Secure routing for structured peer-to-peer overlay networks, Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI), 2002. ,
DOI : 10.1145/1060289.1060317
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.1870
Eclipse Attacks on Overlay Networks: Threats and Defenses, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006. ,
DOI : 10.1109/INFOCOM.2006.231
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.3679
Vulnerabilities and security threats in structured peer-to-peer systems: A quantitiative analysis, Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC), 2004. ,
Exploiting P2P systems for DDoS attacks, Proceedings of the 1st international conference on Scalable information systems , InfoScale '06, 2006. ,
DOI : 10.1145/1146847.1146894
A scalable content-addressable network, Proceedings of the ACM SIGCOMM, 2001. ,
Chord: A scalable peer-to-peer lookup service for internet applications, Proceedings of the ACM SIGCOMM, 2001. ,
PAST: a large-scale, persistent peer-to-peer storage utility, Proceedings Eighth Workshop on Hot Topics in Operating Systems, 2001. ,
DOI : 10.1109/HOTOS.2001.990064
Security Considerations for Peer-to-Peer Distributed Hash Tables, Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS), 2002. ,
DOI : 10.1007/3-540-45748-8_25
Making Chord Robust to Byzantine Attacks, Proceedings of the Annual European Symposium on Algorithms (AESA), 2005. ,
DOI : 10.1007/11561071_71
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.3617
PeerCube: A Hypercube-Based P2P Overlay Robust against Collusion and Churn, 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008. ,
DOI : 10.1109/SASO.2008.44
Asymptotically Efficient Approaches to Fault-Tolerance in Peer-to-Peer Networks, Proceedings of the International Symposium on Distributed Computing, 2003. ,
DOI : 10.1007/978-3-540-39989-6_23
Towards scalable and robust overay networks, Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS), 2007. ,
Performance analysis of large scale peer-to-peer overlays using markov chains, Proceedings of the 41st IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2011. ,
URL : https://hal.archives-ouvertes.fr/inria-00546039
Group Spreading: A Protocol for Provably Secure Distributed Name Service, Proceedings of the 31rst International Colloquium on Automata, Languages and Programming (ICALP), 2004. ,
DOI : 10.1007/978-3-540-27836-8_18
Minimizing churn in distributed systems, Proceedings of the ACM SIGCOMM, 2006. ,
The Sybil Attack, Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS), 2002. ,
DOI : 10.1007/3-540-45748-8_24
The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, 1982. ,
DOI : 10.1145/357172.357176
Markov Chains Competing for Transitions: Application to Large-Scale Distributed Systems, Methodology and Computing in Applied Probability, vol.15, issue.2, pp.10-1007, 2011. ,
DOI : 10.1007/s11009-011-9239-6
URL : https://hal.archives-ouvertes.fr/inria-00485667
LT codes, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings., 2002. ,
DOI : 10.1109/SFCS.2002.1181950
Online codes, 2002. ,
Raptor codes, IEEE/ACM Transactions on Networking, pp.2551-2567, 2006. ,
DOI : 10.1109/tit.2006.874390