E. Alba and C. Cotta, Evolutionary algorithms In: Handbook of Bioinspired Algorithms and Applications, pp.3-19, 2006.

M. Ben-or, S. Goldwasser, and A. Wigderson, Completeness theorems for noncryptographic fault-tolerant distributed computation, Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pp.1-10, 1988.
DOI : 10.1145/62212.62213

E. Brickell, Some Ideal Secret Sharing Schemes, EUROCRYPT 1989, pp.468-475, 1990.
DOI : 10.1007/3-540-46885-4_45

M. Burkhart, M. Strasser, D. Many, and X. Dimitropoulos, SEPIA: privacypreserving aggregation of multi-domain network events and statistics, Proceedings of the 19th USENIX Conference on Security, p.15, 2010.

N. Cao, Z. Yang, C. Wang, K. Ren, and W. Lou, Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing, 2011 31st International Conference on Distributed Computing Systems, pp.393-402, 2011.
DOI : 10.1109/ICDCS.2011.84

R. Cramer, I. Damgård, and U. Maurer, General Secure Multi-party Computation from any Linear Secret-Sharing Scheme, EUROCRYPT 2000, pp.316-334, 2000.
DOI : 10.1007/3-540-45539-6_22

I. Damgård, M. Geisler, M. Krøigaard, and J. B. Nielsen, Asynchronous Multiparty Computation: Theory and Implementation, PKC 2009, pp.160-179, 2009.
DOI : 10.1007/978-3-642-00468-1_10

I. Damgård, Y. Desmedt, M. Fitzi, and J. B. Nielsen, Secure Protocols with Asymmetric Trust, ASIACRYPT 2007, pp.357-375, 2007.
DOI : 10.1007/978-3-540-76900-2_22

J. Dongara, Linpack for android

D. Estrin, Participatory sensing: applications and architecture [Internet Predictions], IEEE Internet Computing, vol.14, issue.1, pp.12-42, 2010.
DOI : 10.1109/MIC.2010.12

R. Goldman, Pyramid Algorithms: A Dynamic Programming Approach to Curves and Surfaces for Geometric Modeling In: Lagrange Interpolation and Neville's Algorithm, ch. 2, 2003.

S. Kannan, A. Gavrilovska, and K. Schwan, Cloud4Home -- Enhancing Data Services with @Home Clouds, 2011 31st International Conference on Distributed Computing Systems, pp.539-548, 2011.
DOI : 10.1109/ICDCS.2011.74

P. Michiardi and R. Molva, Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks, Conference on Communications and Multimedia Security, p.121, 2002.
DOI : 10.1007/978-0-387-35612-9_9

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

C. Wang, K. Ren, J. Wang, and K. Urs, Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations, 2011 31st International Conference on Distributed Computing Systems, pp.549-558, 2011.
DOI : 10.1109/ICDCS.2011.41

A. C. Yao, Protocols for secure computations, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), pp.160-164, 1982.
DOI : 10.1109/SFCS.1982.38