attack in P2P networks : Taxonomy, challenges, and a proposal for selfregistration, Proceedings of the 1st International Conference on Availability, Reliability and Security (ARES), pp.756-763, 2006. ,
Redistributing secret shares to new access structures and its applications, 1997. ,
Wide-area cooperative storage with CFS, Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP), pp.202-215, 2001. ,
Sybil-Resistant DHT Routing, Proceedings of the 10th European Symposium on Research in Computer Security (ESORICS), pp.305-318, 2005. ,
DOI : 10.1007/11555827_18
Sybilinfer : Detecting sybil nodes using social networks, Proceedings of the 16th Annual Symposium on Network and Distributed System Security, 2009. ,
The sybil attack, Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), volume 2429 of Lecture Notes in Computer Science, pp.251-260, 2002. ,
PAST: a large-scale, persistent peer-to-peer storage utility, Proceedings Eighth Workshop on Hot Topics in Operating Systems, pp.75-80, 2001. ,
DOI : 10.1109/HOTOS.2001.990064
Ten risks of PKI : What you're not being told about public-key infrastructure, Desmedt. Parallel reliable threshold multisignature, pp.31469-4721, 1985. ,
Optimal-resilience proactive public-key cryptosystems, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.384-393, 1997. ,
DOI : 10.1109/SFCS.1997.646127
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.46.6651
Witness-based cryptographic program checking and robust function sharing, Proceedings of the twenty-eighth annual ACM symposium on Theory of computing , STOC '96, pp.440-454, 1996. ,
DOI : 10.1145/237814.237998
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.55.2885
Robust efficient distributed RSA-key generation, Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing , PODC '98, pp.663-672, 1998. ,
DOI : 10.1145/277697.277779
Making chord robust to byzantine attacks Gosskip, an efficient, fault-tolerant and self organizing overlay using gossip-based construction and skip-lists principles, Proceedings of the 13th Annual European Symposium on Algorithms (ESA), volume 3669 of Lecture Notes in Computer Science Proceedings of the 6th IEEE International Conference on Peer-to- Peer Computing (P2P), pp.803-814, 2005. ,
Robust and Efficient Sharing of RSA Functions, Proceedings of the 16th Annual International Cryptology Conference (CRYPTO), pp.157-172, 1996. ,
DOI : 10.1007/3-540-68697-5_13
Robust Threshold DSS Signatures, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT) International Association for Cryptologic Research, pp.354-371, 1996. ,
DOI : 10.1007/3-540-68339-9_31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.32.1659
Secure distributed key generation for discrete-log based cryptosystems, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT), volume 1599 of Lecture Notes in Computer Science, pp.295-310, 1999. ,
Meghdoot: Content-Based Publish/Subscribe over P2P Networks, Proceedings of the ACM/IFIP/USENIX International Middleware Conference (Middleware), pp.254-273, 2004. ,
DOI : 10.1007/3-540-45518-3_18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.167.3996
Group-oriented (t, n) threshold digital signature scheme and digital multisignature Computers and Digital Techniques The effect of replica placement on routing robustness in distributed hash tables, Proceedings of the 6th IEEE International Conference on Peer-to- Peer Computing (P2P), pp.307-313, 1994. ,
The eDonkey file-sharing network, Proceedings of the Workshop on Algorithms and Protocols for Efficient Peer-to-Peer Applications (Informatik ), volume 51 of LNI, pp.224-228, 2004. ,
Cryptographic access control in a distributed file system [HS05] David Hausheer and Burkhard Stiller. Peermint : Decentralized and secure accounting for peer-to-peer applications, Proceedings of the 8th ACM Symposium on Access Control Models and Technologies (SACMAT) Proceedings of the 4th International IFIP-TC6 Networking Conference, pp.158-168, 2003. ,
The Peersim simulator ,
Peer-to-peer authentication with a distributed single sign-on service, Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS), pp.250-258, 2004. ,
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks , SASN '04, pp.1-9, 2004. ,
DOI : 10.1145/1029102.1029105
