PeerCube: A Hypercube-Based P2P Overlay Robust against Collusion and Churn, 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008. ,
DOI : 10.1109/SASO.2008.44
Group Spreading: A Protocol for Provably Secure Distributed Name Service, Procs of the Int'l Colloquium on Automata, Languages and Programming, 2004. ,
DOI : 10.1007/978-3-540-27836-8_18
Towards scalable and robust overay networks, Proceedings of the Int'l Workshop on Peer-to-Peer Systems, 2007. ,
S/Kademlia: A practicable approach towards secure key-based routing, 2007 International Conference on Parallel and Distributed Systems, 2007. ,
DOI : 10.1109/ICPADS.2007.4447808
Secure routing for structured peer-to-peer overlay networks, Proceedings of the 5th symposium on Operating systems design and implementation, OSDI '02, 2002. ,
DOI : 10.1145/1060289.1060317
Making Chord Robust to Byzantine Attacks, Proceedings of the Annual European Symposium on Algorithms, 2005. ,
DOI : 10.1007/11561071_71
Internet x.509 public key infrastructure certificate and crl profile, 1999. ,
DOI : 10.17487/rfc2459
The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, 1982. ,
DOI : 10.1145/357172.357176
eQuus: A Provably Robust and Locality-Aware Peer-to-Peer System, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), 2006. ,
DOI : 10.1109/P2P.2006.17
Rfc1321: The md5 message-digest algorithm, Internet Activities Board, 1992. ,
Closed form solution for the distribution of the total time spent in a subset of states of a Markov process during a finite observation period, Journal of Applied Probability, p.27, 1990. ,
URL : https://hal.archives-ouvertes.fr/inria-00075653
Eclipse Attacks on Overlay Networks: Threats and Defenses, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006. ,
DOI : 10.1109/INFOCOM.2006.231
Security Considerations for Peer-to-Peer Distributed Hash Tables, Proceedings of the Int'l Workshop on Peer-to-Peer Systems, 2002. ,
DOI : 10.1007/3-540-45748-8_25
Vulnerabilities and security threats in structured peer-to-peer systems: A quantitiative analysis, Procs of the 20th Annual Computer Security Applications Conference (ACSAC), 2004. ,