]. H. Adkins, An update on attempted man-in-the-middle at- tacks, Google Online Security Blog, issue.1, 2011.

R. Albert, H. Jeong, and A. Barabasi, Diameter of the world-wide web, Nature, vol.401, pp.130-131, 1999.

S. Dolev, N. Gilboa, and M. Kopeetsky, Computing multi-party trust privately, Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, pp.1460-1465, 2010.
DOI : 10.1145/1774088.1774401

C. Ellison and B. Schneier, Ten risks of PKI: What you're not being told about Public Key Infrastructure, Computer Security Journal, vol.16, issue.1, pp.1-7, 2000.

E. Estrada and N. Hatano, Communicability graph and community structures in complex networks, Applied Mathematics and Computation, vol.214, issue.2, pp.500-511, 2009.
DOI : 10.1016/j.amc.2009.04.024

S. N. Foley, W. M. Adams, and B. O. Sullivan, Aggregating Trust Using Triangular Norms in the KeyNote Trust Management System, Security and Trust Management -6th International Workshop, STM 2010, pp.100-115, 2010.
DOI : 10.1007/978-3-642-22444-7_7

G. Goldberg, P. Okunev, M. Neumann, and H. Schneider, Distribution of Subdominant Eigenvalues of Matrices with Random Rows, SIAM Journal on Matrix Analysis and Applications, vol.24, issue.3, pp.137-151, 2000.
DOI : 10.1137/S0895479801389102

F. Gomes, Security alert: Fraudulent digital certificates, SANS Institute InfoSec Reading Room, 2001.

K. Goto and R. A. Van-de-geijn, High-performance implementation of the level-3 BLAS, ACM Transactions on Mathematical Software, vol.35, issue.1, pp.1-4, 2008.
DOI : 10.1145/1377603.1377607

K. Govindan and P. Mohapatra, Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.14, issue.2, pp.279-298, 2012.
DOI : 10.1109/SURV.2011.042711.00083

R. Guha, R. Kumar, P. Raghavan, and A. Tomkins, Propagation of trust and distrust, Proceedings of the 13th conference on World Wide Web , WWW '04, pp.403-412, 2004.
DOI : 10.1145/988672.988727

J. Huang and D. Nicol, A calculus of trust and its application to PKI and identity management, Proceedings of the 8th Symposium on Identity and Trust on the Internet, IDtrust '09, pp.23-37, 2009.
DOI : 10.1145/1527017.1527021

J. Huang and D. Nicol, A Formal-Semantics-Based Calculus of Trust, IEEE Internet Computing, vol.14, issue.5, pp.38-46, 2010.
DOI : 10.1109/MIC.2010.83

A. Jøsang, Trust Extortion on the Internet, Security and Trust Management, pp.6-21, 2012.
DOI : 10.1007/978-3-642-29963-6_2

A. Jøsang, Probabilistic logic under uncertainty, Proceedings of Computing: The Australian Theory Symposium (CATS'07), 2007.

L. V. Orman, Transitivity and aggregation in trust networks, Proc. of the 21st Workshop on Information Technologies and Systems, 2010.

M. Pala, A proposal for collaborative internet-scale trust infrastructures deployment, Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDTRUST '10, pp.108-116, 2010.
DOI : 10.1145/1750389.1750404

M. Pala and S. W. Smith, PEACHES and Peers, Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice, EuroPKI '08, pp.223-238, 2008.
DOI : 10.1007/978-3-540-69485-4_16

M. K. Reiter and S. G. Stubblebine, Resilient authentication using path independence, IEEE Transactions on Computers, vol.47, issue.12, pp.1351-1362, 1998.
DOI : 10.1109/12.737682

H. Rifà-pous and J. Herrera-joancomartí, An Interdomain PKI Model Based on Trust Lists, Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice Proceedings, volume 4582 of Lecture Notes in Computer Science, pp.49-64, 2007.
DOI : 10.1007/978-3-540-73408-6_4

S. Schiffner, S. Clauß, and S. Steinbrecher, Privacy and Liveliness for Reputation Systems, Public Key Infrastructures , Services and Applications -6th European Workshop, pp.209-224, 2009.
DOI : 10.1007/978-3-642-16441-5_14

URL : https://lirias.kuleuven.be/bitstream/123456789/244794/2/article-1265.pdf

S. Schnettler, A structured overview of 50 years of small-world research, Social Networks, vol.31, issue.3, pp.165-178, 2009.
DOI : 10.1016/j.socnet.2008.12.004

R. C. Whaley, A. Petitet, and J. J. Dongarra, Automated empirical optimizations of software and the ATLAS project, Parallel Computing, vol.27, issue.1-2, pp.3-35, 2001.
DOI : 10.1016/S0167-8191(00)00087-9