[. Cholez, I. Chrisment, and O. Festor, Evaluation of Sybil Attacks Protection Schemes in KAD, 3rd International Conference on Autonomous Infrastructure, Management and Security -AIMS 2009 Scalability of Networks and Services Seventh International Workshop on Hot Topics in Peer-to-Peer Systems -HotP2P 2010 IEEE International Parallel & Distributed Processing Symposium. [CCF10b], pp.70-82, 2009.
DOI : 10.1145/1151659.1159945

URL : https://hal.archives-ouvertes.fr/inria-00405381

T. Cholez, I. Chrisment, and O. Festor, Monitoring and Controlling Content Access in KAD, 2010 IEEE International Conference on Communications, 2010.
DOI : 10.1109/ICC.2010.5502179

URL : https://hal.archives-ouvertes.fr/inria-00490347

J. Dinger and H. Hartenstein, Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration, First International Conference on Availability, Reliability and Security (ARES'06), pp.756-763, 2006.
DOI : 10.1109/ARES.2006.45

G. Danezis, C. Lesniewski-laas, M. F. Kaashoek, and R. J. Anderson, Sybil-Resistant DHT Routing, ESORICS, pp.305-318, 2005.
DOI : 10.1007/11555827_18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.65.3947

R. John and . Douceur, The sybil attack, IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp.251-260, 2002.

[. Kohnen, M. Leske, and E. P. Rathgeb, Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network, NETWORKING '09: Proceedings of the 8th International IFIP-TC 6 Networking Conference, pp.104-116, 2009.
DOI : 10.1007/3-540-45748-8_24

A. Stevens-le-blond, F. L. Legout, W. Fessant, M. A. Dabbous, and . Kaafar, Spying the World from your Laptop ? Identifying and Profiling Content Providers and Big Downloaders in BitTorrent, 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'10), 2010.

T. Locher, D. Mysicka, S. Schmid, and R. Wattenhofer, Poisoning the Kad Network [LMT08] Francois Lesueur, Ludovic Mé, and Valérie Viet Triem Tong. A sybil-resistant admission control coupling SybilGuard with distributed certification, 11th International Conference on Distributed Computing and Networking (ICDCN) Proceedings of the 4th International Workshop on Collaborative Peer-to-Peer Systems (COPS), 2008.
DOI : 10.1007/978-3-642-11322-2_22

J. Liang, N. Naoumov, and K. W. Ross, The index poisoning attack in p2p file sharing systems [MM02] Petar Maymounkov and DavidMazì eres. Kademlia: A peer-to-peer information system based on the XOR metric, INFOCOM. IEEE Computer Society, IEEE IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp.53-65, 2002.

G. Memon, R. Rejaie, Y. Guo, and D. Stutzbach, Large-scale monitoring of DHT traffic Exploiting p2p systems for ddos attacks Challenges and directions for monitoring p2p file sharing networks -or -why my printer received a dmca takedown notice, International Workshop on Peer-to-Peer Systems (IPTPS) InfoScale '06: Proceedings of the 1st international conference on Scalable information systems HotSec. USENIX Association, p.47, 2006.

R. Potharaju, J. Seibert, S. Fahmy, and C. Nita-rotaru, Omnify: Investigating the Visibility and Effectiveness of Copyright Monitors, Proceedings of the 12th international conference on Passive and active measurement, pp.122-132, 2011.
DOI : 10.1016/S0169-7552(97)00031-7

H. Rowaihy, W. Enck, P. Mcdaniel, and T. L. Porta, Limiting Sybil Attacks in Structured P2P Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp.2596-2600, 2007.
DOI : 10.1109/INFCOM.2007.328

A. Singh, M. Castro, P. Druschel, and A. Rowstron, Defending against eclipse attacks on overlay networks, Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC , EW11, p.21, 2004.
DOI : 10.1145/1133572.1133613

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.5727

[. Steiner, T. En-najjary, and E. W. Biersack, Exploiting KAD, ACM SIGCOMM Computer Communication Review, vol.37, issue.5, pp.65-70, 2007.
DOI : 10.1145/1290168.1290176

M. Steiner, T. En-najjary, E. Siganos, J. M. Pujol, P. Rodriguezsr94 et al., A global view of kad Monitoring the bittorrent monitors: A bird's eye view Biometry: the principles and practice of statistics in biological research, Proceedings of the 10th International Conference on Passive and Active Network Measurement, PAM '09, pp.175-184, 1994.

J. P. Timpanaro, T. Cholez, I. Chrisment, and O. Festor, When kad meets bittorrent -building a stronger p2p network. In Eighth International Workshop on Hot Topics in Peer-to-Peer Systems -HotP2P, IEEE International Parallel & Distributed Processing Symposium, 2011.
DOI : 10.1109/ipdps.2011.318

URL : https://hal.archives-ouvertes.fr/inria-00595086

[. Wang, J. Tyra, E. Chan-tin, T. Malchow, D. Foo-kune et al., Attacking the Kad network, Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm '08, pp.1-10, 2008.
DOI : 10.1145/1460877.1460907

J. Xu, E. Chang, and Z. Li, Id repetition in KAD, Peer-to-Peer Computing, pp.111-120, 2009.

H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, Sybilguard: defending against sybil attacks via social networks, SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures , and protocols for computer communications, pp.267-278, 2006.
DOI : 10.1109/tnet.2008.923723

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.3018