D. Ahmat, T. Bissyande, and D. Magoni, Towards Securing Communications in Infrastructure-Poor Areas, 5th EAI International Conference on e-Infrastructure and e-Services for Developing Countries, 2013.
DOI : 10.1007/978-3-319-08368-1_7

URL : https://hal.archives-ouvertes.fr/hal-00931352

D. Ahmat and D. Magoni, MUSeS: Mobile User Secured Session, 2012 IFIP Wireless Days, pp.1-6, 2012.
DOI : 10.1109/WD.2012.6402807

URL : https://hal.archives-ouvertes.fr/hal-00739151

A. Avramidis, P. Kotzanikolaou, C. Douligeris, and M. Burmester, Chord-PKI: A distributed trust infrastructure based on P2P networks, Computer Networks, vol.56, issue.1, pp.378-398, 2012.
DOI : 10.1016/j.comnet.2011.09.015

T. Bohme, F. Goring, and J. Harant, Menger's Theorem, Journal of Graph Theory, vol.8, issue.1, pp.35-36, 2001.
DOI : 10.1002/jgt.1001

C. Cassagnes, T. Tiendrebeogo, D. Bromberg, and D. Magoni, Overlay addressing and routing system based on hyperbolic geometry, 2011 IEEE Symposium on Computers and Communications (ISCC), pp.294-301, 2011.
DOI : 10.1109/ISCC.2011.5983793

URL : https://hal.archives-ouvertes.fr/hal-00653766

M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, Secure routing for structured peer-to-peer overlay networks, ACM SIGOPS Operating Systems Review, vol.36, issue.SI, pp.299-314, 2002.
DOI : 10.1145/844128.844156

H. Deng, A. Mukherjee, and D. P. Agrawal, Threshold and identity-based key management and authentication for wireless ad hoc networks, Proceedings of the International Conference on Information Technology: Coding and Computing, p.107, 2004.

W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976.
DOI : 10.1109/TIT.1976.1055638

A. G. , D. Defigueiredo, and B. Kramer, Analysis of peer-to-peer network security using gnutella, 2002.

Y. Hajj-shehadeh, O. Alfandi, and D. Hogrefe, Towards robust key extraction from multipath wireless channels, Communications and Networks, pp.385-395, 2012.
DOI : 10.1109/JCN.2012.6292245

D. B. Epstein, Curves on 2-manifolds and isotopies, Acta Math, pp.15-16, 1966.
DOI : 10.1007/BF02392203

P. Erd?s and A. Rényi, On the evolution of random graphs, Publications of the Mathematical Institute of the Hungarian Academy of Sciences 5, pp.17-61, 1960.

K. Ichi-kawarabayashi, Y. Kobayashi, and B. A. Reed, The disjoint paths problem in quadratic time, Journal of Combinatorial Theory, Series B, vol.102, issue.2, pp.424-435, 2012.
DOI : 10.1016/j.jctb.2011.07.004

J. Kong, Z. Petros, H. Luo, S. Lu, and L. Zhang, Providing robust and ubiquitous security support for mobile ad-hoc networks, Network Protocols Ninth International Conference on, pp.251-260, 2001.

H. Kwon, S. Koh, J. Nah, and J. Jang, The Secure Routing Mechanism for DHT-based Overlay Network, 2008 10th International Conference on Advanced Communication Technology, pp.1300-1303, 2008.
DOI : 10.1109/ICACT.2008.4494002

D. Magoni and J. Pansiot, Internet topology modeler based on map sampling, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications, pp.1021-1027, 2002.
DOI : 10.1109/ISCC.2002.1021797

URL : https://hal.archives-ouvertes.fr/hal-00946551

J. Schafer and K. Malinka, Security in Peer-to-Peer Networks: Empiric Model of File Diffusion in BitTorrent, 2009 Fourth International Conference on Internet Monitoring and Protection, pp.39-44, 2009.
DOI : 10.1109/ICIMP.2009.14

J. Sen, A multi-path certification protocol for mobile ad hoc networks, Computers and Devices for Communication 4th International Conference on, pp.1-4, 2009.

A. Shamir, Identity-Based Cryptosystems and Signature Schemes, Proceedings of CRYPTO 84 on Advances in Cryptology, pp.47-53, 1985.
DOI : 10.1007/3-540-39568-7_5

M. Srivatsa and L. Liu, Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis, 20th Annual Computer Security Applications Conference, pp.252-261, 2004.
DOI : 10.1109/CSAC.2004.50

J. Suomalainen, A. Pehrsson, and J. K. Nurminen, A Security Analysis of a P2P Incentive Mechanisms for Mobile Devices, 2008 Third International Conference on Internet and Web Applications and Services, pp.397-402, 2008.
DOI : 10.1109/ICIW.2008.116

Y. Takano, N. Isozaki, and Y. Shinoda, Multipath key exchange on P2P networks, First International Conference on Availability, Reliability and Security (ARES'06), 2006.
DOI : 10.1109/ARES.2006.87

T. Tiendrebeogo, D. Ahmat, and D. Magoni, Reliable and Scalable Distributed Hash Tables Harnessing Hyperbolic Coordinates, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS), pp.1-6, 2012.
DOI : 10.1109/NTMS.2012.6208677

URL : https://hal.archives-ouvertes.fr/hal-00739155

T. Tiendrebeogo, D. Ahmat, D. Magoni, and O. Sié, Virtual connections in p2p overlays with dht-based name to address resolution, International Journal on Advances in Internet Technology, vol.5, issue.1, pp.11-25, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00739149

G. Urdaneta, G. Pierre, and M. Van-steen, A survey of DHT security techniques, ACM Computing Surveys, vol.43, issue.2, pp.1-8, 2011.
DOI : 10.1145/1883612.1883615

P. Wang, I. Osipkov, and Y. Kim, Myrmic: Secure and robust dht routing, 2007.