T. Locher, S. Schmid, and R. Wattenhofer, eQuus: A Provably Robust and Locality-Aware Peer-to-Peer System, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), 2006.
DOI : 10.1109/P2P.2006.17

E. Anceaume, F. Brasiliero, R. Ludinard, and A. Ravoaja, PeerCube: A Hypercube-Based P2P Overlay Robust against Collusion and Churn, 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008.
DOI : 10.1109/SASO.2008.44

A. Fiat, J. Saia, and M. Young, Making Chord Robust to Byzantine Attacks, Proceedings of ESA, 2005.
DOI : 10.1007/11561071_71

I. Stoica, D. Liben-nowell, R. Morris, D. Karger, F. Dabek et al., Chord: A scalable peer-to-peer lookup service for internet applications, Proceedings of ACM SIGCOMM, 2001.

S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, A scalable content-addressable network, Proceedings of ACM SIGCOMM, 2001.

R. Bhagwan, S. Savage, and G. Voelker, Understanding availability Lecture notes in computer science, pp.256-267, 2003.

E. Sit and R. Morris, Security Considerations for Peer-to-Peer Distributed Hash Tables, Proceedings of IPTPS, 2002.
DOI : 10.1007/3-540-45748-8_25

J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton et al., OceanStore: an architecture for global-scale persistent storage, ACM SIGARCH Computer Architecture, pp.190-201, 2000.

L. Lamport, R. Shostak, and M. Pease, The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, 1982.
DOI : 10.1145/357172.357176

B. Awerbuch and C. Scheideler, Towards a scalable and robust DHT, Proceedings of SPAA, 2006.

P. Druschel and A. Rowstron, PAST: a large-scale, persistent peer-to-peer storage utility, Proceedings Eighth Workshop on Hot Topics in Operating Systems, 2001.
DOI : 10.1109/HOTOS.2001.990064

V. Gopalakrishnan, B. Silaghi, B. Bhattacharjee, and P. Keleher, Adaptive replication in peer-to-peer systems, 24th International Conference on Distributed Computing Systems, 2004. Proceedings., 2004.
DOI : 10.1109/ICDCS.2004.1281601

P. Knezevic, A. Wombacher, and T. Risse, DHT-based Self-adapting Replication Protocol for Achieving High Data Availability, 2006.

X. Zhu, D. Zhang, W. Li, and K. Huang, A Prediction-Based Fair Replication Algorithm in Structured P2P Systems, Proceedings of ATC, 2007.
DOI : 10.1007/978-3-540-73547-2_51

M. Luby, LT codes, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings., 2002.
DOI : 10.1109/SFCS.2002.1181950

P. Maymounkov, Online codes, 2002.

A. Shokrollahi, Raptor codes, IEEE/ACM Transactions on Networking, pp.2551-2567, 2006.

R. Rodrigues and B. Liskov, High Availability in DHTs: Erasure Coding vs. Replication, Proceedings of IPTPS, 2005.
DOI : 10.1007/11558989_21

R. Bhagwan, K. Tati, Y. Cheng, S. Savage, and G. Voelker, Total Recall: System support for automated availability management, ACM/USENIX, pp.337-350, 2004.

Z. Zhang and Q. Lian, Reperasure: replication protocol using erasure-code in peer-to-peer storage network, 21st IEEE Symposium on Reliable Distributed Systems, 2002. Proceedings., pp.330-339, 2002.
DOI : 10.1109/RELDIS.2002.1180205

S. Rhea, P. Eaton, D. Geels, H. Weatherspoon, B. Zhao et al., Pond: The OceanStore prototype, Proceedings of USENIX FAST, 2003.

R. Merkle, A Certified Digital Signature, Proceedings of ICCAC, 1989.
DOI : 10.1007/0-387-34805-0_21

L. Lamport, Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, pp.770-772, 1981.
DOI : 10.1145/358790.358797