Tempering Kademlia with a robust identity based system, P2P '08: Proceedings of the 2008 Eighth International Conference on Peer-to-Peer Computing, pp.30-39, 2008. ,
Pushing BitTorrent Locality To The Limit, Computer Networks, 2010. ,
Building a Reliable P2P System Out of Unreliable P2PClients: The Case of KAD, CoNEXT, 2007. ,
Evaluation of Sybil Attacks Protection Schemes in KAD, AIMS 2009 Scalability of Networks and Services, 2009. ,
DOI : 10.1145/1151659.1159945
URL : https://hal.archives-ouvertes.fr/inria-00405381
Efficient DHT attack mitigation through peers' ID distribution, 2010 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW), 2010. ,
DOI : 10.1109/IPDPSW.2010.5470928
URL : https://hal.archives-ouvertes.fr/inria-00490509
Monitoring and Controlling Content Access in KAD, 2010 IEEE International Conference on Communications, 2010. ,
DOI : 10.1109/ICC.2010.5502179
URL : https://hal.archives-ouvertes.fr/inria-00490347
An Analysis Of BitTorrent's Two Kademlia-based DHTs, 2007. ,
Profiling a million user dht, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, pp.129-134, 2007. ,
DOI : 10.1145/1298306.1298325
Avoiding Eclipse Attacks on Kad/Kademlia: An Identity Based Approach, 2009 IEEE International Conference on Communications, 2009. ,
DOI : 10.1109/ICC.2009.5198772
Internet Study http://www.ipoque.com/resources/ internet-studies/internet-study, 2008. ,
Quantitative Analysis of The Sybil Attack And Effective Sybil Resistance In Peerto-Peer Systems, IEEE ICC, 2010. ,
Why Kad Lookup Fails, Peer-to-Peer Computing, pp.121-130, 2009. ,
Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network, NETWORKING '09, pp.104-116, 2009. ,
DOI : 10.1007/3-540-45748-8_24
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, IPTPS '01, pp.53-65, 2002. ,
DOI : 10.1007/3-540-45748-8_5
Security Considerations for Peer-to-Peer Distributed Hash Tables, Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01, pp.261-269, 2002. ,
DOI : 10.1007/3-540-45748-8_25
Evaluating And Improving The Content Access In KAD Journal of Peer-to- Peer Networks and Applications, 2009. ,
Improving Lookup Performance Over a Widely-Deployed DHT, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006. ,
DOI : 10.1109/INFOCOM.2006.329
BitTorrent's Mainline DHT Security Assessment, 2011 4th IFIP International Conference on New Technologies, Mobility and Security, 2011. ,
DOI : 10.1109/NTMS.2011.5721044
URL : https://hal.inria.fr/inria-00577043/document
Attacking the Kad network, Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm '08, 2008. ,
DOI : 10.1145/1460877.1460907
Crawling BitTorrent DHTs for Fun And Profit, Proc. 4th USENIX Workshop on Offensive Technologies, 2010. ,