T. Cholez, I. Chrisment, and O. Festor, Evaluation of Sybil Attacks Protection Schemes in KAD, AIMS 2009: 3rd International Conference on Autonomous Infrastructure, Management and Security, 2009.
DOI : 10.1145/1151659.1159945

URL : https://hal.archives-ouvertes.fr/inria-00405381

J. R. Douceur, The Sybil Attack, IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp.251-260, 2002.
DOI : 10.1007/3-540-45748-8_24

M. Latapy, O. Allali, and C. Magnien, Measurement of edonkey activity with distributed honeypots Sixth International Workshop on Hot Topics in Peer-to-Peer Systems, HOTP2P 2009, 2009.

H. Lee and T. Nam, P2P Honeypot to Prevent Illegal or Harmful Contents From Spreading in P2P network, The 9th International Conference on Advanced Communication Technology, pp.497-501, 2007.
DOI : 10.1109/ICACT.2007.358403

P. Maymounkov and D. Mazieres, Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp.53-65, 2002.
DOI : 10.1007/3-540-45748-8_5

M. Steiner, T. E. Najjary, and E. W. Biersack, A global view of kad, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, 2007.
DOI : 10.1145/1298306.1298323

M. Steiner, T. E. Najjary, and E. W. Biersack, Exploiting KAD, ACM SIGCOMM Computer Communication Review, vol.37, issue.5, p.5, 2007.
DOI : 10.1145/1290168.1290176

D. Stutzbach and R. Rejaie, Capturing accurate snapshots of the gnutella network, 8th IEEE Global Internet Symposium, 2005.

D. Stutzbach and R. Rejaie, Understanding churn in peer-to-peer networks, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.189-202, 2006.
DOI : 10.1145/1177080.1177105

P. Wang, J. Tyra, E. Chan-tin, T. Malchow, D. Foo-kune et al., Attacking the Kad network, Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm '08, 2008.
DOI : 10.1145/1460877.1460907