Evaluating a peer-to-peer storage system in presence of malicious peers, 2011 International Conference on High Performance Computing & Simulation, 2011. ,
DOI : 10.1109/HPCSim.2011.5999855
URL : https://hal.archives-ouvertes.fr/hal-00669179
A Distributed and Adaptive Revocation Mechanism for P2P Networks, Seventh International Conference on Networking (icn 2008), 2008. ,
DOI : 10.1109/ICN.2008.124
URL : https://hal.archives-ouvertes.fr/hal-00323990
On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, 1983. ,
Optimising the compilation of Petri net models, Proc. of SUMO'11, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00666661
Detecting and excluding misbehaving nodes in a P2P network, Studia Informatica Universalis, vol.7, issue.1, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00353016
Controlling the Cost of Reliability in Peer-to-Peer Overlays, Proc. of IPTPS'03, 2003. ,
DOI : 10.1007/978-3-540-45172-3_2
A Distributed Trust Diffusion Protocol for Ad Hoc Networks, 2006 International Conference on Wireless and Mobile Communications (ICWMC'06), 2006. ,
DOI : 10.1109/ICWMC.2006.3
URL : https://hal.archives-ouvertes.fr/hal-00353071
Quickly prototyping Petri nets tools with SNAKES. Petri net newsletter, 2008. ,
DOI : 10.4108/icst.simutools2008.3007
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.205.9790
Algebras of coloured Petri nets, and their applications to modelling and verification, 2010. ,
Polynomial Codes Over Certain Finite Fields, Journal of the Society for Industrial and Applied Mathematics, vol.8, issue.2, 1960. ,
DOI : 10.1137/0108018
Modelling, verification, and formal analysis of security properties in a P2P system, 2010 International Symposium on Collaborative Technologies and Systems, 2010. ,
DOI : 10.1109/CTS.2010.5478474