M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, Secure routing for structured peer-to-peer overlay networks, Proceedings of the 5th symposium on Operating systems design and implementation, OSDI '02, pp.299-314, 2002.
DOI : 10.1145/1060289.1060317

J. Dinger and H. Hartenstein, Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration, First International Conference on Availability, Reliability and Security (ARES'06), pp.756-763, 2006.
DOI : 10.1109/ARES.2006.45

R. John and . Douceur, The sybil attack, IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp.251-260, 2002.

F. Lesueur, L. Mé, and V. Tong, A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification, 2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2008.
DOI : 10.1109/WETICE.2008.7

URL : https://hal.archives-ouvertes.fr/hal-00287700

P. Maymounkov and D. Mazieres, Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp.53-65, 2002.
DOI : 10.1007/3-540-45748-8_5

H. Rowaihy, W. Enck, P. Mcdaniel, and T. L. Porta, Limiting Sybil Attacks in Structured P2P Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp.2596-2600, 2007.
DOI : 10.1109/INFCOM.2007.328

A. Singh, M. Castro, P. Druschel, and A. Rowstron, Defending against eclipse attacks on overlay networks, Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC , EW11, p.21, 2004.
DOI : 10.1145/1133572.1133613

M. Steiner, . Taoufik-en-najjary, W. Ernst, and . Biersack, Exploiting KAD, ACM SIGCOMM Computer Communication Review, vol.37, issue.5, p.5, 2007.
DOI : 10.1145/1290168.1290176

H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, SybilGuard, ACM SIGCOMM Computer Communication Review, vol.36, issue.4, pp.267-278, 2006.
DOI : 10.1145/1151659.1159945