D. Adrian, K. Bhargavan, Z. Durumeric, P. Gaudry, M. Green et al., Imperfect Forward Secrecy, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.5-17, 2015.
DOI : 10.1007/3-540-68339-9_29

URL : https://hal.archives-ouvertes.fr/hal-01184171

S. Ajmani, D. E. Clarke, C. Moh, and S. Richman, ConChord: Cooperative SDSI Certificate Storage and Name Resolution, proceedings of the International workshop on Peer- To-Peer Systems, pp.141-154, 2002.
DOI : 10.1007/3-540-45748-8_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.8045

M. Elvio-gilberto-amparore, S. Beccuti, and . Donatelli, (Stochastic) Model Checking in GreatSPN, Application and Theory of Petri Nets and Concurrency -35th International Conference ? PETRI NETS. Proceedings, pp.354-363, 2014.
DOI : 10.1109/QEST.2011.19

E. André, Y. Lembachar, L. Petrucci, F. Hulin-hubard, A. Linard et al., CosyVerif: An Open Source Extensible Verification Environment, 2013 18th International Conference on Engineering of Complex Computer Systems, pp.33-36, 2013.
DOI : 10.1109/ICECCS.2013.15

A. Mohammad, S. Asmaran, and . Bani-ahmed, A new mechanism for evaluating subordinate and root certification authorities, International Journal of Research and Reviews in Computer Science (IJRRCS), vol.2, issue.4, pp.977-982, 2011.

G. Ateniese, M. T. Breno-de-medeiros, and . Goodrich, Tricert: A distributed certified e-mail scheme, Network and Distributed System Security Symposium (NDSS), pp.47-56, 2001.

A. Bahreman and D. Tygar, Certified electronic mail, Symposium on Network and Distributed Systems Security, pp.3-19, 1994.

D. A. Basin, J. F. Cas, T. Cremers, . Hyun-jin, A. Kim et al., ARPKI, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.382-393, 2014.
DOI : 10.1145/2382196.2382204

X. Bonnaire and E. Rosas, A Critical Analysis of Latest Advances in Building Trusted P2P Networks Using Reputation Systems, WISE'07: Proceedings of the 8th International Conference on Web Information Systems Engineering, pp.130-141, 2007.
DOI : 10.1007/978-3-540-77010-7_14

X. Bonnaire and E. Rosas, WTR: A Reputation Metric for Distributed Hash Tables Based on a Risk and Credibility Factor, Journal of Computer Science and Technology, vol.19, issue.4, pp.844-854, 2009.
DOI : 10.1007/s11390-009-9276-6

URL : https://hal.archives-ouvertes.fr/inria-00627507

M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, Secure routing for structured peer-to-peer overlay networks, Proceedings of the 5th symposium on Operating systems design and implementation, OSDI '02, pp.299-314, 2002.
DOI : 10.1145/1060289.1060317

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.1870

G. Chiola, C. Dutheillet, G. Franceschinis, and S. Haddad, Stochastic well-formed colored nets and symmetric modeling applications, IEEE Transactions on Computers, vol.42, issue.11, pp.1343-1360, 1993.
DOI : 10.1109/12.247838

E. M. Clarke, O. Grumberg, and D. Peled, Model checking, 1999.

J. Colom, E. Teruel, M. Silva, and S. Haddad, Structural Methods, chapter 15, 2003.

G. Danezis, C. Lesniewski-laas, M. F. Kaashoek, and R. Anderson, Sybil-Resistant DHT Routing, ESORICS 2005: 10th European Symposium on Research in Computer Security, pp.305-318, 2005.
DOI : 10.1007/11555827_18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.65.3947

A. Datta, M. Hauswirth, and K. Aberer, Beyond "Web of trust": enabling P2P e-commerce, IEEE International Conference on E-Commerce, 2003. CEC 2003., pp.303-312
DOI : 10.1109/COEC.2003.1210265

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.9710

R. John and . Douceur, The sybil attack In Revised Papers from the First International Workshop on Peerto-Peer Systems, IPTPS '01, pp.251-260, 2002.

C. Dutheillet, I. Vernier-mounier, J. Ilié, and D. Poitrenaud, State-Space-Based Methods and Model Checking, chapter 14, 2003.
DOI : 10.1007/978-3-662-05324-9_15

J. Lluis-ferrer-gomilla, J. A. Onieva, M. Payeras, and J. Lopez, Certified electronic mail: Properties revisited, Computers & Security, vol.29, issue.2, pp.167-179, 2010.
DOI : 10.1016/j.cose.2009.06.009

C. Girault and R. Valk, Petri Nets for Systems Engineering, 2003.
DOI : 10.1007/978-3-662-05324-9

URL : https://hal.archives-ouvertes.fr/hal-01489070

R. Guerraoui, Genuine atomic multicast in asynchronous distributed systems, Theoretical Computer Science, vol.254, issue.1-2, pp.297-316, 2001.
DOI : 10.1016/S0304-3975(99)00161-9

