E. Adar and B. A. Huberman, Free riding on Gnutella, First Monday, vol.5, issue.10, 2000.
DOI : 10.5210/fm.v5i10.792

R. Brunner, A performance evaluation of the Kad-protocol, 2006.

M. Castro, M. Costa, and A. Rowstron, Debunking some myths about structured and unstructured overlays, NSDI '05: Proceedings of the 2nd USENIX Symposium on Networked Systems Design and Implementation, 2005.

M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, Secure routing for structured peer-to-peer overlay networks, ACM SIGOPS Operating Systems Review, vol.36, issue.SI, pp.299-314, 2002.
DOI : 10.1145/844128.844156

J. Clulow and T. Moore, Suicide for the common good, ACM SIGOPS Operating Systems Review, vol.40, issue.3, pp.18-21, 2006.
DOI : 10.1145/1151374.1151381

E. Chang-farookh-khadeer, O. K. Hussain, and . Hussain, State of the art review of the existing bayesian-network based approaches to trust and reputation computation, ICIMP 2007: The Second International Conference on Internet Monitoring and Protection, 2007.

D. Hausheer and B. Stiller, PeerMint: Decentralized and Secure Accounting for Peer-to-Peer Applications, Lecture Notes in Computer Science, vol.3462, pp.40-52, 2005.
DOI : 10.1007/11422778_4

D. Hughes, G. Coulson, and J. Walkerdine, Free riding on gnutella revisited: The bell tolls? IEEE Distributed Systems Online, 2005.

M. Karakaya, I. Korpeoglu, and O. Ulusoy, A distributed and measurement-based framework against free riding in peer-to-peer networks, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings., pp.276-277, 2004.
DOI : 10.1109/PTP.2004.1334963

M. Khambatti, P. Dasgupta, and K. D. Ryu, A rolebased trust model for peer-to-peer communities and dynamic coalitions, IWIA '04: Proceedings of the Second IEEE International Information Assurance Workshop, p.141, 2004.

Y. Kim, D. Mazzocchi, and G. Tsudik, Admission control in peer groups, NCA '03: Proceedings of the Second IEEE International Symposium on Network Computing and Applications, p.131, 2003.

J. Liang, R. Kumar, Y. Xi, and K. Ross, Pollution in peer-to-peer file sharing systems, IEEE Infocom, pp.1174-1185, 2005.

P. Maymounkov and D. Mazieres, Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp.53-65, 2002.
DOI : 10.1007/3-540-45748-8_5

N. Saxena, G. Tsudik, and J. H. Yi, Admission control in Peer-to-Peer, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks , SASN '03, pp.104-113, 2003.
DOI : 10.1145/986858.986873

A. Singh, M. Castro, P. Druschel, and A. Rowstron, Defending against eclipse attacks on overlay networks, Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC , EW11, p.21, 2004.
DOI : 10.1145/1133572.1133613

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.5727

A. Singh, P. Tsuen-wan-ngan, D. S. Druschel, and . Wallach, Eclipse Attacks on Overlay Networks: Threats and Defenses, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006.
DOI : 10.1109/INFOCOM.2006.231

M. Steiner, . Taoufik-en-najjary, W. Ernst, and . Biersack, Exploiting KAD, ACM SIGCOMM Computer Communication Review, vol.37, issue.5, p.5, 2007.
DOI : 10.1145/1290168.1290176

R. H. Wouhaybi and A. T. Campbell, Keypeer: A scalable, resilient distributed public-key using chord. columbia university, 2005.