Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic, Proceedings of the Passive and Active Measurment Conference (PAM'07), 2007. ,
DOI : 10.1007/978-3-540-71617-4_5
Tempering Kademlia with a Robust Identity Based System, 2008 Eighth International Conference on Peer-to-Peer Computing, pp.30-39, 2008. ,
DOI : 10.1109/P2P.2008.40
Secure routing for structured peer-to-peer overlay networks, ACM SIGOPS Operating Systems Review, vol.36, issue.SI, pp.299-314, 2002. ,
DOI : 10.1145/844128.844156
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.1870
« Detection and Mitigation of Localized Attacks in a Widely Deployed P2P Network », Journal of Peer-to-Peer Networking and Applications, Special Issue on Experimental Evaluation of Peer-to-Peer Applications, 2012. ,
Content availability, pollution and poisoning in file sharing peer-to-peer networks, Proceedings of the 6th ACM conference on Electronic commerce , EC '05, pp.68-77, 2005. ,
DOI : 10.1145/1064009.1064017
Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), pp.53-60, 2007. ,
DOI : 10.1109/P2P.2007.15
« Denial-ofservice resilience in peer-to-peer file sharing systems », SIGMETRICS Perform, Eval. Rev, vol.33, pp.1-38, 2005. ,
Content Rating and Fake Detection System, Measurement and Analysis of P2P Activity Against Paedophile Content Project, 2009. ,
Characterizing the query behavior in peer-to-peer file sharing systems, Proceedings of the 4th ACM SIGCOMM conference on Internet measurement , IMC '04, pp.55-67, 2004. ,
DOI : 10.1145/1028788.1028796
Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network, Proceedings of the 8 th International IFIP-TC 6 Networking Conference (Networking'09), pp.104-116, 2009. ,
DOI : 10.1007/3-540-45748-8_24
Attacking a Swarm with a Band of Liars: evaluating the impact of attacks on BitTorrent, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), pp.37-44, 2007. ,
DOI : 10.1109/P2P.2007.14
First report on database specification and access including content rating and fake detection system, Rapport, Measurement and Analysis of, 2008. ,
A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification, 2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2008. ,
DOI : 10.1109/WETICE.2008.7
URL : https://hal.archives-ouvertes.fr/hal-00287700
Efficient Blacklisting and Pollution-Level Estimation in P2P File-Sharing Systems, Lecture Notes in Computer Science, AINTEC, vol.3837, pp.1-21, 2005. ,
DOI : 10.1007/11599593_1
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, Revised Papers from the1 st International Workshop on Peerto-Peer Systems (IPTPS'01), pp.53-65, 2002. ,
DOI : 10.1007/3-540-45748-8_5
Exploiting P2P systems for DDoS attacks, Proceedings of the 1st international conference on Scalable information systems , InfoScale '06, p.47, 2006. ,
DOI : 10.1145/1146847.1146894
Winnowing: Protecting P2P systems against pollution through cooperative index filtering, Journal of Network and Computer Applications, vol.35, issue.1, 2009. ,
DOI : 10.1016/j.jnca.2011.02.015
Defending against eclipse attacks on overlay networks, Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC , EW11, p.21, 2004. ,
DOI : 10.1145/1133572.1133613
Hash collision Attack Vectors on the eD2k P2P Network, 2010. ,
« Crawling BitTorrent DHTs for Fun and Profit, Proceeding 4 th USENIX Workshop on Offensive Technologies (WOOT), 2010. ,
SybilGuard: Defending Against Sybil Attacks via Social Networks, Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM'06), pp.267-278, 2006. ,
DOI : 10.1109/TNET.2008.923723