Influences on cooperation in BitTorrent communities, Proceeding of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems , P2PECON '05, pp.111-115, 2005. ,
DOI : 10.1145/1080192.1080198
EphPub: Toward robust Ephemeral Publishing, 2011 19th IEEE International Conference on Network Protocols, 2011. ,
DOI : 10.1109/ICNP.2011.6089048
URL : https://hal.archives-ouvertes.fr/hal-00748213
Hidden communication in P2P networks Steganographic handshake and broadcast, 2011 Proceedings IEEE INFOCOM, pp.954-962, 2011. ,
DOI : 10.1109/INFCOM.2011.5935323
Vanish: Increasing data privacy with self-destructing data, Proc. of the 18th USENIX Security Symposium, 2009. ,
Covert Channels in IPv6, Privacy Enhancing Technologies, pp.147-166, 2006. ,
DOI : 10.1007/3-540-49380-8_25
Crafting Web Counters into Covert Channels, New Approaches for Security, Privacy and Trust in Complex Environments, pp.337-348, 2007. ,
DOI : 10.1007/978-0-387-72367-9_29
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01, pp.53-65, 2002. ,
DOI : 10.1007/3-540-45748-8_5
A tutorial on Reed-Solomon coding for fault-tolerance in RAID-like systems, 1996. ,
Polynomial Codes Over Certain Finite Fields, Journal of the Society for Industrial and Applied Mathematics, vol.8, issue.2, pp.300-304, 1960. ,
DOI : 10.1137/0108018
Effective erasure codes for reliable computer communication protocols, ACM SIGCOMM Computer Communication Review, vol.27, issue.2, 1997. ,
DOI : 10.1145/263876.263881
The Prisoners??? Problem and the Subliminal Channel, pp.51-67, 1983. ,
DOI : 10.1007/978-1-4684-4730-9_5
Overbot -a botnet protocol based on kademlia, 4th International Conference on Security and Privacy in Communication Networks, 2008. ,
Covert channels in LAN protocols, Local Area Network Security, pp.89-101, 1989. ,
DOI : 10.1007/3-540-51754-5_33