E. Anceaume, F. Brasiliero, R. Ludinard, and A. Ravoaja, PeerCube: A Hypercube-Based P2P Overlay Robust against Collusion and Churn, 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008.
DOI : 10.1109/SASO.2008.44

G. Bracha, An asynchronous [(n - 1)/3]-resilient consensus protocol, Proceedings of the third annual ACM symposium on Principles of distributed computing , PODC '84, 1984.
DOI : 10.1145/800222.806743

M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, Secure routing for structured peer-to-peer overlay networks, Proceedings of the 5th symposium on Operating systems design and implementation, OSDI '02, 2002.
DOI : 10.1145/1060289.1060317

M. Correia, N. Ferreira-neves, and P. Verissimo, From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures, The Computer Journal, vol.49, issue.1, 2006.
DOI : 10.1093/comjnl/bxh145

D. Dolev, E. Hoch, and R. Van-renesse, Self-stabilizing and Byzantine-Tolerant Overlay Network, Proc. of the Int'l Conference On Principles Of Distributed Systems (OPODIS), 2007.
DOI : 10.1007/978-3-540-77096-1_25

J. Douceur, The Sybil Attack, Proc. of the Int'l Workshop on Peerto-Peer Systems (IPTPS), 2002.
DOI : 10.1007/3-540-45748-8_24

A. Fiat, J. Saia, and M. Young, Making Chord Robust to Byzantine Attacks, Proc. of the Annual European Symposium on Algorithms (ESA), 2005.
DOI : 10.1007/11561071_71

J. A. Garay and Y. Moses, Fully polynomial byzantine agreement for n > 3t processes in t + 1 rounds, SIAM Journal on Computing, vol.27, issue.1, 1998.

K. Hildrum, J. Kubiatowicz, S. Rao, and B. Zhao, Distributed data location in a dynamic network, Proc. for the ACM Symposium on Parallel Algorithms and Architectures (SPAA), 2002.

K. Hildrum and J. Kubiatowicz, Asymptotically Efficient Approaches to Fault-Tolerance in Peer-to-Peer Networks, Proc. of the Int'l Symposium on Distributed Computing, 2003.
DOI : 10.1007/978-3-540-39989-6_23

R. Kotla, L. Alvisi, M. Dahlin, A. Clement, and E. Wong, Zyzzyva: speculative byzantine fault tolerance, Symposium on Operating Systems Principles (SOSP), 2007.

J. Li, J. Stribling, T. Gil, R. Morris, and F. Kaashoek, Comparing the Performance of Distributed Hash Tables Under Churn, Proc. for the Int'l Workshop on Peer-to-Peer Systems (IPTPS), 2004.
DOI : 10.1007/978-3-540-30183-7_9

T. Locher, S. Schmid, and R. Wattenhofer, eQuus: A Provably Robust and Locality-Aware Peer-to-Peer System, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), 2006.
DOI : 10.1109/P2P.2006.17

P. Maymounkov and D. Mazieres, Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, Proc. for the Int'l Workshop on Peer-to-Peer Systems (IPTPS), 2002.
DOI : 10.1007/3-540-45748-8_5

H. Ramasamy and C. Cachin, Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast, Proc. of the Int'l Conference On Principles Of Distributed Systems (OPODIS), 2005.
DOI : 10.1007/3-540-45539-6_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.1511

S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, A scalable content-addressable network, Proc. of the ACM SIG- COMM, 2001.

A. Ravoaja and E. Anceaume, STORM: A Secure Overlay for P2P Reputation Management, First International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2007), 2007.
DOI : 10.1109/SASO.2007.57

URL : https://hal.archives-ouvertes.fr/hal-00916751

R. Rivest, The md5 message digest algorithm, 1992.
DOI : 10.17487/rfc1321

A. Rowstron and P. Druschel, Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems, Proc. of the Int'l Conference on Distributed Systems Platforms (Middleware), 2001.
DOI : 10.1007/3-540-45518-3_18

Y. Saad and M. Schultz, Topological properties of hypercubes, IEEE Transactions on Computers, vol.37, issue.7, 1988.
DOI : 10.1109/12.2234

C. Scheideler, Robust random number generation for peer-to-peer systems, Proc. of the Int'l Conference On Principles Of Distributed Systems (OPODIS). LNCS 4305, 2006.

E. Sit and R. Morris, Security Considerations for Peer-to-Peer Distributed Hash Tables, Proc. of the Int'l Workshop on Peer-to-Peer Systems (IPTPS), 2002.
DOI : 10.1007/3-540-45748-8_25

M. Srivatsa and L. Liu, Vulnerabilities and security threats in structured peer-to-peer systems: A quantitiative analysis, Proc. of the Annual Computer Security Applications Conference (ACSAC), 2004.

I. Stoica, D. Liben-nowell, R. Morris, D. Karger, F. Dabek et al., Chord: A scalable peer-to-peer lookup service for internet applications, Proc. of the ACM SIG- COMM, 2001.