On Gossip and Populations, Proceedings of the 16th International Colloquium on Structural Information and Communication Complexity, 2009. ,
DOI : 10.1145/1275517.1275520
URL : https://hal.archives-ouvertes.fr/inria-00437857
Simple efficient load balancing algorithms for peer-to-peer systems, Proceedings of the sixteenth annual ACM symposium on Parallelism in algorithms and architectures , SPAA '04, 2004. ,
DOI : 10.1145/1007912.1007919
Search and Replication in Unstructured Peer-to-Peer Networks, Proceedings of the International Conference on Supercomputing (ICS), pp.84-95, 2002. ,
Peer counting and sampling in overlay networks, Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing , PODC '06, pp.123-132, 2006. ,
DOI : 10.1145/1146381.1146402
A Formal Characterization of Uniform Peer Sampling Based on View Shuffling, 2009 International Conference on Parallel and Distributed Computing, Applications and Technologies, pp.360-365, 2009. ,
DOI : 10.1109/PDCAT.2009.61
URL : https://hal.archives-ouvertes.fr/hal-00480992
Correcness of Gossip-Based Membership under Message Loss, Proceedings of the 28th annual Symposium on Principles of distributed computing (PODC), 2009. ,
An analytical model of information dissemination for a gossip-based protocol, Computer Networks, vol.53, issue.13, pp.2288-2303, 2009. ,
DOI : 10.1016/j.comnet.2009.03.017
CYCLON: Inexpensive Membership Management for Unstructured P2P Overlays, Journal of Network and Systems Management, vol.21, issue.6, pp.197-217, 2005. ,
DOI : 10.1007/s10922-005-4441-x
On Unbiased Sampling for Unstructured Peer-to-Peer Networks, IEEE/ACM Transactions on Networking, vol.17, issue.2, pp.377-390, 2009. ,
DOI : 10.1109/TNET.2008.2001730
Random Graphs ? 2nd Edition, 2001. ,
Non-uniform random membership management in peer-to-peer networks, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., 2005. ,
DOI : 10.1109/INFCOM.2005.1498342
Distributed Uniform Sampling in Unstructured Peer-to-Peer Networks, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), 2006. ,
DOI : 10.1109/HICSS.2006.126
Security Considerations for Peer-to-Peer Distributed Hash Tables, Proceedings of the 1rst International Workshop on Peer-to-Peer Systems (IPTPS), pp.261-269, 2002. ,
DOI : 10.1007/3-540-45748-8_25
Brahms, Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing, PODC '08, pp.2340-2359, 2008. ,
DOI : 10.1145/1400751.1400772
Group Spreading: A Protocol for Provably Secure Distributed Name Service, Proceedings of the 31rst International Colloquium on Automata, Languages and Programming (ICALP), pp.183-195, 2004. ,
DOI : 10.1007/978-3-540-27836-8_18
Secure peer sampling, Computer Networks, vol.54, issue.12, 2010. ,
DOI : 10.1016/j.comnet.2010.03.020
Eclipse Attacks on Overlay Networks: Threats and Defenses, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006. ,
DOI : 10.1109/INFOCOM.2006.231
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks, Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS), 2005. ,
The Sybil Attack, Proceedings of the 1rst International Workshop on Peer-to-Peer Systems (IPTPS), pp.251-260, 2002. ,
DOI : 10.1007/3-540-45748-8_24
Towards a Scalable and Robust Overlay Network, Proceedings of the 6th International Workshop on Peer-to-Peer Systems (IPTPS), 2007. ,
Analytical Study of Adversarial Strategies in Cluster-based Overlays, 2009 International Conference on Parallel and Distributed Computing, Applications and Technologies, pp.293-298, 2009. ,
DOI : 10.1109/PDCAT.2009.62
URL : https://hal.archives-ouvertes.fr/hal-00408871
Secure Routing for Structured Peer-to-peer Overlay Networks, Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI), ACM, pp.299-314, 2002. ,
Asymptotically Efficient Approaches to Faulttolerance in Peer-to-Peer Networks, Proceedings of the International Symposium on Distributed Computing, pp.321-336, 2003. ,
Making Chord Robust to Byzantine Attacks, Proceedings of the Annual European Symposium on Algorithms, pp.803-814, 2005. ,
DOI : 10.1007/11561071_71
PeerCube: A Hypercube-Based P2P Overlay Robust against Collusion and Churn, 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, pp.15-24, 2008. ,
DOI : 10.1109/SASO.2008.44
Induced Churn as Shelter from Routing-Table Poisoning, Proceedings of the International Network and Distributed System Security Symposium (NDSS), 2006. ,
SybilGuard: Defending against Sybil Attacks via Social Networks, Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), pp.267-278, 2006. ,
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks, Proceedings of the IEEE Symposium on Security and Privacy (SP), pp.3-17, 2008. ,