M. S. Charikar, Similarity estimation techniques from rounding algorithms, Proceedings of the thiry-fourth annual ACM symposium on Theory of computing , STOC '02, 2002.
DOI : 10.1145/509907.509965

R. Da-silva-villaca, L. B. De-paula, R. Pasquini, and M. F. Magalhaes, Hamming DHT: Taming the similarity search, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC), pp.7-12, 2013.
DOI : 10.1109/CCNC.2013.6488418

S. Goldwasser and M. Bellare, Lecture notes on cryptography, Summers course on cryptography, MIT, pp.136-140, 1996.

M. Harvan and A. Pretschner, State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition, 2009 Third International Conference on Network and System Security, pp.373-380, 2009.
DOI : 10.1109/NSS.2009.51

M. Henzinger, Finding near-duplicate web pages, Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval , SIGIR '06, 2006.
DOI : 10.1145/1148170.1148222

M. Hilty, A. Pretschner, D. Basin, C. Schaefer, and T. Walter, A Policy Language for Distributed Usage Control, ESORICS, issue.2, pp.531-546, 2007.
DOI : 10.1007/978-3-540-74835-9_35

H. Janicke, A. Cau, F. Siewe, and H. Zedan, Concurrent Enforcement of Usage Control Policies, 2008 IEEE Workshop on Policies for Distributed Systems and Networks, pp.111-118, 2008.
DOI : 10.1109/POLICY.2008.44

H. Janicke, A. Cau, and H. Zedan, A note on the formalisation of UCON, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.163-168, 2007.
DOI : 10.1145/1266840.1266867

B. Katt, X. Zhang, and M. Hafner, Towards a Usage Control Policy Specification with Petri Nets, pp.905-912, 2009.
DOI : 10.1007/978-3-642-05151-7_11

P. Kumari, A. Pretschner, J. Peschla, and J. Kuhn, Distributed data usage control for web applications, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.85-96, 2011.
DOI : 10.1145/1943513.1943526

G. S. Manku, A. Jain, and A. D. Sarma, Detecting near-duplicates for web crawling, Proceedings of the 16th international conference on World Wide Web , WWW '07, 2007.
DOI : 10.1145/1242572.1242592

J. Park and R. Sandhu, usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-174, 2002.
DOI : 10.1145/984334.984339

A. Pretschner, M. Büchler, M. Harvan, C. Schaefer, and T. Walter, Usage control enforcement with data flow tracking for x11, 5th International Workshop on Security and Trust Management, 2009.

H. Pucha, D. G. Andersen, and M. Kaminsky, Exploiting similarity for multi-source downloads using file handprints, Proceedings of the 4th USENIX conference on Networked systems design & implementation , NSDI'07, pp.2-2, 2007.

I. S. Reed and G. Solomon, Polynomial Codes Over Certain Finite Fields, Journal of the Society for Industrial and Applied Mathematics, vol.8, issue.2, pp.300-304, 1960.
DOI : 10.1137/0108018

G. Urdaneta, G. Pierre, and M. V. Steen, A survey of DHT security techniques, ACM Computing Surveys, vol.43, issue.2, pp.1-8, 2003.
DOI : 10.1145/1883612.1883615

B. Zhao, R. Sandhu, X. Zhang, and X. Qin, Towards a Times-Based Usage Control Model, Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security, pp.227-242, 2007.
DOI : 10.1145/1108906.1108908