dead drops, 2010. ,
The Gossple Anonymous Social Network, Middleware, 2010. ,
DOI : 10.1007/978-3-642-16955-7_10
URL : https://hal.archives-ouvertes.fr/hal-01055283
Connecting People in the Workplace through Ephemeral Social Networks, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, 2011. ,
DOI : 10.1109/PASSAT/SocialCom.2011.88
The piratebox, 2011. ,
Security Issues in Online Social Networks, IEEE Internet Computing, vol.15, issue.4, pp.56-63, 2011. ,
DOI : 10.1109/MIC.2011.50
Vanish: increasing data privacy with self-destructing data, USENIX security, 2009. ,
SWATT: software-based attestation for embedded devices, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.272-282, 2004. ,
DOI : 10.1109/SECPRI.2004.1301329
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
DOI : 10.1145/359168.359176
Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: overview and challenges, IEEE Communications Surveys & Tutorials, vol.8, issue.1, pp.24-37, 2006. ,
DOI : 10.1109/COMST.2006.323440