Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults, NSDI'09, 2009. ,
Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret, CRYPTO'86, pp.251-260, 1986. ,
Secretive Birds: Privacy in Population Protocols, OPODIS'07, pp.329-342, 2007. ,
DOI : 10.1007/978-3-540-77096-1_24
URL : https://hal.archives-ouvertes.fr/hal-00175536
The Design of a Distributed Rating Scheme for Peer-to-Peer Systems, Workshop on Economics of Peer-to-Peer Systems, 2003. ,
Kelips: Building an Efficient and Stable P2P DHT through Increased Memory and Background Overhead, IPTPS'03, pp.160-169, 2003. ,
DOI : 10.1007/978-3-540-45172-3_15
A reputation system for peer-to-peer networks, Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video , NOSSDAV '03, pp.144-152, 2003. ,
DOI : 10.1145/776322.776346
PeerReview: Practical Accountability for Distributed Systems, SOSP'07, pp.175-188, 2007. ,
Fireflies, ACM SIGOPS Operating Systems Review, vol.40, issue.4, pp.3-13, 2006. ,
DOI : 10.1145/1218063.1217937
E-voting without ???Cryptography???, FC'02, pp.1-15, 2002. ,
DOI : 10.1007/3-540-36504-4_1
Anonymity without ???Cryptography???, FC'01, pp.108-126, 2001. ,
DOI : 10.1007/3-540-46088-8_12
Verifiable secret sharing and multiparty protocols with honest majority, Proceedings of the twenty-first annual ACM symposium on Theory of computing , STOC '89, pp.73-85, 1989. ,
DOI : 10.1145/73007.73014
A Scalable Content-Addressable Network, SIGCOMM'01, pp.161-172, 2001. ,
How to Share a Secret, Communications of the ACM, vol.22, pp.612-613, 1979. ,
Analysis of Peer-to-peer Distributed Reputation Schemes, 2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.1-6, 2005. ,
DOI : 10.1109/COLCOM.2005.1651237
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems, Middleware'01, pp.329-350, 2001. ,
DOI : 10.1007/3-540-45518-3_18
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications, SIGCOMM'01, pp.149-160, 2001. ,
Information accountability, Communications of the ACM, vol.51, issue.6, pp.82-87, 2008. ,
DOI : 10.1145/1349026.1349043
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks, SP'08, pp.3-17, 2008. ,
SybilGuard: Defending Against Sybil Attacks via Social Networks, IEEE/ACM Transactions on Networking, vol.16, issue.3, pp.576-589, 2008. ,
DOI : 10.1109/TNET.2008.923723