H. Schulze and K. Mochalski, Ipoque. internet study, 2008.

M. A. Konrath, M. P. Barcellos, and R. B. Mansilha, Attacking a Swarm with a Band of Liars: evaluating the impact of attacks on BitTorrent, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), pp.37-44, 2007.
DOI : 10.1109/P2P.2007.14

P. Dhungel, D. Wu, and K. W. Ross, Measurement and mitigation of BitTorrent leecher attacks, Computer Communications, vol.32, issue.17, pp.1852-1861, 2009.
DOI : 10.1016/j.comcom.2009.07.006

Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana, MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming, 2010 Proceedings IEEE INFOCOM, pp.296-300, 2010.
DOI : 10.1109/INFCOM.2010.5462226

D. Levin, K. Lacurts, N. Spring, and B. Bhattacharjee, Bittorrent is an auction: analyzing and improving bittorrent's incentives, SIGCOMM '08, pp.243-254, 2008.
DOI : 10.1145/1402946.1402987

P. Dhungel, X. Hei, K. W. Ross, and N. Saxena, The pollution attack in P2P live video streaming, Proceedings of the 2007 workshop on Peer-to-peer streaming and IP-TV , P2P-TV '07, 2007.
DOI : 10.1145/1326320.1326324

K. Shin, D. S. Reeves, and I. Rhee, Treat-before-trick: Free-riding prevention for bittorrentlike peer-to-peer networks, IPDPS '09, pp.1-12, 2009.

J. R. Douceur, The Sybil Attack, IPTPS '01, pp.251-260, 2002.
DOI : 10.1007/3-540-45748-8_24

S. D. Kamvar, M. T. Schlosser, and H. Garcia-molina, The Eigentrust algorithm for reputation management in P2P networks, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.640-651, 2003.
DOI : 10.1145/775152.775242

B. Cohen, Incentives build robustness in bittorrent, P2PECON '03, 2003.

M. Piatek, T. Isdal, A. Krishnamurthy, and T. Anderson, One hop reputations for peer to peer file sharing workloads, NSDI'08, pp.1-14, 2008.

J. Newsome, E. Shi, D. X. Song, and A. Perrig, The sybil attack in sensor networks, Proceedings of the third international symposium on Information processing in sensor networks , IPSN'04, pp.259-268, 2004.
DOI : 10.1145/984622.984660

H. Rowaihy, W. Enck, P. Mcdaniel, and T. L. Porta, Limiting Sybil Attacks in Structured P2P Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp.2596-2600, 2007.
DOI : 10.1109/INFCOM.2007.328

H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, Sybilguard: defending against sybil attacks via social networks, SIGCOMM, pp.267-278, 2006.
DOI : 10.1109/tnet.2008.923723

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.3018

N. Tran, B. Min, J. Li, and L. Subramanian, Sybil-resilient online content voting, NSDI'09, pp.15-28, 2009.
DOI : 10.1109/infcom.2011.5935171

A. Cheng and E. Friedman, Sybilproof reputation mechanisms, Proceeding of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems , P2PECON '05
DOI : 10.1145/1080192.1080202

H. Yu, C. Shi, M. Kaminsky, P. B. Gibbons, and F. Xiao, DSybil: Optimal Sybil-Resistance for Recommendation Systems, 2009 30th IEEE Symposium on Security and Privacy, pp.283-298, 2009.
DOI : 10.1109/SP.2009.26

URL : http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.151.193&rep=rep1&type=pdf

Q. Lian, Y. Peng, M. Yang, Z. Zhang, Y. Dai et al., Robust incentives via multi-level Tit-for-Tat, Concurrency and Computation: Practice and Experience, vol.20, issue.2, pp.167-178, 2008.
DOI : 10.1002/cpe.1190

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.8693

J. Sun, A. Banerjee, and M. Faloutsos, Multiple Identities in BitTorrent Networks, NET- WORKING'07, pp.582-593, 2007.
DOI : 10.1109/GLOCOM.2004.1378239

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.79.9160

J. Liang, N. Naoumov, and K. W. Ross, Efficient Blacklisting and Pollution-Level Estimation in P2P File-Sharing Systems, AINTEC, pp.1-21, 2005.
DOI : 10.1007/11599593_1

URL : http://cis.poly.edu/~ross/papers/blacklist.pdf

F. Bonomi, M. Mitzenmacher, R. Panigrahy, S. Singh, and G. Varghese, An Improved Construction for Counting Bloom Filters, ESA'06, pp.684-695, 2006.
DOI : 10.1007/11841036_61

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.91.6328

A. Legout, G. Urvoy-keller, and P. Michiardi, Rarest first and choke algorithms are enough, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.203-216, 2006.
DOI : 10.1145/1177080.1177106

URL : https://hal.archives-ouvertes.fr/inria-00091678

A. Legout, N. Liogkas, E. Kohler, and L. Zhang, AdslAsymmetric digital subscriber line 27 Clustering and sharing incentives in bittorrent systems, SIGMETRICS '07, pp.301-312, 2007.
DOI : 10.1145/1269899.1254919

URL : http://arxiv.org/abs/cs/0611105