A Survey of Peer-to-Peer Security Issues, International conference on software security: theories and systems (ISSS), volume 2609 of LNCS, pp.42-57, 2002. ,
DOI : 10.1007/3-540-36532-X_4
Postal revenue collection in the digital age, 4th International Conference on Financial Cryptography, pp.105-120, 2000. ,
Provably secure implicit certificate schemes, Proceedings of Financial Cryptography, pp.156-165, 2002. ,
Avoiding Eclipse Attacks on Kad/Kademlia: An Identity Based Approach, 2009 IEEE International Conference on Communications, pp.1-5, 2009. ,
DOI : 10.1109/ICC.2009.5198772
A scalable content-addressable network, ACM Conference on Applications, Technologies, Architectures and Protocols for Computer Communication (SIG- COMM), pp.161-172, 2001. ,
Chord: A scalable peer-to-peer lookup service for internet applications, ACM Conference on Applications, Technologies, Architectures and Protocols for Computer Communication (SIGCOMM), pp.149-160, 2001. ,
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, 1st International Workshop on Peer-to Peer Systems (IPTPS), pp.53-65, 2002. ,
DOI : 10.1007/3-540-45748-8_5
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems, IFIP/ACM International Conference on Distributed Systems Platforms, pp.329-350, 2001. ,
DOI : 10.1007/3-540-45518-3_18
URL : http://admis.fudan.edu.cn/member/yztang/Papers/P2P/overlay/Pastry Scalable, decentralized object location and routing for large scale p2p systems.pdf
The sybil attack, 1st International Workshop on Peer-to- Peer Systems (IPTPS), pp.251-260, 2002. ,
Taxonomy of trust: Categorizing P2P reputation systems, Computer Networks, vol.50, issue.4, pp.472-84, 2006. ,
DOI : 10.1016/j.comnet.2005.07.011
Secure routing for structured peer-to-peer overlay networks, ACM SIGOPS Operating Systems Review, vol.36, issue.SI, pp.299-314, 2002. ,
DOI : 10.1145/844128.844156
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis, 20th Annual Computer Security Applications Conference, pp.252-261, 2004. ,
DOI : 10.1109/CSAC.2004.50
Leveraging identity-based cryptography for node id assignment in structured p2p systems, IEEE Transactions on Parallel and Distributed Systems, vol.20, issue.12, pp.1803-1815, 2009. ,
S/Kademlia: A practicable approach towards secure key-based routing, 2007 International Conference on Parallel and Distributed Systems, pp.1-8, 2007. ,
DOI : 10.1109/ICPADS.2007.4447808
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.673.4615
Tempering kademlia with a robust identity based system, 8th International Conference on Peer-to-Peer Computing (P2P), pp.30-39, 2008. ,
An identity-based approach to secure p2p applications with likir. Peer-to-Peer Networking and Applications, pp.420-438, 2011. ,
Limiting Sybil Attacks in Structured P2P Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp.2596-2600, 2007. ,
DOI : 10.1109/INFCOM.2007.328
Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks, Computer Networks, vol.56, issue.11, pp.2569-2589, 2012. ,
DOI : 10.1016/j.comnet.2012.03.026
Detection and Defense of Identity Attacks in P2P Network, 4th International Symposium on Advances in Computation and Intelligence (ISICA), pp.500-507, 2009. ,
DOI : 10.1137/S0097539701398521
SybilGuard: Defending Against Sybil Attacks via Social Networks, IEEE/ACM Transactions on Networking, vol.16, issue.3, pp.576-589, 2008. ,
DOI : 10.1109/TNET.2008.923723
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.3018
SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks, IEEE/ACM Transactions on Networking, vol.18, issue.3, pp.885-898, 2010. ,
DOI : 10.1109/TNET.2009.2034047
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.367.7541
Optimal Sybil-resilient node admission control, 2011 Proceedings IEEE INFOCOM, pp.3218-3226, 2011. ,
DOI : 10.1109/INFCOM.2011.5935171
A sybilproof distributed identity management for P2P networks, 2008 IEEE Symposium on Computers and Communications, pp.246-253, 2008. ,
DOI : 10.1109/ISCC.2008.4625694
URL : https://hal.archives-ouvertes.fr/hal-00287706
Handbook of Applied Cryptography, 1996. ,
DOI : 10.1201/9781439821916