The Analysis of Kademlia for Random IDs, Internet Mathematics, vol.11, issue.6, pp.572-587, 2015. ,
DOI : 10.1080/15427951.2015.1051674
Freenet: A distributed anonymous information storage and retrieval system. In: Designing privacy enhancing technologies, pp.46-66, 2001. ,
Tor: The second-generation onion router, 2004. ,
DOI : 10.21236/ADA465464
Kademlia for data storage and retrieval in enterprise networks, 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007), pp.382-386, 2007. ,
DOI : 10.1109/COLCOM.2007.4553860
Evaluating connection resilience for selforganized cyber-physical systems, In: SASO' IEEE, vol.16, 2016. ,
Evaluating Connection Resilience for the Overlay Network Kademlia, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp.2581-2584, 2017. ,
DOI : 10.1109/ICDCS.2017.101
Vuze wiki (2012), https, 2017. ,
Study on redundant strategies in peer to peer cloud storage systems, Applied mathematics & information sciences, vol.5, issue.2, pp.235-242, 2011. ,
PeerSim: A scalable P2P simulator, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, pp.99-100, 2009. ,
DOI : 10.1109/P2P.2009.5284506
Peersim: A peer-to-peer simulator, peersim.sourceforge.net, 2016. ,
A novel hybrid p2p and cloud storage system for retrievability and privacy enhancement. Peer-to-Peer Networking and Applications, pp.299-312, 2016. ,
Survey of research towards robust peer-to-peer networks: Search methods, Computer Networks, vol.50, issue.17, pp.3485-3521, 2006. ,
DOI : 10.1016/j.comnet.2006.02.001
Integrating churn into the formal analysis of routing algorithms, 2015 International Conference and Workshops on Networked Systems (NetSys), pp.1-5, 2015. ,
DOI : 10.1109/NetSys.2015.7089070
Determining the hop count in kademlia-type systems, 2015. ,
Measuring Freenet in the Wild: Censorship-Resilience under Observation, International Symposium on Privacy Enhancing Technologies Symposium, pp.263-282, 2014. ,
DOI : 10.1007/978-3-319-08506-7_14
A survey of DHT security techniques, ACM Computing Surveys, vol.43, issue.2, p.8, 2011. ,
DOI : 10.1145/1883612.1883615