Q. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker, Search and Replication in Unstructured Peer-to-Peer Networks, Proceedings of the International Conference on Supercomputing (ICS), 2002.

M. Bertier, Y. Busnel, and A. M. Kermarrec, On Gossip and Populations, Proceedings of the 16th International Colloquium on Structural Information and Communication Complexity, 2009.
DOI : 10.1145/1275517.1275520

URL : https://hal.archives-ouvertes.fr/inria-00437857

B. Bollobás, Random Graphs ? 2nd Edition, 2001.

A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson et al., Epidemic algorithms for replicated database management, Proceedings of the 6th ACM Symposium on Principles of Distributed Computing (PODC), 1987.

L. Massoulié, E. L. Merrer, A. M. Kermarrec, and A. Ganesh, Peer counting and sampling in overlay networks, Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing , PODC '06, pp.123-132, 2006.
DOI : 10.1145/1146381.1146402

D. Stutzbach, R. Rejaie, N. Duffield, S. Sen, and W. Willinger, On Unbiased Sampling for Unstructured Peer-to-Peer Networks, IEEE/ACM Transactions on Networking, vol.17, issue.2, pp.377-390, 2009.
DOI : 10.1109/TNET.2008.2001730

E. Sit and R. Morris, Security Considerations for Peer-to-Peer Distributed Hash Tables, Proceedings of the 1rst International Workshop on Peer-to-Peer Systems (IPTPS), 2002.
DOI : 10.1007/3-540-45748-8_25

E. Bortnikov, M. Gurevich, I. Keidar, G. Kliot, and A. Shraer, Brahms, Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing, PODC '08, pp.2340-2359, 2008.
DOI : 10.1145/1400751.1400772

B. Awerbuch and C. Scheideler, Group Spreading: A Protocol for Provably Secure Distributed Name Service, Proceedings of the 31rst International Colloquium on Automata, Languages and Programming (ICALP), 2004.
DOI : 10.1007/978-3-540-27836-8_18

G. P. Jesi, A. Montresor, and M. Van-steen, Secure peer sampling, Computer Networks, vol.54, issue.12, pp.2086-2098, 2010.
DOI : 10.1016/j.comnet.2010.03.020

A. Singh, T. W. Ngan, P. Druschel, and D. S. Wallach, Eclipse Attacks on Overlay Networks: Threats and Defenses, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006.
DOI : 10.1109/INFOCOM.2006.231

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.3679

J. Douceur and J. S. Donath, The Sybil Attack, Proceedings of the 1rst International Workshop on Peer-to-Peer Systems (IPTPS), 2002.
DOI : 10.1007/3-540-45748-8_24

B. Awerbuch and C. Scheideler, Towards a Scalable and Robust Overlay Network, Proceedings of the 6th International Workshop on Peer-to-Peer Systems (IPTPS), 2007.

E. Anceaume, R. Ludinard, and B. Sericola, Performance evaluation of large-scale dynamic systems, ACM SIGMETRICS Performance Evaluation Review, vol.39, issue.4, pp.108-117, 2012.
DOI : 10.1145/2185395.2185447

URL : https://hal.archives-ouvertes.fr/hal-00653409

E. Anceaume, F. Brasileiro, R. Ludinard, B. Sericola, and F. Tronel, DEPENDABILITY EVALUATION OF CLUSTER-BASED DISTRIBUTED SYSTEMS, International Journal of Foundations of Computer Science, vol.22, issue.05, 2011.
DOI : 10.1142/S0129054111008593

URL : https://hal.archives-ouvertes.fr/hal-00650086

S. Voulgaris, D. Gavidia, and M. Van-steen, CYCLON: Inexpensive Membership Management for Unstructured P2P Overlays, Journal of Network and Systems Management, vol.21, issue.6, pp.197-217, 2005.
DOI : 10.1007/s10922-005-4441-x

M. Zhong, K. Shen, and J. Seiferas, Non-uniform random membership management in peer-to-peer networks, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., 2005.
DOI : 10.1109/INFCOM.2005.1498342

A. Awan, R. A. Ferreira, S. Jagannathan, and A. Grama, Distributed Uniform Sampling in Unstructured Peer-to-Peer Networks, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), 2006.
DOI : 10.1109/HICSS.2006.126

M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, Secure Routing for Structured Peer-to-peer Overlay Networks, Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI), 2002.

