Epidemic Algorithms for Replicated Database Maintenance, Proceedings of the Sixth annual ACM Symposium on Principles of Distributed Computing, PODC'87, pp.1-12, 1987. ,
The Sybil Attack, Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01, pp.251-260, 2002. ,
DOI : 10.1007/3-540-45748-8_24
The case of the fake picasso: Preventing history forgery with secure provenance, In FAST, pp.1-14, 2009. ,
The hash history approach for reconciling mutual inconsistency, ICDCS, pp.670-677, 2003. ,
Operation-based merging, ACM SIGSOFT Software Engineering Notes, vol.17, issue.5, pp.78-87, 1992. ,
DOI : 10.1145/142882.143753
Collaborating with Git. Linux Magazine, 2006. ,
A new approach to secure logging, TOS, vol.5, issue.1, 2009. ,
Secure history preservation through timeline entanglement, Proceedings of the 11th USENIX Security Symposium, pp.297-312, 2002. ,
Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems, ACM Transactions on Information and System Security, vol.9, issue.4, pp.421-460, 2006. ,
DOI : 10.1145/1187441.1187443
Handbook of Applied Cryptography, 2001. ,
DOI : 10.1201/9781439821916
Mercurial: The Definitive Guide. O'Reilly Media, 2009. ,
Design and implementation of verifiable audit trails for a versioning file system, Proceedings of the 5th USENIX conference on File and Storage Technologies, pp.20-20, 2007. ,
Optimistic replication, ACM Computing Surveys, vol.37, issue.1, pp.42-81, 2005. ,
DOI : 10.1145/1057977.1057980
URL : https://hal.archives-ouvertes.fr/inria-00444768
Experience with an Object Reputation System for Peer-to-Peer Filesharing (Awarded Best Paper), NSDI, 2006. ,
Logoot-Undo: Distributed Collaborative Editing System on P2P Networks, IEEE Transactions on Parallel and Distributed Systems, vol.21, issue.8, pp.1162-1174, 2010. ,
DOI : 10.1109/TPDS.2009.173
URL : https://hal.archives-ouvertes.fr/hal-00450416