A. Bartholl, dead drops, 2010.

M. Bertier, D. Frey, R. Guerraoui, A. Kermarrec, and V. Leroy, The Gossple Anonymous Social Network, Middleware, 2010.
DOI : 10.1007/978-3-642-16955-7_10

URL : https://hal.archives-ouvertes.fr/hal-01055283

A. Chin, H. Wang, B. Xu, K. Zhang, H. Wang et al., Connecting People in the Workplace through Ephemeral Social Networks, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, 2011.
DOI : 10.1109/PASSAT/SocialCom.2011.88

D. Darts, The piratebox, 2011.

H. Gao, J. Hu, T. Huang, J. Wang, and Y. Chen, Security Issues in Online Social Networks, IEEE Internet Computing, vol.15, issue.4, pp.56-63, 2011.
DOI : 10.1109/MIC.2011.50

R. Geambasu, T. Kohno, A. A. Levy, and H. M. Levy, Vanish: increasing data privacy with self-destructing data, USENIX security, 2009.

A. Seshadri, A. Perrig, L. Van-doorn, and P. Khosla, SWATT: software-based attestation for embedded devices, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.272-282, 2004.
DOI : 10.1109/SECPRI.2004.1301329

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

Z. Zhang, Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: overview and challenges, IEEE Communications Surveys & Tutorials, vol.8, issue.1, pp.24-37, 2006.
DOI : 10.1109/COMST.2006.323440