L. Lamport, R. Shostak, and M. Pease, The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, pp.382-401, 1982.
DOI : 10.1145/357172.357176

L. Lamport, Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, issue.7, pp.558-565, 1978.
DOI : 10.1145/359545.359563

C. Dwork, N. Lynch-bracha, and S. Toueg, Stockmeyer l: Consensus in the presence of partial synchrony Asynchronous consensus and broadcast protocols, Journal of The ACM Journal of the ACM (JACM), vol.32, issue.4, pp.824-840, 1985.

M. Castro and B. Liskov, Practical byzantine fault tolerance and proactive recovery, ACM Transactions on Computer Systems, vol.20, issue.4, pp.398-461, 2002.
DOI : 10.1145/571637.571640

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.6725

M. Abd-el-malek, G. R. Ganger, G. R. Goodson, M. K. Reiter, and J. J. Wylie, Fault-scalable Byzantine fault-tolerant services, ACM SIGOPS Operating Systems Review, vol.39, issue.5, pp.59-74, 2005.
DOI : 10.1145/1095809.1095817

J. Cowling, D. Myers, B. Liskov, R. Rodrigues, and L. Shrira, Hq replication: a hybrid quorum protocol for byzantine fault tolerance, OSDI '06: Proceedings of the 7th symposium on Operating systems design and implementation, pp.177-190, 2006.

R. Kotla, L. Alvisi, M. Dahlin, A. Clement, and E. Wong, Zyzzyva, ACM SIGOPS Operating Systems Review, vol.41, issue.6, pp.45-58, 2007.
DOI : 10.1145/1323293.1294267

R. Guerraoui, N. Kne?evi´kne?evi´c, V. Quéma, and M. Vukoli´cvukoli´c, The next 700 bft protocols, EuroSys '10: Proceedings of the 5th European conference on Computer systems, pp.363-376, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00945717

A. Clement, E. Wong, L. Alvisi, M. Dahlin, and M. Marchetti, Making byzantine fault tolerant systems tolerate byzantine faults, NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementation, pp.153-168, 2009.

M. Castro, R. Rodrigues, and B. Liskov, BASE, ACM Transactions on Computer Systems, vol.21, issue.3, pp.236-269, 2003.
DOI : 10.1145/859716.859718

URL : https://hal.archives-ouvertes.fr/hal-00357946

T. Roeder and F. B. Schneider, Proactive obfuscation, ACM Transactions on Computer Systems, vol.28, issue.2, pp.1-4, 2010.
DOI : 10.1145/1813654.1813655

R. Guerraoui and M. Yabandeh, Independent faults in the cloud, Proceedings of the 4th International Workshop on Large Scale Distributed Systems and Middleware, LADIS '10, pp.12-17, 2010.
DOI : 10.1145/1859184.1859188

B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad et al., An integrated experimental environment for distributed systems and networks, ACM SIGOPS Operating Systems Review, vol.36, issue.SI, pp.255-270, 2002.
DOI : 10.1145/844128.844152

O. Rafael, R. Bessani-alysson-neves, L. Lau-cheuk, and C. Miguel, How practical are intrusion-tolerant distributed systems, p.2992, 2006.

R. Guerraoui, N. Kne?evi´kne?evi´c, V. Quéma, and M. Vukoli´cvukoli´c, The next 700 bft protocol, 2008.

N. M. Roger-dingledine and P. Syverson, Tor: The second-generation onion router, Proceedings of the 13th USENIX Security Symposium, pp.303-320, 2004.

S. Goel, M. Robson, M. Polte, and E. G. Sirer, Herbivore: A Scalable and Efficient Protocol for Anonymous Communication, 2003.

H. Corrigan-gibbs and B. Ford, Dissent, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.340-350, 2010.
DOI : 10.1145/1866307.1866346