J. A. Akinyele, C. Garman, I. Miers, M. W. Pagano, M. Rushanan et al., Charm: a framework for rapidly prototyping cryptosystems, Journal of Cryptographic Engineering, vol.38, issue.3, pp.111-128, 2013.
DOI : 10.1007/s13389-013-0057-3

R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose, DNS security introduction and requirement, IETF, vol.4033, 2005.
DOI : 10.17487/rfc4033

D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, Lecture Notes in Computer Science, vol.2139, pp.213-229, 2001.
DOI : 10.1007/3-540-44647-8_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.3708

Z. Durumeric, J. Kasten, M. Bailey, and J. A. Halderman, Analysis of the HTTPS certificate ecosystem, Proceedings of the 2013 conference on Internet measurement conference, IMC '13, pp.291-304
DOI : 10.1145/2504730.2504755

M. Green and G. Ateniese, Identity-Based Proxy Re-encryption, Applied Cryptography and Network Security, pp.288-306, 2007.
DOI : 10.1007/978-3-540-72738-5_19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.63.9279

F. Hess, Efficient Identity Based Signature Schemes Based on Pairings, Lecture Notes in Computer Science, vol.2595, pp.310-324, 2003.
DOI : 10.1007/3-540-36492-7_20

V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs et al., Networking Named Content, Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, CoNEXT '09, pp.1-12, 2009.
DOI : 10.1145/1658939.1658941

K. V. Katsaros, N. Fotiou, X. Vasilakos, C. N. Ververidis, C. Tsilopoulos et al., On Inter-Domain Name Resolution for Information-Centric Networks, Lecture Notes in Computer Science, vol.7289, pp.13-26, 2012.
DOI : 10.1007/978-3-642-30045-5_2

A. Lewko, Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting, Advances in Cryptology EUROCRYPT 2012, pp.318-335, 2012.
DOI : 10.1007/978-3-642-29011-4_20

A. Lewko and B. Waters, Unbounded HIBE and Attribute-Based Encryption, Advances in Cryptology -EUROCRYPT 2011, pp.547-567, 2011.
DOI : 10.1007/978-3-642-20465-4_30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.188.4600

C. Rackoff, On " identities ROLES " and Security: A Manifesto, 2011.

N. Smart, Identity-based authenticated key agreement protocol based on Weil pairing, Electronics Letters, vol.38, issue.13, pp.630-632, 2002.
DOI : 10.1049/el:20020387

D. K. Smetters and G. Durfee, Domain-based administration of identity-based cryptosystems for secure email and ipsec, Network Protocols (ICNP) 19th IEEE International Conference on, 2003.

X. Zhang, K. Chang, H. Xiong, Y. Wen, G. Shi et al., Towards name-based trust and security for content-centric network, 2011 19th IEEE International Conference on Network Protocols, pp.1-6, 2011.
DOI : 10.1109/ICNP.2011.6089053