M. Luca-maria-aiello, G. Milanesio, R. Ruffo, and . Schifanella, Tempering Kademlia with a robust identity based system, P2P '08: Proceedings of the 2008 Eighth International Conference on Peer-to-Peer Computing, pp.30-39, 2008.

A. Stevens-le-blond, W. Legout, and . Dabbous, Pushing BitTorrent Locality To The Limit, Computer Networks, 2010.

D. Carra and E. W. Biersack, Building a Reliable P2P System Out of Unreliable P2PClients: The Case of KAD, CoNEXT, 2007.

T. Cholez, I. Chrisment, and O. Festor, Evaluation of Sybil Attacks Protection Schemes in KAD, AIMS 2009 Scalability of Networks and Services, 2009.
DOI : 10.1145/1151659.1159945

URL : https://hal.archives-ouvertes.fr/inria-00405381

T. Cholez, I. Chrisment, and O. Festor, Efficient DHT attack mitigation through peers' ID distribution, 2010 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW), 2010.
DOI : 10.1109/IPDPSW.2010.5470928

URL : https://hal.archives-ouvertes.fr/inria-00490509

T. Cholez, I. Chrisment, and O. Festor, Monitoring and Controlling Content Access in KAD, 2010 IEEE International Conference on Communications, 2010.
DOI : 10.1109/ICC.2010.5502179

URL : https://hal.archives-ouvertes.fr/inria-00490347

A. Scott, D. S. Crosby, and . Wallach, An Analysis Of BitTorrent's Two Kademlia-based DHTs, 2007.

J. Falkner, M. Piatek, J. P. John, A. Krishnamurthy, and T. Anderson, Profiling a million user dht, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, pp.129-134, 2007.
DOI : 10.1145/1298306.1298325

R. Fantacci, L. Maccari, L. Chisci, L. M. Aiello, and M. Milanesio, Avoiding Eclipse Attacks on Kad/Kademlia: An Identity Based Approach, 2009 IEEE International Conference on Communications, 2009.
DOI : 10.1109/ICC.2009.5198772

. Ipoque, Internet Study http://www.ipoque.com/resources/ internet-studies/internet-study, 2008.

O. Jetter, J. Dinger, and H. Hartenstein, Quantitative Analysis of The Sybil Attack And Effective Sybil Resistance In Peerto-Peer Systems, IEEE ICC, 2010.

E. Hun-jeong-kang, N. Chan-tin, Y. Hopper, and . Kim, Why Kad Lookup Fails, Peer-to-Peer Computing, pp.121-130, 2009.

M. Kohnen, M. Leske, and E. P. Rathgeb, Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network, NETWORKING '09, pp.104-116, 2009.
DOI : 10.1007/3-540-45748-8_24

P. Maymounkov and D. Eres, Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, IPTPS '01, pp.53-65, 2002.
DOI : 10.1007/3-540-45748-8_5

E. Sit and R. Morris, Security Considerations for Peer-to-Peer Distributed Hash Tables, Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01, pp.261-269, 2002.
DOI : 10.1007/3-540-45748-8_25

M. Steiner, D. Carra, and E. W. Biersack, Evaluating And Improving The Content Access In KAD Journal of Peer-to- Peer Networks and Applications, 2009.

D. Stutzbach and R. Rejaie, Improving Lookup Performance Over a Widely-Deployed DHT, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006.
DOI : 10.1109/INFOCOM.2006.329

J. P. Timpanaro, T. Cholez, I. Chrisment, and O. Festor, BitTorrent's Mainline DHT Security Assessment, 2011 4th IFIP International Conference on New Technologies, Mobility and Security, 2011.
DOI : 10.1109/NTMS.2011.5721044

URL : https://hal.inria.fr/inria-00577043/document

P. Wang, J. Tyra, E. Chan-tin, T. Malchow, D. Foo-kune et al., Attacking the Kad network, Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm '08, 2008.
DOI : 10.1145/1460877.1460907

S. Wolchok and J. A. Halderman, Crawling BitTorrent DHTs for Fun And Profit, Proc. 4th USENIX Workshop on Offensive Technologies, 2010.