Efficient DHT attack mitigation through peers' ID distribution, 2010 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW), 2010. ,
DOI : 10.1109/IPDPSW.2010.5470928
URL : https://hal.archives-ouvertes.fr/inria-00490509
Evaluation of Sybil Attacks Protection Schemes in KAD, AIMS, 2009. ,
DOI : 10.1145/1151659.1159945
URL : https://hal.archives-ouvertes.fr/inria-00405381
Incentives build robustness in bittorrent, 2003. ,
An analysis of bittorrents two kademlia-based dht's, 2007. ,
Internet study http://www.ipoque.com/resources/ internet-studies/internet-study, 2008. ,
Quantitative Analysis of the Sybil Attack and Effective Sybil Resistance in Peer-to-Peer Systems, 2010 IEEE International Conference on Communications, 2010. ,
DOI : 10.1109/ICC.2010.5501977
The Evaluation of Index Poisoning in BitTorrent, 2010 Second International Conference on Communication Software and Networks ,
DOI : 10.1109/ICCSN.2010.39
A study of pollution on bittorrent, ICCAE 2010, pp.26-28, 2010. ,
Spying the world from your laptop ? identifying and profiling content providers and big downloaders in bittorrent, p.930, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00470324
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, IPTPS, 2001. ,
DOI : 10.1007/3-540-45748-8_5
Challenges and directions for monitoring p2p file sharing networks-or: why my printer received a dmca takedown notice, 2008. ,
Monitoring the Bittorrent Monitors: A Bird???s Eye View, 2009. ,
DOI : 10.1007/11599593_1
Exploiting KAD, ACM SIGCOMM Computer Communication Review, vol.37, issue.5, 2007. ,
DOI : 10.1145/1290168.1290176
A survey of DHT security techniques, ACM Computing Surveys, vol.43, issue.2, 2009. ,
DOI : 10.1145/1883612.1883615
Crawling bittorrent dhts for fun and profit, To appear in Proc. WOOT, 2010. ,