Ipoque. internet study, 2008. ,
Attacking a Swarm with a Band of Liars: evaluating the impact of attacks on BitTorrent, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), pp.37-44, 2007. ,
DOI : 10.1109/P2P.2007.14
Measurement and mitigation of BitTorrent leecher attacks, Computer Communications, vol.32, issue.17, pp.1852-1861, 2009. ,
DOI : 10.1016/j.comcom.2009.07.006
MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming, 2010 Proceedings IEEE INFOCOM, pp.296-300, 2010. ,
DOI : 10.1109/INFCOM.2010.5462226
Bittorrent is an auction: analyzing and improving bittorrent's incentives, SIGCOMM '08, pp.243-254, 2008. ,
DOI : 10.1145/1402946.1402987
The pollution attack in P2P live video streaming, Proceedings of the 2007 workshop on Peer-to-peer streaming and IP-TV , P2P-TV '07, 2007. ,
DOI : 10.1145/1326320.1326324
Treat-before-trick: Free-riding prevention for bittorrentlike peer-to-peer networks, IPDPS '09, pp.1-12, 2009. ,
The Sybil Attack, IPTPS '01, pp.251-260, 2002. ,
DOI : 10.1007/3-540-45748-8_24
The Eigentrust algorithm for reputation management in P2P networks, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.640-651, 2003. ,
DOI : 10.1145/775152.775242
Incentives build robustness in bittorrent, P2PECON '03, 2003. ,
One hop reputations for peer to peer file sharing workloads, NSDI'08, pp.1-14, 2008. ,
The sybil attack in sensor networks, Proceedings of the third international symposium on Information processing in sensor networks , IPSN'04, pp.259-268, 2004. ,
DOI : 10.1145/984622.984660
Limiting Sybil Attacks in Structured P2P Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp.2596-2600, 2007. ,
DOI : 10.1109/INFCOM.2007.328
Sybilguard: defending against sybil attacks via social networks, SIGCOMM, pp.267-278, 2006. ,
DOI : 10.1109/tnet.2008.923723
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.3018
Sybil-resilient online content voting, NSDI'09, pp.15-28, 2009. ,
DOI : 10.1109/infcom.2011.5935171
Sybilproof reputation mechanisms, Proceeding of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems , P2PECON '05 ,
DOI : 10.1145/1080192.1080202
DSybil: Optimal Sybil-Resistance for Recommendation Systems, 2009 30th IEEE Symposium on Security and Privacy, pp.283-298, 2009. ,
DOI : 10.1109/SP.2009.26
URL : http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.151.193&rep=rep1&type=pdf
Robust incentives via multi-level Tit-for-Tat, Concurrency and Computation: Practice and Experience, vol.20, issue.2, pp.167-178, 2008. ,
DOI : 10.1002/cpe.1190
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.8693
Multiple Identities in BitTorrent Networks, NET- WORKING'07, pp.582-593, 2007. ,
DOI : 10.1109/GLOCOM.2004.1378239
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.79.9160
Efficient Blacklisting and Pollution-Level Estimation in P2P File-Sharing Systems, AINTEC, pp.1-21, 2005. ,
DOI : 10.1007/11599593_1
URL : http://cis.poly.edu/~ross/papers/blacklist.pdf
An Improved Construction for Counting Bloom Filters, ESA'06, pp.684-695, 2006. ,
DOI : 10.1007/11841036_61
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.91.6328
Rarest first and choke algorithms are enough, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.203-216, 2006. ,
DOI : 10.1145/1177080.1177106
URL : https://hal.archives-ouvertes.fr/inria-00091678
AdslAsymmetric digital subscriber line 27 Clustering and sharing incentives in bittorrent systems, SIGMETRICS '07, pp.301-312, 2007. ,
DOI : 10.1145/1269899.1254919
URL : http://arxiv.org/abs/cs/0611105