Peer-to-peer networks allow to design low cost and high availability large systems. Contrary to clients in client-server systems, peers of a peer-to-peer network play an active role in the network and give some bandwidth, computation power and storage to the network : the presence of attackers or misbehaving peers can break the proposed service. Guaranteeing security properties in peer-to-peer networks yields new problems since, contrary to current systems where, most of the times, a central authority allows or not asked operations, no peer should have a critical role for the whole network. The main contribution of this thesis is a distributed certification authority which allows the distributed signature of certificates. Contrary to curren...
International audienceStructured P2P networks are vulnerable to the sybil attack. In this attack, a ...
Mobile Ad hoc networks are a step closer to the vision of pervasive computing where all devices dyna...
Mobile Ad hoc networks are a step closer to the vision of pervasive computing where all devices dyna...
A peer-to-peer (P2P) network is composed of a set of entities (called pairs) which share a set of re...
In a increasingly connected world, trust in information systems is essential. Thus, many questions a...
In a increasingly connected world, trust in information systems is essential. Thus, many questions a...
In a increasingly connected world, trust in information systems is essential. Thus, many questions a...
In a increasingly connected world, trust in information systems is essential. Thus, many questions a...
In a increasingly connected world, trust in information systems is essential. Thus, many questions a...
Peer-to-peer (P2P) networking enables users with similar interests to exchange, or obtain files. Thi...
The paradigms and architectures of overlay networks and especially Peer-to-Peer (P2P) networks becam...
Peer-to-peer (P2P) networking enables users with similar interests to exchange, or obtain files. Thi...
This thesis proposes the use of provable encryption schemes to obtain end-to-end security of distrib...
This thesis proposes the use of provable encryption schemes to obtain end-to-end security of distrib...
The paradigms and architectures of overlay networks and especially Peer-to-Peer (P2P) networks becam...
International audienceStructured P2P networks are vulnerable to the sybil attack. In this attack, a ...
Mobile Ad hoc networks are a step closer to the vision of pervasive computing where all devices dyna...
Mobile Ad hoc networks are a step closer to the vision of pervasive computing where all devices dyna...
A peer-to-peer (P2P) network is composed of a set of entities (called pairs) which share a set of re...
In a increasingly connected world, trust in information systems is essential. Thus, many questions a...
In a increasingly connected world, trust in information systems is essential. Thus, many questions a...
In a increasingly connected world, trust in information systems is essential. Thus, many questions a...
In a increasingly connected world, trust in information systems is essential. Thus, many questions a...
In a increasingly connected world, trust in information systems is essential. Thus, many questions a...
Peer-to-peer (P2P) networking enables users with similar interests to exchange, or obtain files. Thi...
The paradigms and architectures of overlay networks and especially Peer-to-Peer (P2P) networks becam...
Peer-to-peer (P2P) networking enables users with similar interests to exchange, or obtain files. Thi...
This thesis proposes the use of provable encryption schemes to obtain end-to-end security of distrib...
This thesis proposes the use of provable encryption schemes to obtain end-to-end security of distrib...
The paradigms and architectures of overlay networks and especially Peer-to-Peer (P2P) networks becam...
International audienceStructured P2P networks are vulnerable to the sybil attack. In this attack, a ...
Mobile Ad hoc networks are a step closer to the vision of pervasive computing where all devices dyna...
Mobile Ad hoc networks are a step closer to the vision of pervasive computing where all devices dyna...