Secure routing for structured peer-to-peer overlay networks, Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI), 2002. ,
Eclipse Attacks on Overlay Networks: Threats and Defenses, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006. ,
DOI : 10.1109/INFOCOM.2006.231
Security Considerations for Peer-to-Peer Distributed Hash Tables, Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS), 2002. ,
DOI : 10.1007/3-540-45748-8_25
Making Chord Robust to Byzantine Attacks, Proceedings of the Annual European Symposium on Algorithms (AESA), 2005. ,
DOI : 10.1007/11561071_71
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.3617
S/kademlia: A practicable approach towards secure keybased routing, Proceedings of the International Conference on Parallel and Distributed Systems (ICPADS), p.41, 2007. ,
PeerCube: A Hypercube-Based P2P Overlay Robust against Collusion and Churn, 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008. ,
DOI : 10.1109/SASO.2008.44
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.395.6020
Vulnerabilities and security threats in structured peer-topeer systems: A quantitiative analysis, Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC), 2004. ,
Towards scalable and robust overay networks, Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS), 2007. ,
Minimizing churn in distributed systems, Proceedings of the ACM SIGCOMM, 2006. ,
eQuus: A Provably Robust and Locality-Aware Peer-to-Peer System, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), 2006. ,
DOI : 10.1109/P2P.2006.17
Brahms, Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing, PODC '08, pp.2340-2359, 2009. ,
DOI : 10.1145/1400751.1400772
Accessing nearby copies of replicated objects in a distributed environment, Proceedings of the 9th Annual ACM Symposium on Parallel Algorithms and Architectures (SPAA), 1997. ,
A scalable contentaddressable network, Proceedings of the ACM SIGCOMM, 2001. ,
Chord: A scalable peer-to-peer lookup service for internet applications, Proceedings of the ACM SIGCOMM, 2001. ,
PAST: a large-scale, persistent peer-to-peer storage utility, Proceedings Eighth Workshop on Hot Topics in Operating Systems, 2001. ,
DOI : 10.1109/HOTOS.2001.990064
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, Proceedings for the International Workshop on Peerto-Peer Systems (IPTPS), 2002. ,
DOI : 10.1007/3-540-45748-8_5
The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, 1982. ,
DOI : 10.1145/357172.357176
The Sybil Attack, Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS), 2002. ,
DOI : 10.1007/3-540-45748-8_24
Closed-form solution for the distribution of the total time spent in a subset of states of a homogeneous Markov process during a finite observation period, Journal of Applied Probability, vol.35, issue.03, pp.713-719, 1990. ,
DOI : 10.1017/S0021900200039255
URL : https://hal.archives-ouvertes.fr/inria-00075653
Sojourn times in Markov processes, Journal of Applied Probability, vol.26, issue.4, pp.744-756, 1989. ,
URL : https://hal.archives-ouvertes.fr/inria-00075739
DEPENDABILITY EVALUATION OF CLUSTER-BASED DISTRIBUTED SYSTEMS, International Journal of Foundations of Computer Science, vol.22, issue.05, 1947. ,
DOI : 10.1142/S0129054111008593
URL : https://hal.archives-ouvertes.fr/hal-00650086
Understanding Availability, Proceedings of the International Workshop in Peer-to-Peer Systems (IPTPS), 2003. ,
DOI : 10.1007/978-3-540-45172-3_24
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.1523