Imperfect Forward Secrecy, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.5-17, 2015. ,
DOI : 10.1007/3-540-68339-9_29
URL : https://hal.archives-ouvertes.fr/hal-01184171
ConChord: Cooperative SDSI Certificate Storage and Name Resolution, proceedings of the International workshop on Peer- To-Peer Systems, pp.141-154, 2002. ,
DOI : 10.1007/3-540-45748-8_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.8045
(Stochastic) Model Checking in GreatSPN, Application and Theory of Petri Nets and Concurrency -35th International Conference ? PETRI NETS. Proceedings, pp.354-363, 2014. ,
DOI : 10.1109/QEST.2011.19
CosyVerif: An Open Source Extensible Verification Environment, 2013 18th International Conference on Engineering of Complex Computer Systems, pp.33-36, 2013. ,
DOI : 10.1109/ICECCS.2013.15
A new mechanism for evaluating subordinate and root certification authorities, International Journal of Research and Reviews in Computer Science (IJRRCS), vol.2, issue.4, pp.977-982, 2011. ,
Tricert: A distributed certified e-mail scheme, Network and Distributed System Security Symposium (NDSS), pp.47-56, 2001. ,
Certified electronic mail, Symposium on Network and Distributed Systems Security, pp.3-19, 1994. ,
ARPKI, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.382-393, 2014. ,
DOI : 10.1145/2382196.2382204
A Critical Analysis of Latest Advances in Building Trusted P2P Networks Using Reputation Systems, WISE'07: Proceedings of the 8th International Conference on Web Information Systems Engineering, pp.130-141, 2007. ,
DOI : 10.1007/978-3-540-77010-7_14
WTR: A Reputation Metric for Distributed Hash Tables Based on a Risk and Credibility Factor, Journal of Computer Science and Technology, vol.19, issue.4, pp.844-854, 2009. ,
DOI : 10.1007/s11390-009-9276-6
URL : https://hal.archives-ouvertes.fr/inria-00627507
Secure routing for structured peer-to-peer overlay networks, Proceedings of the 5th symposium on Operating systems design and implementation, OSDI '02, pp.299-314, 2002. ,
DOI : 10.1145/1060289.1060317
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.1870
Stochastic well-formed colored nets and symmetric modeling applications, IEEE Transactions on Computers, vol.42, issue.11, pp.1343-1360, 1993. ,
DOI : 10.1109/12.247838
Model checking, 1999. ,
Structural Methods, chapter 15, 2003. ,
Sybil-Resistant DHT Routing, ESORICS 2005: 10th European Symposium on Research in Computer Security, pp.305-318, 2005. ,
DOI : 10.1007/11555827_18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.65.3947
Beyond "Web of trust": enabling P2P e-commerce, IEEE International Conference on E-Commerce, 2003. CEC 2003., pp.303-312 ,
DOI : 10.1109/COEC.2003.1210265
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.9710
The sybil attack In Revised Papers from the First International Workshop on Peerto-Peer Systems, IPTPS '01, pp.251-260, 2002. ,
State-Space-Based Methods and Model Checking, chapter 14, 2003. ,
DOI : 10.1007/978-3-662-05324-9_15
Certified electronic mail: Properties revisited, Computers & Security, vol.29, issue.2, pp.167-179, 2010. ,
DOI : 10.1016/j.cose.2009.06.009
Petri Nets for Systems Engineering, 2003. ,
DOI : 10.1007/978-3-662-05324-9
URL : https://hal.archives-ouvertes.fr/hal-01489070
Genuine atomic multicast in asynchronous distributed systems, Theoretical Computer Science, vol.254, issue.1-2, pp.297-316, 2001. ,
DOI : 10.1016/S0304-3975(99)00161-9
URL : http://doi.org/10.1016/s0304-3975(99)00161-9
New features in CPN-AMI 3: focusing on the analysis of complex distributed systems, Sixth International Conference on Application of Concurrency to System Design (ACSD'06), pp.273-275, 2006. ,
DOI : 10.1109/ACSD.2006.15