URL : http://doi.org/10.1016/s0304-3975(99)00161-9

A. Hamez, L. Hillah, F. Kordon, A. Linard, E. Paviot-adet et al., New features in CPN-AMI 3: focusing on the analysis of complex distributed systems, Sixth International Conference on Application of Concurrency to System Design (ACSD'06), pp.273-275, 2006.
DOI : 10.1109/ACSD.2006.15

URL : https://hal.archives-ouvertes.fr/hal-01351775

K. Jensen and L. Kristensen, Coloured Petri Nets : Modelling and Validation of Concurrent Systems, 2009.

F. Lesueur, L. Mé, and V. Tong, An efficient distributed PKI for structured P2P networks, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, pp.1-10, 2009.
DOI : 10.1109/P2P.2009.5284491

URL : https://hal.archives-ouvertes.fr/hal-00423320

C. Lin, C. Lee, Y. Yeh, H. Chien, and S. Chien, Generalized secure hash algorithm: SHA-X, IEEE EUROCON -International Conference on Computer as a Tool (EUROCON), pp.1-4, 2011.

D. Ma and G. Tsudik, A new approach to secure logging, ACM Transactions On Storage, vol.52, issue.1, pp.1-2, 2009.

S. Matsumoto, P. Szalachowski, and A. Perrig, Deployment challenges in log-based PKI enhancements, Proceedings of the Eighth European Workshop on System Security, EuroSec '15, pp.1-1, 2015.
DOI : 10.1145/2660267.2660355

R. Morselli, B. Bhattacharjee, J. Katz, and M. A. Marsh, Exploiting approximate transitivity of trust, 2007 Fourth International Conference on Broadband Communications, Networks and Systems (BROADNETS '07), pp.515-524, 2007.
DOI : 10.1109/BROADNETS.2007.4550477

R. Oppliger, Providing certified mail services on the internet. Security Privacy, IEEE, vol.5, issue.1, pp.16-22, 2007.
DOI : 10.1109/msp.2007.15

V. Pathak and L. Iftode, Byzantine fault tolerant public key authentication in peer-to-peer systems, Computer Networks, vol.50, issue.4, pp.579-596, 2006.
DOI : 10.1016/j.comnet.2005.07.007

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.8398

M. Reiter and S. Stubblebine, Authentication metric analysis and design, ACM Transactions on Information and System Security, vol.2, issue.2, 1999.
DOI : 10.1145/317087.317088

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.9186

K. Michael, M. K. Reiter, J. B. Franklin, R. N. Lacy, and . Wright, The omega key management service, Journal of Computer Security, vol.4, issue.4, pp.267-288, 1996.

E. Rescorla, Diffie-Hellman Key Agreement Method, RFC, vol.2631, 1999.
DOI : 10.17487/rfc2631

S. Richmond and C. Williams, Millions of internet users hit by massive sony playstation data theft. http://www.telegraph.co.uk/technology/news/8475728/ Millions-of-internet-users-hit-bymassive-Sony-PlayStation-data-theft .html, 2011.

E. Rosas, O. Marin, and X. Bonnaire, CORPS: Building a Community of Reputable PeerS in Distributed Hash Tables, The Computer Journal, vol.54, issue.10, pp.1721-1735, 2011.
DOI : 10.1093/comjnl/bxr087

URL : https://hal.archives-ouvertes.fr/inria-00627499

I. T. Antony, P. Rowstron, and . Druschel, Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems, Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, Middleware '01, pp.329-350, 2001.

G. J. Simmons, Symmetric and Asymmetric Encryption, ACM Computing Surveys, vol.11, issue.4, pp.305-330, 1979.
DOI : 10.1145/356789.356793

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.6953

I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for internet applications, Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM '01, pp.149-160, 2001.

A. Tassanaviboon and G. Gong, A framework toward a self-organizing and self-healing certificate authority group in a content addressable network, 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp.614-621, 2010.

Y. Thierry-mieg, D. Poitrenaud, A. Hamez, and F. Kordon, Hierarchical Set Decision Diagrams and Regular Models, 15th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), pp.1-15, 2009.
DOI : 10.1007/978-3-540-68746-7_16

URL : https://hal.archives-ouvertes.fr/hal-01294397

Y. Thierry-mieg, Symbolic model-checking using its-tools Held as Part of the European Joint Conferences on Theory and Practice of Software, Tools and Algorithms for the Construction and Analysis of Systems -21st International Conference, pp.231-237, 2015.

M. Véron, O. Marin, S. Monnet, and Z. Guessoum, Towards a scalable refereeing system for online gaming, Multimedia Systems, vol.54, issue.10, pp.579-593, 2014.
DOI : 10.1093/comjnl/bxr087

L. Zhou, F. B. Schneider, and R. Van-renesse, COCA: A secure distributed online certification authority, ACM Transactions on Computer Systems, vol.20, issue.4, pp.329-368, 2002.
DOI : 10.1145/571637.571638

R. Zhou and F. Hwang, PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing, IEEE Transactions on Parallel and Distributed Systems, vol.18, issue.4, pp.460-473, 2007.
DOI : 10.1109/TPDS.2007.1021