S. Ratnasamy, P. Francis, M. Handley, R. M. Karp, and S. Shenker, A scalable content-addressable network, Proceedings of the ACM Conference on Applications , Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), 2001.

I. Stoica, R. Morris, D. Liben-nowell, D. R. Karger, M. F. Kaashoek et al., Chord: a scalable peer-to-peer lookup protocol for internet applications, IEEE/ACM Transactions on Networking, vol.11, issue.1, pp.17-32, 2003.
DOI : 10.1109/TNET.2002.808407

A. I. Rowstron and P. Druschel, Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems, Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms (Middlware), 2001.
DOI : 10.1007/3-540-45518-3_18

K. Hildrum and J. Kubiatowicz, Asymptotically Efficient Approaches to Faulttolerance in Peer-to-Peer Networks, Proceedings of the International Symposium on Distributed Computing, 2003.

A. Fiat, J. Saia, and M. Young, Making Chord Robust to Byzantine Attacks, Proceedings of the Annual European Symposium on Algorithms, pp.803-814, 2005.
DOI : 10.1007/11561071_71

E. Anceaume, F. Brasileiro, R. Ludinard, and A. Ravoaja, PeerCube: A Hypercube-Based P2P Overlay Robust against Collusion and Churn, 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008.
DOI : 10.1109/SASO.2008.44

T. Condie, V. Kacholia, S. Sank, J. M. Hellerstein, and P. Maniatis, Induced Churn as Shelter from Routing-Table Poisoning, Proceedings of the International Network and Distributed System Security Symposium (NDSS), 2006.

D. Liu, P. Ning, and W. Du, Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks, Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS), 2005.

E. Anceaume, Y. Busnel, and S. Gambs, Uniform and Ergodic Sampling in Unstructured Peer-to-Peer Systems with Malicious Nodes, Proceedings of the 14th International Conference On Principles Of Distributed Systems (OPODIS)
DOI : 10.1007/11561071_71

URL : https://hal.archives-ouvertes.fr/hal-00554219

E. Anceaume, Y. Busnel, and S. Gambs, Characterizing the adversarial power in uniform and ergodic node sampling, Proceedings of the First International Workshop on Algorithms and Models for Distributed Event Processing, AlMoDEP '11, 2011.
DOI : 10.1145/2031792.2031795

URL : https://hal.archives-ouvertes.fr/inria-00617866

Y. Busnel, R. Beraldi, and R. Baldoni, On the uniformity of peer sampling based on view shuffling, Journal of Parallel and Distributed Computing, vol.71, issue.8, pp.1165-1176, 2011.
DOI : 10.1016/j.jpdc.2011.01.009

URL : https://hal.archives-ouvertes.fr/inria-00559003

M. Gurevich and I. Keidar, Correctness of Gossip-Based Membership under Message Loss, Proceedings of the 28th annual Symposium on Principles of distributed computing (PODC), 2009.

H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks, Proceedings of the IEEE Symposium on Security and Privacy (SP), 2008.

H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, SybilGuard: Defending against Sybil Attacks via Social Networks, Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), 2006.

P. B. Godfrey, S. Shenker, and I. Stoica, Minimizing churn in distributed systems, Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), 2006.

T. Cover and J. Thomas, Elements of information theory, 1991.

S. M. Ali and S. D. Silvey, General Class of Coefficients of Divergence of One Distribution from Another, Journal of the Royal Statistical Society. Series B (Methodological ), vol.28, issue.1, pp.131-142, 1966.

E. Anceaume and Y. Busnel, A Distributed Information Divergence Estimation over Data Streams, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.2, 2013.
DOI : 10.1109/TPDS.2013.101

URL : https://hal.archives-ouvertes.fr/hal-00998708

G. Monge, Mémoire sur la théorie des déblais et des remblais Histoire de l'Academie royale des sciences, pp.666-704, 1781.