URL : https://hal.archives-ouvertes.fr/hal-01351775
Coloured Petri Nets : Modelling and Validation of Concurrent Systems, 2009. ,
An efficient distributed PKI for structured P2P networks, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, pp.1-10, 2009. ,
DOI : 10.1109/P2P.2009.5284491
URL : https://hal.archives-ouvertes.fr/hal-00423320
Generalized secure hash algorithm: SHA-X, IEEE EUROCON -International Conference on Computer as a Tool (EUROCON), pp.1-4, 2011. ,
A new approach to secure logging, ACM Transactions On Storage, vol.52, issue.1, pp.1-2, 2009. ,
Deployment challenges in log-based PKI enhancements, Proceedings of the Eighth European Workshop on System Security, EuroSec '15, pp.1-1, 2015. ,
DOI : 10.1145/2660267.2660355
Exploiting approximate transitivity of trust, 2007 Fourth International Conference on Broadband Communications, Networks and Systems (BROADNETS '07), pp.515-524, 2007. ,
DOI : 10.1109/BROADNETS.2007.4550477
Providing certified mail services on the internet. Security Privacy, IEEE, vol.5, issue.1, pp.16-22, 2007. ,
DOI : 10.1109/msp.2007.15
Byzantine fault tolerant public key authentication in peer-to-peer systems, Computer Networks, vol.50, issue.4, pp.579-596, 2006. ,
DOI : 10.1016/j.comnet.2005.07.007
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.8398
Authentication metric analysis and design, ACM Transactions on Information and System Security, vol.2, issue.2, 1999. ,
DOI : 10.1145/317087.317088
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.9186
The omega key management service, Journal of Computer Security, vol.4, issue.4, pp.267-288, 1996. ,
Diffie-Hellman Key Agreement Method, RFC, vol.2631, 1999. ,
DOI : 10.17487/rfc2631
Millions of internet users hit by massive sony playstation data theft. http://www.telegraph.co.uk/technology/news/8475728/ Millions-of-internet-users-hit-bymassive-Sony-PlayStation-data-theft .html, 2011. ,
CORPS: Building a Community of Reputable PeerS in Distributed Hash Tables, The Computer Journal, vol.54, issue.10, pp.1721-1735, 2011. ,
DOI : 10.1093/comjnl/bxr087
URL : https://hal.archives-ouvertes.fr/inria-00627499
Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems, Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, Middleware '01, pp.329-350, 2001. ,
Symmetric and Asymmetric Encryption, ACM Computing Surveys, vol.11, issue.4, pp.305-330, 1979. ,
DOI : 10.1145/356789.356793
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.6953
Chord: A scalable peer-to-peer lookup service for internet applications, Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM '01, pp.149-160, 2001. ,
A framework toward a self-organizing and self-healing certificate authority group in a content addressable network, 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp.614-621, 2010. ,
Hierarchical Set Decision Diagrams and Regular Models, 15th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), pp.1-15, 2009. ,
DOI : 10.1007/978-3-540-68746-7_16
URL : https://hal.archives-ouvertes.fr/hal-01294397
Symbolic model-checking using its-tools Held as Part of the European Joint Conferences on Theory and Practice of Software, Tools and Algorithms for the Construction and Analysis of Systems -21st International Conference, pp.231-237, 2015. ,
Towards a scalable refereeing system for online gaming, Multimedia Systems, vol.54, issue.10, pp.579-593, 2014. ,
DOI : 10.1093/comjnl/bxr087
COCA: A secure distributed online certification authority, ACM Transactions on Computer Systems, vol.20, issue.4, pp.329-368, 2002. ,
DOI : 10.1145/571637.571638
PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing, IEEE Transactions on Parallel and Distributed Systems, vol.18, issue.4, pp.460-473, 2007. ,
DOI : 10.1109/TPDS.2007.1021