M. Bertier, Y. Busnel, and A. M. Kermarrec, On Gossip and Populations, Proceedings of the 16th International Colloquium on Structural Information and Communication Complexity, 2009.
DOI : 10.1145/1275517.1275520

URL : https://hal.archives-ouvertes.fr/inria-00437857

D. R. Karger and M. Ruhl, Simple efficient load balancing algorithms for peer-to-peer systems, Proceedings of the sixteenth annual ACM symposium on Parallelism in algorithms and architectures , SPAA '04, 2004.
DOI : 10.1145/1007912.1007919

Q. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker, Search and Replication in Unstructured Peer-to-Peer Networks, Proceedings of the International Conference on Supercomputing (ICS), pp.84-95, 2002.

L. Massoulié, E. L. Merrer, A. M. Kermarrec, and A. Ganesh, Peer counting and sampling in overlay networks, Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing , PODC '06, pp.123-132, 2006.
DOI : 10.1145/1146381.1146402

Y. Busnel, R. Beraldi, and R. Baldoni, A Formal Characterization of Uniform Peer Sampling Based on View Shuffling, 2009 International Conference on Parallel and Distributed Computing, Applications and Technologies, pp.360-365, 2009.
DOI : 10.1109/PDCAT.2009.61

URL : https://hal.archives-ouvertes.fr/hal-00480992

M. Gurevich and I. Keidar, Correcness of Gossip-Based Membership under Message Loss, Proceedings of the 28th annual Symposium on Principles of distributed computing (PODC), 2009.

R. Bakhshi, D. Gavidia, W. Fokkink, and M. Van-steen, An analytical model of information dissemination for a gossip-based protocol, Computer Networks, vol.53, issue.13, pp.2288-2303, 2009.
DOI : 10.1016/j.comnet.2009.03.017

S. Voulgaris, D. Gavidia, and M. Van-steen, CYCLON: Inexpensive Membership Management for Unstructured P2P Overlays, Journal of Network and Systems Management, vol.21, issue.6, pp.197-217, 2005.
DOI : 10.1007/s10922-005-4441-x

D. Stutzbach, R. Rejaie, N. Duffield, S. Sen, and W. Willinger, On Unbiased Sampling for Unstructured Peer-to-Peer Networks, IEEE/ACM Transactions on Networking, vol.17, issue.2, pp.377-390, 2009.
DOI : 10.1109/TNET.2008.2001730

B. Bollobás, Random Graphs ? 2nd Edition, 2001.

M. Zhong, K. Shen, and J. Seiferas, Non-uniform random membership management in peer-to-peer networks, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., 2005.
DOI : 10.1109/INFCOM.2005.1498342

A. Awan, R. A. Ferreira, S. Jagannathan, and A. Grama, Distributed Uniform Sampling in Unstructured Peer-to-Peer Networks, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), 2006.
DOI : 10.1109/HICSS.2006.126

E. Sit and R. Morris, Security Considerations for Peer-to-Peer Distributed Hash Tables, Proceedings of the 1rst International Workshop on Peer-to-Peer Systems (IPTPS), pp.261-269, 2002.
DOI : 10.1007/3-540-45748-8_25

E. Bortnikov, M. Gurevich, I. Keidar, G. Kliot, and A. Shraer, Brahms, Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing, PODC '08, pp.2340-2359, 2008.
DOI : 10.1145/1400751.1400772

B. Awerbuch and C. Scheideler, Group Spreading: A Protocol for Provably Secure Distributed Name Service, Proceedings of the 31rst International Colloquium on Automata, Languages and Programming (ICALP), pp.183-195, 2004.
DOI : 10.1007/978-3-540-27836-8_18

G. P. Jesi, A. Montresor, and M. Van-steen, Secure peer sampling, Computer Networks, vol.54, issue.12, 2010.
DOI : 10.1016/j.comnet.2010.03.020

A. Singh, T. W. Ngan, P. Druschel, and D. S. Wallach, Eclipse Attacks on Overlay Networks: Threats and Defenses, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006.
DOI : 10.1109/INFOCOM.2006.231

D. Liu, P. Ning, and W. Du, Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks, Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS), 2005.

J. Douceur and J. S. Donath, The Sybil Attack, Proceedings of the 1rst International Workshop on Peer-to-Peer Systems (IPTPS), pp.251-260, 2002.
DOI : 10.1007/3-540-45748-8_24

B. Awerbuch and C. Scheideler, Towards a Scalable and Robust Overlay Network, Proceedings of the 6th International Workshop on Peer-to-Peer Systems (IPTPS), 2007.

E. Anceaume, F. V. Brasileiro, R. Ludinard, B. Sericola, and F. Tronel, Analytical Study of Adversarial Strategies in Cluster-based Overlays, 2009 International Conference on Parallel and Distributed Computing, Applications and Technologies, pp.293-298, 2009.
DOI : 10.1109/PDCAT.2009.62

URL : https://hal.archives-ouvertes.fr/hal-00408871

M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, Secure Routing for Structured Peer-to-peer Overlay Networks, Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI), ACM, pp.299-314, 2002.

K. Hildrum and J. Kubiatowicz, Asymptotically Efficient Approaches to Faulttolerance in Peer-to-Peer Networks, Proceedings of the International Symposium on Distributed Computing, pp.321-336, 2003.

A. Fiat, J. Saia, and M. Young, Making Chord Robust to Byzantine Attacks, Proceedings of the Annual European Symposium on Algorithms, pp.803-814, 2005.
DOI : 10.1007/11561071_71

E. Anceaume, F. Brasileiro, R. Ludinard, and A. Ravoaja, PeerCube: A Hypercube-Based P2P Overlay Robust against Collusion and Churn, 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, pp.15-24, 2008.
DOI : 10.1109/SASO.2008.44

T. Condie, V. Kacholia, S. Sank, J. M. Hellerstein, and P. Maniatis, Induced Churn as Shelter from Routing-Table Poisoning, Proceedings of the International Network and Distributed System Security Symposium (NDSS), 2006.

H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, SybilGuard: Defending against Sybil Attacks via Social Networks, Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), pp.267-278, 2006.

H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks, Proceedings of the IEEE Symposium on Security and Privacy (SP), pp.3-17, 2008.