D. S. Wallach, A Survey of Peer-to-Peer Security Issues, International conference on software security: theories and systems (ISSS), volume 2609 of LNCS, pp.42-57, 2002.
DOI : 10.1007/3-540-36532-X_4

A. Leon, S. A. Pintsov, and . Vanstone, Postal revenue collection in the digital age, 4th International Conference on Financial Cryptography, pp.105-120, 2000.

R. L. Daniel, R. Brown, S. A. Gallant, and . Vanstone, Provably secure implicit certificate schemes, Proceedings of Financial Cryptography, pp.156-165, 2002.

R. Fantacci, L. Maccari, M. Rosi, L. Chisci, L. M. Aiello et al., Avoiding Eclipse Attacks on Kad/Kademlia: An Identity Based Approach, 2009 IEEE International Conference on Communications, pp.1-5, 2009.
DOI : 10.1109/ICC.2009.5198772

S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, A scalable content-addressable network, ACM Conference on Applications, Technologies, Architectures and Protocols for Computer Communication (SIG- COMM), pp.161-172, 2001.

I. Stoica, R. Morris, D. Karger, M. F. Kaaskoek, and H. Balakrishman, Chord: A scalable peer-to-peer lookup service for internet applications, ACM Conference on Applications, Technologies, Architectures and Protocols for Computer Communication (SIGCOMM), pp.149-160, 2001.

P. Maymounkov and D. Eres, Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, 1st International Workshop on Peer-to Peer Systems (IPTPS), pp.53-65, 2002.
DOI : 10.1007/3-540-45748-8_5

A. Rowstron and P. Druschel, Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems, IFIP/ACM International Conference on Distributed Systems Platforms, pp.329-350, 2001.
DOI : 10.1007/3-540-45518-3_18

URL : http://admis.fudan.edu.cn/member/yztang/Papers/P2P/overlay/Pastry Scalable, decentralized object location and routing for large scale p2p systems.pdf

R. John and . Douceur, The sybil attack, 1st International Workshop on Peer-to- Peer Systems (IPTPS), pp.251-260, 2002.

S. Marti and H. Garcia-molina, Taxonomy of trust: Categorizing P2P reputation systems, Computer Networks, vol.50, issue.4, pp.472-84, 2006.
DOI : 10.1016/j.comnet.2005.07.011

M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, Secure routing for structured peer-to-peer overlay networks, ACM SIGOPS Operating Systems Review, vol.36, issue.SI, pp.299-314, 2002.
DOI : 10.1145/844128.844156

M. Srivatsa and L. Liu, Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis, 20th Annual Computer Security Applications Conference, pp.252-261, 2004.
DOI : 10.1109/CSAC.2004.50

R. B. Kevin, S. Butler, P. Ryu, P. D. Traynor, and . Mcdaniel, Leveraging identity-based cryptography for node id assignment in structured p2p systems, IEEE Transactions on Parallel and Distributed Systems, vol.20, issue.12, pp.1803-1815, 2009.

I. Baumgart and S. Mies, S/Kademlia: A practicable approach towards secure key-based routing, 2007 International Conference on Parallel and Distributed Systems, pp.1-8, 2007.
DOI : 10.1109/ICPADS.2007.4447808

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.673.4615

M. Luca-maria-aiello, G. Milanesio, R. Ruffo, and . Schifanella, Tempering kademlia with a robust identity based system, 8th International Conference on Peer-to-Peer Computing (P2P), pp.30-39, 2008.

M. Luca-maria-aiello, G. Milanesio, R. Ruffo, and . Schifanella, An identity-based approach to secure p2p applications with likir. Peer-to-Peer Networking and Applications, pp.420-438, 2011.

H. Rowaihy, W. Enck, P. D. Mcdaniel, and T. F. Porta, Limiting Sybil Attacks in Structured P2P Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp.2596-2600, 2007.
DOI : 10.1109/INFCOM.2007.328

W. Luis-da-costa-cordeiro, F. R. Santos, G. H. Mauch, M. Pilla-barcelos, and L. P. Gaspary, Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks, Computer Networks, vol.56, issue.11, pp.2569-2589, 2012.
DOI : 10.1016/j.comnet.2012.03.026

C. Lu, Detection and Defense of Identity Attacks in P2P Network, 4th International Symposium on Advances in Computation and Intelligence (ISICA), pp.500-507, 2009.
DOI : 10.1137/S0097539701398521

H. Yu, M. Kaminsky, P. B. Gibbons, and A. D. Flaxman, SybilGuard: Defending Against Sybil Attacks via Social Networks, IEEE/ACM Transactions on Networking, vol.16, issue.3, pp.576-589, 2008.
DOI : 10.1109/TNET.2008.923723

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.3018

H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks, IEEE/ACM Transactions on Networking, vol.18, issue.3, pp.885-898, 2010.
DOI : 10.1109/TNET.2009.2034047

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.367.7541

N. Tran, J. Li, L. Subramanian, and S. S. Chow, Optimal Sybil-resilient node admission control, 2011 Proceedings IEEE INFOCOM, pp.3218-3226, 2011.
DOI : 10.1109/INFCOM.2011.5935171

F. Lesueur, L. Mé, and V. Tong, A sybilproof distributed identity management for P2P networks, 2008 IEEE Symposium on Computers and Communications, pp.246-253, 2008.
DOI : 10.1109/ISCC.2008.4625694

URL : https://hal.archives-ouvertes.fr/hal-00287706

A. J. Menezes, S. A. Vanstone, and P. C. Van-oorschot, Handbook of Applied Cryptography, 1996.
DOI : 10.1201/9781439821916