T. Cholez, I. Chrisment, and O. Festor, Efficient DHT attack mitigation through peers' ID distribution, 2010 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW), 2010.
DOI : 10.1109/IPDPSW.2010.5470928

URL : https://hal.archives-ouvertes.fr/inria-00490509

T. Cholez, I. Chrisment, and O. Festor, Evaluation of Sybil Attacks Protection Schemes in KAD, AIMS, 2009.
DOI : 10.1145/1151659.1159945

URL : https://hal.archives-ouvertes.fr/inria-00405381

B. Cohen, Incentives build robustness in bittorrent, 2003.

A. Scott, D. S. Crosby, and . Wallach, An analysis of bittorrents two kademlia-based dht's, 2007.

. Ipoque, Internet study http://www.ipoque.com/resources/ internet-studies/internet-study, 2008.

O. Jetter, J. Dinger, and H. Hartenstein, Quantitative Analysis of the Sybil Attack and Effective Sybil Resistance in Peer-to-Peer Systems, 2010 IEEE International Conference on Communications, 2010.
DOI : 10.1109/ICC.2010.5501977

J. Kong, W. Cai, and L. Wang, The Evaluation of Index Poisoning in BitTorrent, 2010 Second International Conference on Communication Software and Networks
DOI : 10.1109/ICCSN.2010.39

J. Kong, W. Cai, L. Wang, and Q. Zhao, A study of pollution on bittorrent, ICCAE 2010, pp.26-28, 2010.

S. Le-blond, A. Legout, F. L. Fessant, W. Dabbous, and M. A. Kâafar, Spying the world from your laptop ? identifying and profiling content providers and big downloaders in bittorrent, p.930, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00470324

P. Maymounkov and D. Mazieres, Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, IPTPS, 2001.
DOI : 10.1007/3-540-45748-8_5

M. Piatek, T. Kohno, and A. Krishnamurthy, Challenges and directions for monitoring p2p file sharing networks-or: why my printer received a dmca takedown notice, 2008.

G. Siganos, J. M. Pujol, and P. Rodriguez, Monitoring the Bittorrent Monitors: A Bird???s Eye View, 2009.
DOI : 10.1007/11599593_1

M. Steiner, T. En-najjary, and E. W. Biersack, Exploiting KAD, ACM SIGCOMM Computer Communication Review, vol.37, issue.5, 2007.
DOI : 10.1145/1290168.1290176

G. Urdaneta, G. Pierre, and M. Van-steen, A survey of DHT security techniques, ACM Computing Surveys, vol.43, issue.2, 2009.
DOI : 10.1145/1883612.1883615

S. Wolchok and J. A. Halderman, Crawling bittorrent dhts for fun and profit, To appear in Proc. WOOT, 2010.