N. Andrade, M. Mowbray, A. Lima, G. Wagner, and M. Ripeanu, Influences on cooperation in BitTorrent communities, Proceeding of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems , P2PECON '05, pp.111-115, 2005.
DOI : 10.1145/1080192.1080198

C. Castelluccia, E. De-cristofaro, A. Francillon, and M. A. Kaafar, EphPub: Toward robust Ephemeral Publishing, 2011 19th IEEE International Conference on Network Protocols, 2011.
DOI : 10.1109/ICNP.2011.6089048

URL : https://hal.archives-ouvertes.fr/hal-00748213

R. Eidenbenz, T. Locher, and R. Wattenhofer, Hidden communication in P2P networks Steganographic handshake and broadcast, 2011 Proceedings IEEE INFOCOM, pp.954-962, 2011.
DOI : 10.1109/INFCOM.2011.5935323

R. Geambasu, T. Kohno, A. Levy, and H. M. Levy, Vanish: Increasing data privacy with self-destructing data, Proc. of the 18th USENIX Security Symposium, 2009.

N. Lucena, G. Lewandowski, and S. Chapin, Covert Channels in IPv6, Privacy Enhancing Technologies, pp.147-166, 2006.
DOI : 10.1007/3-540-49380-8_25

X. Luo, E. Chan, and R. Chang, Crafting Web Counters into Covert Channels, New Approaches for Security, Privacy and Trust in Complex Environments, pp.337-348, 2007.
DOI : 10.1007/978-0-387-72367-9_29

P. Maymounkov and D. Mazières, Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01, pp.53-65, 2002.
DOI : 10.1007/3-540-45748-8_5

J. S. Plank, A tutorial on Reed-Solomon coding for fault-tolerance in RAID-like systems, 1996.

I. S. Reed and G. Solomon, Polynomial Codes Over Certain Finite Fields, Journal of the Society for Industrial and Applied Mathematics, vol.8, issue.2, pp.300-304, 1960.
DOI : 10.1137/0108018

L. Rizzo, Effective erasure codes for reliable computer communication protocols, ACM SIGCOMM Computer Communication Review, vol.27, issue.2, 1997.
DOI : 10.1145/263876.263881

G. J. Simmons, The Prisoners??? Problem and the Subliminal Channel, pp.51-67, 1983.
DOI : 10.1007/978-1-4684-4730-9_5

G. Starnberger, C. Kruegel, and E. Kirda, Overbot -a botnet protocol based on kademlia, 4th International Conference on Security and Privacy in Communication Networks, 2008.

M. Wolf, Covert channels in LAN protocols, Local Area Network Security, pp.89-101, 1989.
DOI : 10.1007/3-540-51754-5_33