N. Andrade, M. Mowbray, A. Lima, G. Wagner, and M. Ripeanu, Influences on cooperation in BitTorrent communities, Proceeding of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems , P2PECON '05, pp.111-115, 2005.
DOI : 10.1145/1080192.1080198

M. A. Mathieu-cunche, R. Kaafar, and . Boreli, Asynchronous Covert Communication Using BitTorrent Trackers, 2014.

R. Eidenbenz, T. Locher, and R. Wattenhofer, Hidden communication in P2P networks Steganographic handshake and broadcast, 2011 Proceedings IEEE INFOCOM, pp.954-962, 2011.
DOI : 10.1109/INFCOM.2011.5935323

N. Lucena, G. Lewandowski, and S. Chapin, Covert Channels in IPv6, Privacy Enhancing Technologies, pp.147-166, 2006.
DOI : 10.1007/3-540-49380-8_25

L. Rizzo, Effective erasure codes for reliable computer communication protocols, ACM SIGCOMM Computer Communication Review, vol.27, issue.2, 1997.
DOI : 10.1145/263876.263881

G. Starnberger, C. Kruegel, and E. Kirda, Overbot a botnet protocol based on kademlia, 4th International Conference on Security and Privacy in Communication Networks, 2008.