The small-world phenomenon, Proceedings of the thirty-second annual ACM symposium on Theory of computing , STOC '00, pp.163-170, 2000. ,
DOI : 10.1145/335305.335325
Admission control in peer groups, Proceedings of the IEEE International Symposium on Network Computing and Applications (NCA), pp.131-139, 2003. ,
Providing robust and ubiquitous security support for mobile ad hoc networks, Proceedings of the 9th IEEE International Conference on Network Protocols (ICNP), pp.251-260, 2001. ,
Understanding KaZaA, 2004. ,
URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks, IEEE/ACM Transactions on Networking, vol.12, issue.6, pp.1049-1063, 2004. ,
DOI : 10.1109/TNET.2004.838598
Contrôle d'accès distribué à un réseau pair-à-pair, Proceedings of SAR-SSI, 2007. ,
Gestion distribuée d'identités résistante à la sybil attack pour un réseau pair-à-pair, Proceedings of SAR-SSI, 2007. ,
Detecting and excluding misbehaving nodes in a P2P network, Proceedings of the 8th International Conference on Innovative Internet Community Systems (I2CS), 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-00353016
A Distributed Certification System for Structured P2P Networks, Proceedings of the 2nd International Conference on Autonomous Infrastructure, Management and Security (AIMS), pp.40-52, 2008. ,
DOI : 10.1007/BFb0052253
URL : https://hal.archives-ouvertes.fr/hal-00287656
A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification, 2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2008. ,
DOI : 10.1109/WETICE.2008.7
URL : https://hal.archives-ouvertes.fr/hal-00287700
A sybilproof distributed identity management for P2P networks, 2008 IEEE Symposium on Computers and Communications, 2008. ,
DOI : 10.1109/ISCC.2008.4625694
URL : https://hal.archives-ouvertes.fr/hal-00287706
An efficient distributed PKI for structured P2P networks, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 2009. ,
DOI : 10.1109/P2P.2009.5284491
URL : https://hal.archives-ouvertes.fr/hal-00423320
A survey of solutions to the sybil attack, 2006. ,
eQuus: A Provably Robust and Locality-Aware Peer-to-Peer System, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), pp.3-11, 2006. ,
DOI : 10.1109/P2P.2006.17
Keychains : A decentralized public-key infrastructure, 2006. ,
A digital signature based on a conventional encryption function, Advances in Cryptology (CRYPTO) International Association for Cryptologic Research, pp.369-378, 1987. ,
DHT Routing Using Social Links, Proceedings of the 3rd International Workshop on Peer-to-Peer Systems (IPTPS)Mil67] S. Milgram, pp.100-11160, 1967. ,
DOI : 10.1007/978-3-540-30183-7_10
Separating key management from file system security, Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), volume 2429 of Lecture Notes in Computer Science, pp.19-20, 2000. ,
DOI : 10.1145/346152.346183
Experimenting with shared generation of RSA keys, Proceedings of the Symposium on Network and Distributed Systems Security (NDSS), pp.43-56, 1999. ,
Geographic routing in social networks [Ped91] Torben Pryds Pedersen. A threshold cryptosystem without a trusted party (extended abstract), Proceedings of the National Academy of Sciences Proceedings of the International Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT), pp.11623-11628, 1991. ,
A simplified approach to threshold and proactive RSA, Proceedings of the 18th Annual International Cryptology Conference (CRYPTO), volume 1462 of Lecture Notes in Computer Science, pp.89-104, 1998. ,
DOI : 10.1007/BFb0055722
Pastry : scalable, decentralized object location and routing for large-scale peer-topeer systems Limiting sybil attacks in structured P2P networks, Proceedings of the 18th IFIP/ACM International Conference on Distributed Systems Platforms (Middleware) Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM), pp.329-350, 2001. ,
A scalable content-addressable network, Proceedings of the ACM Conference on Applications , Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM) of Computer Communication Review, pp.161-172, 2001. ,
The design of a robust peer-to-peer system, Proceedings of the 10th workshop on ACM SIGOPS European workshop: beyond the PC , EW10, pp.117-124, 2002. ,
DOI : 10.1145/1133373.1133396
Are 'strong' primes need for RSA ? Technical report, RSA Data Security, Inc., pub- RSA :adr, dec, 1998. ,
