R. Dingledine, N. Mathewson, and P. Syverson, Tor: the second-generation onion router, Proceedings of the 13th conference on USENIX Security Symposium, SSYM '04, pp.21-21, 2004.

A. Biryukov, I. Pustogarov, and R. Weinmann, Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization, 2013 IEEE Symposium on Security and Privacy, pp.80-94, 2013.
DOI : 10.1109/SP.2013.15

. Tor-weekly and . News, Tor and the RELAY EARLY traffic confirmation attack

D. Mccoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker, Shining Light in Dark Places: Understanding the Tor Network, Proceedings of the 8th Privacy Enhancing Technologies Symposium, PETS '08, 2008.
DOI : 10.1007/978-3-540-70630-4_5

A. Crenshaw, Darknets and hidden servers: Identifying the true IP/network identity of I2P service hosts, Black Hat DC 2011, 2011.

M. Herrmann and C. Grothoff, Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study Using I2P, Proceedings of the 11th International Conference on Privacy Enhancing Technologies, pp.155-174, 2011.
DOI : 10.1007/978-3-642-22263-4_9

P. Maymounkov and D. Eres, Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, Revised Papers from the 1st International Workshop on Peer-to-Peer Systems, IPTPS '01, pp.53-65, 2002.
DOI : 10.1007/3-540-45748-8_5

R. John and . Douceur, The Sybil Attack, Revised Papers from the 1st International Workshop on Peer-to-Peer Systems, IPTPS '01, pp.251-260, 2002.

N. Hopper, E. Y. Vasserman, and E. Chan-tin, How much anonymity does network latency leak?, ACM Trans. Inf. Syst. Secur, vol.1313, issue.2, pp.1-1328, 2010.

K. Loesing, S. J. Murdoch, and R. Dingledine, A Case Study on Measuring Statistical Data in the Tor Anonymity Network, Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, pp.203-215, 2010.
DOI : 10.1007/978-3-642-14992-4_19

L. Zzz and . Schimmer, Peer proling and selection in the I2P anonymous network, Proceedings of PET-CON 2009, 2009.

T. Stack and E. , DDoS attack on Tor directory. bit.ly/1iWOrmC, 2013.

C. Egger, J. Schlumberger, C. Kruegel, and G. Vigna, Practical Attacks against the I2P Network, Proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses, 2013.
DOI : 10.1007/978-3-642-41284-4_22

D. Stutzbach and R. Rejaie, Understanding churn in peer-to-peer networks, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.189-202, 2006.
DOI : 10.1145/1177080.1177105

J. P. Timpanaro, I. Chrisment, and O. Festor, A Bird???s Eye View on the I2P Anonymous File-Sharing Environment, Proceedings of the 6th International Conference on Network and System Security, 2012.
DOI : 10.1007/978-3-642-34601-9_11

T. Cholez, I. Chrisment, O. Festor, and G. Doyen, Detection and mitigation of localized attacks in a widely deployed P2P network. Peer-to-Peer Networking and Applications, pp.155-174, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00786438

M. Steiner, T. En-najjary, and E. W. Biersack, Exploiting KAD, ACM SIGCOMM Computer Communication Review, vol.37, issue.5, 2007.
DOI : 10.1145/1290168.1290176

P. Wang, J. Tyra, E. Chan-tin, T. Malchow, D. Foo-kune et al., Attacking the Kad network, Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm '08, pp.1-23, 2008.
DOI : 10.1145/1460877.1460907

M. Steiner, W. Ernst, T. Biersack, and . Najjary, Actively monitoring peers in KAD, Proceedings of the 6th International Workshop on Peer-to-Peer Systems, 2007.

T. Cholez, I. Chrisment, and O. Festor, Evaluation of Sybil Attacks Protection Schemes in KAD, 3rd International Conference on Autonomous Infrastructure , Management and Security -AIMS 2009, pp.70-82, 2009.
DOI : 10.1145/1151659.1159945

URL : https://hal.archives-ouvertes.fr/inria-00405381

G. Urdaneta, G. Pierre, and M. Van-steen, A survey of DHT security techniques, ACM Computing Surveys, vol.43, issue.2, pp.1-8, 2011.
DOI : 10.1145/1883612.1883615

B. Neil-levine, C. Shields, and N. B. Margolin, A Survey of Solutions to the Sybil Attack, 2006.

R. Gatti, S. Lewis, A. Ozment, T. Rayna, and A. Serjantov, Sufficiently secure peer-to-peer networks, Workshop on the Economics of Information Security, 2004.

N. , B. Margolin, and B. N. Levine, Informant: detecting sybils using incentives, Proc. of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security, FC '07/USEC '07, pp.192-207, 2007.