Polynomial Codes Over Certain Finite Fields, Journal of the Society for Industrial and Applied Mathematics, vol.8, issue.2, 1960. ,
DOI : 10.1137/0108018
Controlling the Cost of Reliability in Peer-to-Peer Overlays, IPTPS'03, 2003. ,
DOI : 10.1007/978-3-540-45172-3_2
The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, 1982. ,
DOI : 10.1145/357172.357176
A Distributed Trust Diffusion Protocol for Ad Hoc Networks, 2006 International Conference on Wireless and Mobile Communications (ICWMC'06), p.87, 2006. ,
DOI : 10.1109/ICWMC.2006.3
URL : https://hal.archives-ouvertes.fr/hal-00353071
A Distributed and Adaptive Revocation Mechanism for P2P Networks, Seventh International Conference on Networking (icn 2008), 2008. ,
DOI : 10.1109/ICN.2008.124
URL : https://hal.archives-ouvertes.fr/hal-00323990
Pond: the OceanStore prototype, 2nd USENIX Conference on File and Storage Technologies, 2003. ,
Admission control in Peer-to-Peer, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks , SASN '03, 2003. ,
DOI : 10.1145/986858.986873
Pstore a secure P2P backup system, Projet Pstore, 2001. ,
Detecting and excluding misbehaving nodes in a P2P network, Studia Informatica Universalis, vol.7, issue.1, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00353016