R. Bakhshi and D. Gurov, Verification of Peer-to-peer Algorithms: A Case Study, Electronic Notes in Theoretical Computer Science, vol.181, pp.35-47, 2007.
DOI : 10.1016/j.entcs.2007.01.052

J. Borgström, U. Nestmann, L. Onana-alima, and D. Gurov, Verifying a Structured Peer-to-Peer Overlay Network: The Static Case, Global Computing, pp.250-265, 2004.
DOI : 10.1007/3-540-45518-3_18

M. Castro, M. Costa, and A. I. Rowstron, Performance and dependability of structured peer-to-peer overlays, International Conference on Dependable Systems and Networks, 2004, pp.9-18, 2004.
DOI : 10.1109/DSN.2004.1311872

K. Chaudhuri, D. Doligez, L. Lamport, and S. , Verifying Safety Properties with the TLA???+??? Proof System, Intl. Joint Conf. Automated Reasoning, pp.142-148, 2010.
DOI : 10.1007/978-3-642-14203-1_12

URL : https://hal.archives-ouvertes.fr/inria-00534821

A. Haeberlen, J. Hoye, A. Mislove, and P. Druschel, Consistent key mapping in structured overlays, 2005.

L. Lamport, Specifying Systems, The TLA+ Language and Tools for Hardware and Software Engineers, 2002.

T. Lu, S. Merz, and C. Weidenbach, Towards Verification of the Pastry Protocol Using TLA???+???, 2011.
DOI : 10.1007/3-540-48153-2_6

URL : https://hal.archives-ouvertes.fr/inria-00593523

A. Rowstron and P. Druschel, Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems, IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), pp.329-350, 2001.
DOI : 10.1007/3-540-45518-3_18

URL : http://admis.fudan.edu.cn/member/yztang/Papers/P2P/overlay/Pastry Scalable, decentralized object location and routing for large scale p2p systems.pdf

S. Velipasalar, C. H. Lin, J. Schlessman, and W. Wolf, Design and Verification of Communication Protocols for Peer-to-Peer Multimedia Systems, 2006 IEEE International Conference on Multimedia and Expo, pp.1421-1424, 2006.
DOI : 10.1109/ICME.2006.262806

Y. Yu, P. Manolios, and L. Lamport, Model Checking TLA+ Specifications, Correct Hardware Design and Verification Methods (CHARME'99), volume 1703 of Lecture Notes in Computer Science, pp.54-66, 1999.
DOI : 10.1007/3-540-48153-2_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=