I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, Chord, ACM SIGCOMM Computer Communication Review, vol.31, issue.4, pp.149-160, 2001.
DOI : 10.1145/964723.383071

D. Liben-nowell, H. Balakrishnan, and D. Karger, Analysis of the evolution of peer-to-peer systems, Proceedings of the twenty-first annual symposium on Principles of distributed computing , PODC '02, pp.233-242, 2002.
DOI : 10.1145/571825.571863

I. Stoica, R. Morris, D. Liben-nowell, D. R. Karger, M. F. Kaashoek et al., Chord: a scalable peer-to-peer lookup protocol for internet applications, IEEE/ACM Transactions on Networking, vol.11, issue.1, pp.17-32, 2003.
DOI : 10.1109/TNET.2002.808407

P. Zave, Reasoning About Identifier Spaces: How to Make Chord Correct, IEEE Transactions on Software Engineering, vol.43, issue.12, pp.1144-1156, 2017.
DOI : 10.1109/TSE.2017.2655056

, A practical comparison of Alloy and SPIN, Formal Aspects of Computing, vol.27, issue.2, p.239, 2015.

, Using lightweight modeling to understand Chord, ACM SIG- COMM Computer Communication Review, vol.42, issue.2, pp.49-57, 2012.

, Why the Chord ring-maintenance protocol is not correct, AT&T Research Tech. Rep, Tech. Rep, 2011.

, Lightweight Modeling of Network Protocols in Alloy, 2009.

N. Macedo, J. Brunel, D. Chemouil, A. Cunha, and D. Kuperberg, Lightweight specification and analysis of dynamic systems with rich configurations, Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2016, 2016.
DOI : 10.1145/2185376.2185383

URL : https://hal.archives-ouvertes.fr/hal-01355062

D. Jackson, Software Abstractions: logic, language, and analysis, 2012.

M. Huth and M. Ryan, Logic in Computer Science: Modelling and reasoning about systems, 2004.
DOI : 10.1017/CBO9780511810275

A. Biere, A. Cimatti, E. Clarke, and Y. Zhu, Symbolic model checking without BDDs, " in Tools and Algorithms for the Construction and Analysis of Systems, pp.193-207, 1999.

A. Cunha, B. Tla, and Z. Vdm, Bounded Model Checking of Temporal Formulas with Alloy, International Conference on Abstract State Machines, Alloy, pp.303-308, 2014.
DOI : 10.1007/978-3-662-43652-3_29

]. A. Cimatti, E. M. Clarke, F. Giunchiglia, and M. Roveri, NuSMV: A New Symbolic Model Verifier, Computer Aided Verification, 11th International Conference, CAV '99, pp.495-499, 1999.
DOI : 10.1007/3-540-48683-6_44

R. Cavada, A. Cimatti, M. Dorigatti, A. Griggio, A. Mariotti et al., The nuXmv Symbolic Model Checker, Computer Aided Verification -26th International Conference , CAV 2014, Held as Part of the Vienna Summer of Logic, pp.334-342, 2014.
DOI : 10.1007/978-3-319-08867-9_22

J. Brunel, D. Chemouil, A. Cunha, T. Hujsa, N. Macedo et al., Proposition of an Action Layer for Electrum, Abstract State Machines, pp.397-402, 2018.
DOI : 10.1007/978-3-642-30885-7_11

URL : https://hal.archives-ouvertes.fr/hal-01774920

J. R. Wilcox, D. Woos, P. Panchekha, Z. Tatlock, X. Wang et al., Verdi: a framework for implementing and formally verifying distributed systems, Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp.357-368, 2015.
DOI : 10.1145/2737924.2737958

URL : http://dl.acm.org/ft_gateway.cfm?id=2737958&type=pdf

O. Padon, K. L. Mcmillan, A. Panda, M. Sagiv, and S. Shoham, Ivy: safety verification by interactive generalization, Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2016, pp.614-630, 2016.
DOI : 10.1145/2980983.2908118

O. Padon, J. Hoenicke, G. Losa, A. Podelski, M. Sagiv et al., Reducing liveness to safety in first-order logic, Proceedings of the ACM on Programming Languages, vol.2, issue.POPL, pp.1-2633, 2018.
DOI : 10.1145/2737924.2737958

URL : http://dl.acm.org/ft_gateway.cfm?id=3158114&type=pdf

R. Bakhshi and D. Gurov, Verification of Peer-to-peer Algorithms: A Case Study, Electronic Notes in Theoretical Computer Science, vol.181, pp.35-47, 2007.
DOI : 10.1016/j.entcs.2007.01.052

URL : https://doi.org/10.1016/j.entcs.2007.01.052

S. Merz, T. Lu, C. Weidenbach, and T. +. La, Towards Verification of the Pastry Protocol using, 31st IFIP International Conference on Formal Techniques for Networked and Distributed Systems, 2011.
URL : https://hal.archives-ouvertes.fr/inria-00593523

J. Risson, K. Robinson, and T. Moors, Fault Tolerant Active Rings for Structured Peer-to-Peer Overlays, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l, pp.18-25, 2005.
DOI : 10.1109/LCN.2005.69

URL : http://www.ee.unsw.edu.au/~timm/pubs/05lcn_p2p/final.pdf