I. S. Reed and G. Solomon, Polynomial Codes Over Certain Finite Fields, Journal of the Society for Industrial and Applied Mathematics, vol.8, issue.2, 1960.
DOI : 10.1137/0108018

R. Mahajan, M. Castro, and A. Rowstron, Controlling the Cost of Reliability in Peer-to-Peer Overlays, IPTPS'03, 2003.
DOI : 10.1007/978-3-540-45172-3_2

L. Lamport, R. Shostak, and M. Pease, The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, 1982.
DOI : 10.1145/357172.357176

M. Morvan and S. Sené, A Distributed Trust Diffusion Protocol for Ad Hoc Networks, 2006 International Conference on Wireless and Mobile Communications (ICWMC'06), p.87, 2006.
DOI : 10.1109/ICWMC.2006.3

URL : https://hal.archives-ouvertes.fr/hal-00353071

T. Cholez, I. Chrisment, and O. Festor, A Distributed and Adaptive Revocation Mechanism for P2P Networks, Seventh International Conference on Networking (icn 2008), 2008.
DOI : 10.1109/ICN.2008.124

URL : https://hal.archives-ouvertes.fr/hal-00323990

S. Rhea, P. Eaton, D. Geels, H. Weatherspoon, B. Zhao et al., Pond: the OceanStore prototype, 2nd USENIX Conference on File and Storage Technologies, 2003.

N. Saxena, G. Tsudik, and J. H. Yi, Admission control in Peer-to-Peer, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks , SASN '03, 2003.
DOI : 10.1145/986858.986873

C. Batten, K. Barr, A. Saraf, and S. Trepetin, Pstore a secure P2P backup system, Projet Pstore, 2001.

F. Lesueur, L. Mé, V. Viet-triem, and . Tong, Detecting and excluding misbehaving nodes in a P2P network, Studia Informatica Universalis, vol.7, issue.1, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00353016