V. Aggarwal, A. Feldmann, and C. Scheideler, Can ISPs and P2P users cooperate for improved performance? CCR, pp.29-40, 2007.
DOI : 10.1145/1273445.1273449

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.133.3179

R. Bindal, P. Cao, W. Chan, J. Medved, G. Suwala et al., Improving Traffic Locality in BitTorrent via Biased Neighbor Selection, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06), 2006.
DOI : 10.1109/ICDCS.2006.48

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.330.4116

D. R. Choffnes and F. E. Bustamante, Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems, In SIGCOMM, 2008.

B. Cohen, Incentives Build Robustness in BitTorrent, 2003.

R. Cuevas, N. Laoutaris, X. Yang, G. Siganos, and P. Rodriguez, Deep Diving into BitTorrent Locality, CoNEXT, 2009.
DOI : 10.1145/1658997.1659002

URL : http://arxiv.org/abs/0907.3874

F. Dabek, R. Cox, F. Kaashoek, and R. Morris, Vivaldi: A Decentralized Network Coordinate System, SIGCOMM, 2004.

F. Dabek, B. Zhao, P. Druschel, and I. S. Towards, Towards a Common API for Structured Peer-to-Peer Overlays, Lecture Notes in Computer Science, vol.2735, pp.33-44, 2003.
DOI : 10.1007/978-3-540-45172-3_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.2361

J. R. Douceur, The Sybil Attack, IPTPS, 2002.
DOI : 10.1007/3-540-45748-8_24

H. Kang, E. Chan-tin, N. Hopper, and Y. Kim, Why Kad lookup fails, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, pp.121-130, 2009.
DOI : 10.1109/P2P.2009.5284547

J. Ledlie, P. Gardner, and M. Seltzer, Network coordinates in the wild, NSDI, 2007.

A. Legout, G. Urvoy-keller, and P. Michiardi, Rarest first and choke algorithms are enough, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, 2006.
DOI : 10.1145/1177080.1177106

URL : https://hal.archives-ouvertes.fr/inria-00091678

J. Li and K. Sollins, Exploiting autonomous system information in structured peer-to-peer networks, ICCCN, 2004.

P. Maymounkov and D. Mazieres, Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, IPTPS, 2002.
DOI : 10.1007/3-540-45748-8_5

A. Nakao, L. Peterson, and A. Bavier, A routing underlay for overlay networks, Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications , SIGCOMM '03, 2003.
DOI : 10.1145/863955.863958

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.156.9940

M. Steiner, E. W. Biersack, and T. En-najjary, Exploiting KAD, ACM SIGCOMM Computer Communication Review, vol.37, issue.5, 2007.
DOI : 10.1145/1290168.1290176

M. Steiner, E. W. Biersack, and T. En-najjary, Long Term Study of Peer Behavior in the <emphasis emphasistype="smcaps">kad</emphasis> DHT, IEEE/ACM Transactions on Networking, vol.17, issue.5, pp.1371-1384, 2009.
DOI : 10.1109/TNET.2008.2009053

H. Xie, Y. R. Yang, A. Krishnamurthy, Y. G. Liu, and A. Silberschatz, P4P: provider portal for applications, SIGCOMM, 2008.