K. Singh and H. Schulzrinne, Peer-to-peer internet telephony using SIP, Proceedings of the international workshop on Network and operating systems support for digital audio and video , NOSSDAV '05, pp.63-68, 2005.
DOI : 10.1145/1065983.1065999

E. K. Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim, A Survey and Comparison of Peer-to-Peer Overlay Network Schemes, IEEE Communications Surveys and Tutorials, pp.72-93

J. Seedorf, Security challenges for peer-to-peer SIP, IEEE Network, vol.20, issue.5, pp.38-45, 2006.
DOI : 10.1109/MNET.2006.1705882

D. Chopra, H. Schulzrinne, E. Marocco, and E. Ivov, Peer-to-peer overlays for real-time communication: security issues and solutions, IEEE Communications Surveys & Tutorials, vol.11, issue.1, 2009.
DOI : 10.1109/SURV.2009.090102

T. Cholez and I. Chrisment, Evaluation of Sybil Attacks Protection Schemes in KAD, Proc. of the 3rd International Conference on Autonomous Infrastructure, Management and Security (AIMS'09, pp.70-82, 2009.
DOI : 10.1145/1151659.1159945

URL : https://hal.archives-ouvertes.fr/inria-00405381

C. Miguel, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, Secure Routing for Structured Peer-to-peer Overlay Networks, SIGOPS Oper. Syst. Rev, vol.36, pp.299-314, 2002.

A. Keromytis, A Survey of Voice over IP Security Research, Proc. of the 5th International Conference on Information Systems Security (ICISS'09, pp.1-17, 2009.
DOI : 10.1007/978-3-642-10772-6_1

J. Seedorf, F. Ruwolt, M. Stiemerling, and S. Niccolini, Evaluating P2PSIP under Attack: An Emulative Study, IEEE GLOBECOM 2008, 2008 IEEE Global Telecommunications Conference, 2008.
DOI : 10.1109/GLOCOM.2008.ECP.422

I. Voice-over and . Security-alliance, VoIP Security and Privacy Threat Taxonomy, 2005.

R. Schlegel, S. Niccolini, S. Tartarelli, and M. Brunner, ISE03-2: SPam over Internet Telephony (SPIT) Prevention Framework, IEEE Globecom 2006, 2006.
DOI : 10.1109/GLOCOM.2006.192

V. M. Quinten, R. Van-de-meent, and A. Pras, Analysis of Techniques for Protection Against Spam over Internet Telephony, Proc. of 13th Open European Summer School EUNICE 2007, 2007.
DOI : 10.1007/978-3-540-73530-4_9

S. Becker, R. State, and T. Engel, Using game theory to configure P2P SIP, Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications, IPTComm '09, pp.1-6, 2009.
DOI : 10.1145/1595637.1595645

A. Gehani and G. Kedem, RheoStat: Real-Time Risk Management, Proc. of the 7th International Symposium on Recent Advances in Intrusion Detection, 2004.
DOI : 10.1007/978-3-540-30143-1_16

D. Shin and C. Shim, Progressive Multi Gray-Leveling: A Voice Spam Protection Algorithm, IEEE Network Magazine, vol.20, 2006.

T. Bedford and R. Cooke, Probabilistic Risk Analysis: Foundations and Methods, 2001.
DOI : 10.1017/CBO9780511813597

N. Heureuse, J. Seedorf, S. Niccolini, and T. Ewald, Protecting SIP-based Networks and Services from Unwanted Communications, Proc. of the GLOBECOM'08 Conference, 2008.

J. Seedorf, Using Cryptographically Generated SIP-URIs to protect the Integrity of Content in P2P-SIP, Proc. of the 3rd Annual VoIP Security Workshop (VSW'06), 2006.