M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, Secure routing for structured peer-to-peer overlay networks, Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI), 2002.
DOI : 10.1145/1060289.1060317

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.1870

A. Singh, T. Ngan, P. Drushel, and D. Wallach, Eclipse Attacks on Overlay Networks: Threats and Defenses, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006.
DOI : 10.1109/INFOCOM.2006.231

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.3679

M. Srivatsa and L. Liu, Vulnerabilities and security threats in structured peer-to-peer systems: A quantitiative analysis, Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC), 2004.

N. Naoumov and K. W. Ross, Exploiting P2P systems for DDoS attacks, Proceedings of the 1st international conference on Scalable information systems , InfoScale '06, 2006.
DOI : 10.1145/1146847.1146894

S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, A scalable content-addressable network, Proceedings of the ACM SIGCOMM, 2001.

I. Stoica, D. Liben-nowell, R. Morris, D. Karger, F. Dabek et al., Chord: A scalable peer-to-peer lookup service for internet applications, Proceedings of the ACM SIGCOMM, 2001.

P. Druschel and A. Rowstron, PAST: a large-scale, persistent peer-to-peer storage utility, Proceedings Eighth Workshop on Hot Topics in Operating Systems, 2001.
DOI : 10.1109/HOTOS.2001.990064

E. Sit and R. Morris, Security Considerations for Peer-to-Peer Distributed Hash Tables, Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS), 2002.
DOI : 10.1007/3-540-45748-8_25

A. Fiat, J. Saia, and M. Young, Making Chord Robust to Byzantine Attacks, Proceedings of the Annual European Symposium on Algorithms (AESA), 2005.
DOI : 10.1007/11561071_71

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.3617

E. Anceaume, F. Brasileiro, R. Ludinard, and A. Ravoaja, PeerCube: A Hypercube-Based P2P Overlay Robust against Collusion and Churn, 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008.
DOI : 10.1109/SASO.2008.44

K. Hildrum and J. Kubiatowicz, Asymptotically Efficient Approaches to Fault-Tolerance in Peer-to-Peer Networks, Proceedings of the International Symposium on Distributed Computing, 2003.
DOI : 10.1007/978-3-540-39989-6_23

B. Awerbuch and C. Scheideler, Towards scalable and robust overay networks, Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS), 2007.

E. Anceaume, R. Ludinard, B. Sericola, and F. Tronel, Performance analysis of large scale peer-to-peer overlays using markov chains, Proceedings of the 41st IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2011.
URL : https://hal.archives-ouvertes.fr/inria-00546039

B. Awerbuch and C. Scheideler, Group Spreading: A Protocol for Provably Secure Distributed Name Service, Proceedings of the 31rst International Colloquium on Automata, Languages and Programming (ICALP), 2004.
DOI : 10.1007/978-3-540-27836-8_18

P. B. Godfrey, S. Shenker, and I. Stoica, Minimizing churn in distributed systems, Proceedings of the ACM SIGCOMM, 2006.

J. Douceur, The Sybil Attack, Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS), 2002.
DOI : 10.1007/3-540-45748-8_24

L. Lamport, R. Shostak, and M. Pease, The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, 1982.
DOI : 10.1145/357172.357176

E. Anceaume, F. Castella, R. Ludinard, and B. Sericola, Markov Chains Competing for Transitions: Application to Large-Scale Distributed Systems, Methodology and Computing in Applied Probability, vol.15, issue.2, pp.10-1007, 2011.
DOI : 10.1007/s11009-011-9239-6

URL : https://hal.archives-ouvertes.fr/inria-00485667

M. Luby, LT codes, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings., 2002.
DOI : 10.1109/SFCS.2002.1181950

P. Maymounkov, Online codes, 2002.

A. Shokrollahi, Raptor codes, IEEE/ACM Transactions on Networking, pp.2551-2567, 2006.
DOI : 10.1109/tit.2006.874390