E. Anceaume, F. Brasileiro, R. Ludinard, and A. Ravoaja, PeerCube: A Hypercube-Based P2P Overlay Robust against Collusion and Churn, 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008.
DOI : 10.1109/SASO.2008.44

B. Awerbuch and C. Scheideler, Group Spreading: A Protocol for Provably Secure Distributed Name Service, Procs of the Int'l Colloquium on Automata, Languages and Programming, 2004.
DOI : 10.1007/978-3-540-27836-8_18

B. Awerbuch and C. Scheideler, Towards scalable and robust overay networks, Proceedings of the Int'l Workshop on Peer-to-Peer Systems, 2007.

I. Baumgart and S. Mies, S/Kademlia: A practicable approach towards secure key-based routing, 2007 International Conference on Parallel and Distributed Systems, 2007.
DOI : 10.1109/ICPADS.2007.4447808

M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, Secure routing for structured peer-to-peer overlay networks, Proceedings of the 5th symposium on Operating systems design and implementation, OSDI '02, 2002.
DOI : 10.1145/1060289.1060317

A. Fiat, J. Saia, and M. Young, Making Chord Robust to Byzantine Attacks, Proceedings of the Annual European Symposium on Algorithms, 2005.
DOI : 10.1007/11561071_71

R. Housley, W. Ford, W. Polk, and D. Solo, Internet x.509 public key infrastructure certificate and crl profile, 1999.
DOI : 10.17487/rfc2459

L. Lamport, R. Shostak, and M. Pease, The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, 1982.
DOI : 10.1145/357172.357176

T. Locher, S. Schmid, and R. Wattenhofer, eQuus: A Provably Robust and Locality-Aware Peer-to-Peer System, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), 2006.
DOI : 10.1109/P2P.2006.17

R. Rivest, Rfc1321: The md5 message-digest algorithm, Internet Activities Board, 1992.

B. Sericola, Closed form solution for the distribution of the total time spent in a subset of states of a Markov process during a finite observation period, Journal of Applied Probability, p.27, 1990.
URL : https://hal.archives-ouvertes.fr/inria-00075653

A. Singh, T. Ngan, P. Drushel, and D. Wallach, Eclipse Attacks on Overlay Networks: Threats and Defenses, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006.
DOI : 10.1109/INFOCOM.2006.231

E. Sit and R. Morris, Security Considerations for Peer-to-Peer Distributed Hash Tables, Proceedings of the Int'l Workshop on Peer-to-Peer Systems, 2002.
DOI : 10.1007/3-540-45748-8_25

M. Srivatsa and L. Liu, Vulnerabilities and security threats in structured peer-to-peer systems: A quantitiative analysis, Procs of the 20th Annual Computer Security Applications Conference (ACSAC), 2004.