Evaluation of Sybil Attacks Protection Schemes in KAD, AIMS 2009: 3rd International Conference on Autonomous Infrastructure, Management and Security, 2009. ,
DOI : 10.1145/1151659.1159945
URL : https://hal.archives-ouvertes.fr/inria-00405381
The Sybil Attack, IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp.251-260, 2002. ,
DOI : 10.1007/3-540-45748-8_24
Measurement of edonkey activity with distributed honeypots Sixth International Workshop on Hot Topics in Peer-to-Peer Systems, HOTP2P 2009, 2009. ,
P2P Honeypot to Prevent Illegal or Harmful Contents From Spreading in P2P network, The 9th International Conference on Advanced Communication Technology, pp.497-501, 2007. ,
DOI : 10.1109/ICACT.2007.358403
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp.53-65, 2002. ,
DOI : 10.1007/3-540-45748-8_5
A global view of kad, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, 2007. ,
DOI : 10.1145/1298306.1298323
Exploiting KAD, ACM SIGCOMM Computer Communication Review, vol.37, issue.5, p.5, 2007. ,
DOI : 10.1145/1290168.1290176
Capturing accurate snapshots of the gnutella network, 8th IEEE Global Internet Symposium, 2005. ,
Understanding churn in peer-to-peer networks, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.189-202, 2006. ,
DOI : 10.1145/1177080.1177105
Attacking the Kad network, Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm '08, 2008. ,
DOI : 10.1145/1460877.1460907