X. S. Cai and L. Devroye, The Analysis of Kademlia for Random IDs, Internet Mathematics, vol.11, issue.6, pp.572-587, 2015.
DOI : 10.1080/15427951.2015.1051674

I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong, Freenet: A distributed anonymous information storage and retrieval system. In: Designing privacy enhancing technologies, pp.46-66, 2001.

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The second-generation onion router, 2004.
DOI : 10.21236/ADA465464

N. Fedotova, S. Fanti, and L. Veltri, Kademlia for data storage and retrieval in enterprise networks, 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007), pp.382-386, 2007.
DOI : 10.1109/COLCOM.2007.4553860

H. Heck, O. Kieselmann, and A. Wacker, Evaluating connection resilience for selforganized cyber-physical systems, In: SASO' IEEE, vol.16, 2016.

H. Heck, O. Kieselmann, and A. Wacker, Evaluating Connection Resilience for the Overlay Network Kademlia, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp.2581-2584, 2017.
DOI : 10.1109/ICDCS.2017.101

A. S. Inc, Vuze wiki (2012), https, 2017.

W. Ji-yi, Z. Jian-lin, W. Tong, and S. Qian-li, Study on redundant strategies in peer to peer cloud storage systems, Applied mathematics & information sciences, vol.5, issue.2, pp.235-242, 2011.

A. Montresor and M. Jelasity, PeerSim: A scalable P2P simulator, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, pp.99-100, 2009.
DOI : 10.1109/P2P.2009.5284506

A. Montresor and M. Jelasity, Peersim: A peer-to-peer simulator, peersim.sourceforge.net, 2016.

G. S. Park and H. Song, A novel hybrid p2p and cloud storage system for retrievability and privacy enhancement. Peer-to-Peer Networking and Applications, pp.299-312, 2016.

J. Risson and T. Moors, Survey of research towards robust peer-to-peer networks: Search methods, Computer Networks, vol.50, issue.17, pp.3485-3521, 2006.
DOI : 10.1016/j.comnet.2006.02.001

S. Roos, G. T. Nguyen, and T. Strufe, Integrating churn into the formal analysis of routing algorithms, 2015 International Conference and Workshops on Networked Systems (NetSys), pp.1-5, 2015.
DOI : 10.1109/NetSys.2015.7089070

S. Roos, H. Salah, and T. Strufe, Determining the hop count in kademlia-type systems, 2015.

S. Roos, B. Schiller, S. Hacker, and T. Strufe, Measuring Freenet in the Wild: Censorship-Resilience under Observation, International Symposium on Privacy Enhancing Technologies Symposium, pp.263-282, 2014.
DOI : 10.1007/978-3-319-08506-7_14

G. Urdaneta, G. Pierre, and M. V. Steen, A survey of DHT security techniques, ACM Computing Surveys, vol.43, issue.2, p.8, 2011.
DOI : 10.1145/1883612.1883615