T. Aura, M. Roe, and J. Arkko, Security of Internet location management, 18th Annual Computer Security Applications Conference, 2002. Proceedings., pp.78-87, 2002.
DOI : 10.1109/CSAC.2002.1176281

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.9022

N. Borselius, Mobile agent security, Electronics & Communication Engineering Journal, vol.14, issue.5, pp.211-218, 2002.
DOI : 10.1049/ecej:20020504

S. Buchegger and J. Y. Boudec, Performance analysis of the CONFIDANT protocol, Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing , MobiHoc '02, pp.226-236, 2002.
DOI : 10.1145/513800.513828

M. Castro, P. Druschel, A. J. Ganesh, A. I. Rowstron, and D. S. Wallach, Secure routing for structured peer-to-peer overlay networks, ACM SIGOPS Operating Systems Review, vol.36, issue.SI, p.OSDI, 2002.
DOI : 10.1145/844128.844156

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.1870

D. R. Clark and D. R. Wilson, A Comparison of Commercial and Military Computer Security Policies, 1987 IEEE Symposium on Security and Privacy, pp.184-194, 1987.
DOI : 10.1109/SP.1987.10001

M. Costa, M. Castro, A. I. Rowstron, and P. B. Key, PIC: practical Internet coordinates for distance estimation, 24th International Conference on Distributed Computing Systems, 2004. Proceedings., pp.178-187, 2004.
DOI : 10.1109/ICDCS.2004.1281582

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.4466

F. Dabek, R. Cox, M. F. Kaashoek, and R. Morris, Vivaldi: a decentralized network coordinate system, In: ACM SIGCOMM. pp, pp.15-26, 2004.

D. Dean, E. W. Felten, and D. S. Wallach, Java security: from HotJava to Netscape and beyond, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.190-200, 1996.
DOI : 10.1109/SECPRI.1996.502681

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.186.8361

D. Gollmann, Authentication by correspondence, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.88-95, 2003.
DOI : 10.1109/JSAC.2002.806132

C. Jackson, A. Barth, A. Bortz, W. Shao, and D. Boneh, Protecting browsers from DNS rebinding attacks, Proceedings of the 14th ACM Conference on Computer and Communications Security, pp.421-431, 2007.
DOI : 10.1145/1315245.1315298

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.8059

M. Johns, (Somewhat) breaking the same-origin policy by undermining DNS pinning. Posting to the Bug Traq mailing list, 2006.

M. A. Kaafar, L. Mathy, C. Barakat, K. Salamatian, T. Turletti et al., Securing internet coordinate embedding systems, In: ACM SIGCOMM, 2007.
DOI : 10.1145/1282427.1282388

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.164.8371

R. Langner, Stuxnet: Dissecting a Cyberwarfare Weapon, IEEE Security & Privacy Magazine, vol.9, issue.3, pp.49-51, 2011.
DOI : 10.1109/MSP.2011.67

D. B. Parker, Toward a New Framework for Information Security?, 2002.
DOI : 10.1002/9781118851678.ch3

M. Sherr, M. Blaze, and B. T. Loo, Veracity: Practical secure network coordinates via vote-based agreements, USENIX Annual Technical Conference (USENIX- ATC). USENIX, 2009.

G. J. Simmons and G. B. Purdy, Zero-Knowledge Proofs of Identity and Veracity of Transaction Receipts, Advances in Cryptology -Eurocrypt'88, pp.35-43, 1988.
DOI : 10.1007/3-540-45961-8_4