Towards Securing Communications in Infrastructure-Poor Areas, 5th EAI International Conference on e-Infrastructure and e-Services for Developing Countries, 2013. ,
DOI : 10.1007/978-3-319-08368-1_7
URL : https://hal.archives-ouvertes.fr/hal-00931352
MUSeS: Mobile User Secured Session, 2012 IFIP Wireless Days, pp.1-6, 2012. ,
DOI : 10.1109/WD.2012.6402807
URL : https://hal.archives-ouvertes.fr/hal-00739151
Chord-PKI: A distributed trust infrastructure based on P2P networks, Computer Networks, vol.56, issue.1, pp.378-398, 2012. ,
DOI : 10.1016/j.comnet.2011.09.015
Menger's Theorem, Journal of Graph Theory, vol.8, issue.1, pp.35-36, 2001. ,
DOI : 10.1002/jgt.1001
Overlay addressing and routing system based on hyperbolic geometry, 2011 IEEE Symposium on Computers and Communications (ISCC), pp.294-301, 2011. ,
DOI : 10.1109/ISCC.2011.5983793
URL : https://hal.archives-ouvertes.fr/hal-00653766
Secure routing for structured peer-to-peer overlay networks, ACM SIGOPS Operating Systems Review, vol.36, issue.SI, pp.299-314, 2002. ,
DOI : 10.1145/844128.844156
Threshold and identity-based key management and authentication for wireless ad hoc networks, Proceedings of the International Conference on Information Technology: Coding and Computing, p.107, 2004. ,
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
Analysis of peer-to-peer network security using gnutella, 2002. ,
Towards robust key extraction from multipath wireless channels, Communications and Networks, pp.385-395, 2012. ,
DOI : 10.1109/JCN.2012.6292245
Curves on 2-manifolds and isotopies, Acta Math, pp.15-16, 1966. ,
DOI : 10.1007/BF02392203
On the evolution of random graphs, Publications of the Mathematical Institute of the Hungarian Academy of Sciences 5, pp.17-61, 1960. ,
The disjoint paths problem in quadratic time, Journal of Combinatorial Theory, Series B, vol.102, issue.2, pp.424-435, 2012. ,
DOI : 10.1016/j.jctb.2011.07.004
Providing robust and ubiquitous security support for mobile ad-hoc networks, Network Protocols Ninth International Conference on, pp.251-260, 2001. ,
The Secure Routing Mechanism for DHT-based Overlay Network, 2008 10th International Conference on Advanced Communication Technology, pp.1300-1303, 2008. ,
DOI : 10.1109/ICACT.2008.4494002
Internet topology modeler based on map sampling, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications, pp.1021-1027, 2002. ,
DOI : 10.1109/ISCC.2002.1021797
URL : https://hal.archives-ouvertes.fr/hal-00946551
Security in Peer-to-Peer Networks: Empiric Model of File Diffusion in BitTorrent, 2009 Fourth International Conference on Internet Monitoring and Protection, pp.39-44, 2009. ,
DOI : 10.1109/ICIMP.2009.14
A multi-path certification protocol for mobile ad hoc networks, Computers and Devices for Communication 4th International Conference on, pp.1-4, 2009. ,
Identity-Based Cryptosystems and Signature Schemes, Proceedings of CRYPTO 84 on Advances in Cryptology, pp.47-53, 1985. ,
DOI : 10.1007/3-540-39568-7_5
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis, 20th Annual Computer Security Applications Conference, pp.252-261, 2004. ,
DOI : 10.1109/CSAC.2004.50
A Security Analysis of a P2P Incentive Mechanisms for Mobile Devices, 2008 Third International Conference on Internet and Web Applications and Services, pp.397-402, 2008. ,
DOI : 10.1109/ICIW.2008.116
Multipath key exchange on P2P networks, First International Conference on Availability, Reliability and Security (ARES'06), 2006. ,
DOI : 10.1109/ARES.2006.87
Reliable and Scalable Distributed Hash Tables Harnessing Hyperbolic Coordinates, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS), pp.1-6, 2012. ,
DOI : 10.1109/NTMS.2012.6208677
URL : https://hal.archives-ouvertes.fr/hal-00739155
Virtual connections in p2p overlays with dht-based name to address resolution, International Journal on Advances in Internet Technology, vol.5, issue.1, pp.11-25, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00739149
A survey of DHT security techniques, ACM Computing Surveys, vol.43, issue.2, pp.1-8, 2011. ,
DOI : 10.1145/1883612.1883615
Myrmic: Secure and robust dht routing, 2007. ,