P2P-IM: A P2P Presence System for the Internet, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), pp.233-234, 2007. ,
DOI : 10.1109/P2P.2007.28
A method for obtaining digital signature and public-key cryptosystems. Communication of the ACM : Password-Based Cryptography Standard, RSA02] RSA Laboratories. PKCS #1 v2.1 : RSA Cryptography Standard, pp.120-126, 1978. ,
Mobile proactive secret sharing. Master's thesis, 2007. ,
DOI : 10.1145/1400751.1400856
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.7871
How to share a function securely (extended summary), Proceedings of the 26th Annual ACM Symposium on the Theory of Computing (STOC), pp.522-533, 1994. ,
Exploiting KAD, ACM SIGCOMM Computer Communication Review, vol.37, issue.5, pp.65-70, 2007. ,
DOI : 10.1145/1290168.1290176
A global view of kad, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, pp.117-122, 2007. ,
DOI : 10.1145/1298306.1298323
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
DOI : 10.1145/359168.359176
Practical Threshold Signatures, Proceedings of Advances in Cryptology (EUROCRYPT), volume 1807 of Lecture Notes in Computer Science, pp.207-220, 2000. ,
DOI : 10.1007/3-540-45539-6_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.7629
Mobile proactive secret sharing (brief announcement), Proceedings of the 27th Annual ACM Symposium on Principles of Distributed Computing (PODC), p.458, 2008. ,
DOI : 10.1145/1400751.1400856
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.7871
Security considerations for peer-topeer distributed hash tables, Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), volume 2429 of Lecture Notes in Computer Science, pp.261-269, 2002. ,
DOI : 10.1007/3-540-45748-8_25
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.7175
Chord : A scalable peer-to-peer lookup service for internet applications, Proceedings of the ACM Conference on Applications, Technologies, Architectures , and Protocols for Computer Communications (SIGCOMM), pp.149-160, 2001. ,
Eclipse Attacks on Overlay Networks: Threats and Defenses, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, pp.1-12, 2006. ,
DOI : 10.1109/INFOCOM.2006.231
Overlay Weaver: An overlay construction toolkit, Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), pp.402-412, 2003. ,
DOI : 10.1016/j.comcom.2007.08.002
Experimenting with admission control in P2P, Proceedings of the International Workshop on Advanced Developments in System and Software Security (WADIS), 2003. ,
pSearch, ACM SIGCOMM Computer Communication Review, vol.33, issue.1, pp.89-94, 2003. ,
DOI : 10.1145/774763.774777
Public-Key-Infrastructure Based on a Peer-to-Peer Network, Proceedings of the 38th Annual Hawaii International Conference on System Sciences, 2005. ,
DOI : 10.1109/HICSS.2005.514
Experimental performance of shared RSA modulus generation, Proceedings of the 10th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp.983-984, 1999. ,
Verifiable secret redistribution for archive systems, First International IEEE Security in Storage Workshop, 2002. Proceedings., pp.94-106, 2002. ,
DOI : 10.1109/SISW.2002.1183515
SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks, Proceedings of the IEEE Symposium on Security and Privacy (S&P), pp.3-17, 2008. ,
DOI : 10.1109/TNET.2009.2034047
SybilGuard : defending against sybil attacks via social networks, Proceedings of the Conference on Applications, Technologies , Architectures, and Protocols for Computer Communications (SIGCOMM), pp.267-278, 2006. ,
DOI : 10.1109/tnet.2008.923723
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.3018
SybilGuard : defending against sybil attacks via social networks, 2006. ,
DOI : 10.1109/tnet.2008.923723
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.3018
SSH -secure login connections over the internet, Proceedings of the 6th USENIX Security Symposium (SSYM), pp.37-42, 1996. ,
The Official PGP User's Guide, 1995. ,
ZRTP : Extensions to RTP for Diffie-Hellman key agreement for SRTP. http://zfoneproject.com/zrtp_ietf.html, oct COCA : A secure distributed online certification authority APSS : Proactive secret sharing in asynchronous systems, ZSvR05] Lidong Zhou, Fred B. Schneider, and Robbert van Renesse, pp.329-368259, 2002. ,