A P2P E-commerce Related Network Security Issue: P2P Worm, 2008 International Symposium on Electronic Commerce and Security, pp.114-117, 2008. ,
DOI : 10.1109/ISECS.2008.187
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense, Computer Communications, vol.31, issue.17, pp.4005-4017, 2008. ,
DOI : 10.1016/j.comcom.2008.08.008
Routing of structured queries in large-scale distributed systems LSDS-IR '08: Proceeding of the 2008 ACM workshop on Large-Scale distributed systems for information retrieval, pp.11-18, 2008. ,
Secure routing in peer-to-peer distributed hash tables, Proceedings of the 2009 ACM symposium on Applied Computing, SAC '09, 2009. ,
DOI : 10.1145/1529282.1529292
Fault-Tolerant Routing for P2P System with Structured Topology, 2008 International Conference on Computer Science and Software Engineering, pp.102-105, 2008. ,
DOI : 10.1109/CSSE.2008.1379
Analyzing the impact of churn and malicious behavior on the quality of peer-to-peer web search, Proceedings of the 2008 ACM symposium on Applied computing , SAC '08, pp.1137-1144, 2008. ,
DOI : 10.1145/1363686.1363950
Supporting complex queries over structured p2p networks, 2005. ,
A comparison of structured and unstructured P2P approaches to heterogeneous random peer selection, ATC'07: 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference, pp.1-14, 2007. ,
Schedule-based P2P network organization, 2007 2nd International Conference on Digital Information Management, 2007. ,
DOI : 10.1109/ICDIM.2007.4444253
Backup Scheduling in Clustered P2P Network, 16th ISPE International Conference on Concurrent Engineering (CE2009), 2009. ,
DOI : 10.1007/978-1-84800-972-1_17
Table de hachage distribuée autostabilisante, 9ème Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Ile d'Oléron, pp.63-66, 2007. ,
Chord: A scalable peer-topeer lookup service for internet applications, SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pp.149-160, 2001. ,
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems, Middleware '01: Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, pp.329-350, 2001. ,
DOI : 10.1007/3-540-45518-3_18
OceanStore: An Architecture for Global-Scale Persistent Storage, Proceedings of the Ninth international Conference on Architectural Support For Programming Languages and Operating Systems, pp.190-201, 2000. ,
PAST: A large-scale, persistent peer-to-peer storage utility, Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, pp.75-80, 2001. ,
pStore: A Secure Peer-to-Peer Backup System, 2001. ,
PeerStore: better performance by relaxing in peer-to-peer backup, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings., pp.72-79, 2004. ,
DOI : 10.1109/PTP.2004.1334933
Pastiche: Making Backup Cheap and Easy, Proceedings of the 5th Symposium on Operating Systems Design and Implementation, 2002. ,
Samsara: Honor Among Thieves in Peer-to-Peer Storage, Proceedings of the 5th Symposium on Operating Systems Design and Implementation, pp.120-132, 2003. ,
A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems, ACM SIGCOMM Computer Communication Review, vol.32, issue.1, pp.82-82, 2002. ,
DOI : 10.1145/510726.510756
Core Persistence in Peer-to-Peer Systems: Relating Size to Lifetime, Proceedings of the On The Move International Workshop on Reliability in Decentralized Distributed systems, pp.1470-1479, 2006. ,
DOI : 10.1007/11915072_52
URL : https://hal.archives-ouvertes.fr/inria-00201164
Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs, ACM SIGMETRICS Performance Evaluation Review, vol.28, issue.1, pp.34-43, 2000. ,
DOI : 10.1145/345063.339345
Erasure Coding Vs. Replication: A Quantitative Comparison, IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp.328-338, 2002. ,
DOI : 10.1007/3-540-45748-8_31
A case for redundant arrays of inexpensive disks (RAID), SIGMOD '88: Proceedings of the 1988 ACM SIGMOD international conference on Management of data, pp.109-116, 1988. ,
A New Treatment of Bose-Chaudhuri Codes, Journal of the Society for Industrial and Applied Mathematics, vol.9, issue.4, pp.654-669, 1961. ,
DOI : 10.1137/0109055
The Use of Forward Error Correction (FEC) in Reliable Multicast, 2002. ,
DOI : 10.17487/rfc3453
Practical loss-resilient codes, Proceedings of the twenty-ninth annual ACM symposium on Theory of computing , STOC '97, 1997. ,
DOI : 10.1145/258533.258573
A digital fountain approach to reliable distribution of bulk data, ACM SIGCOMM Computer Communication Review, vol.28, issue.4, pp.56-67, 1998. ,
DOI : 10.1145/285243.285258
Total recall: system support for automated availability management, Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation, pp.25-25, 2004. ,
High Availability in DHTs: Erasure Coding vs. Replication, Proceedings of IPTPS, 2005. ,
DOI : 10.1007/11558989_21
Insight into redundancy schemes in DHTs, The Journal of Supercomputing, vol.8, issue.1, pp.183-198, 2008. ,
DOI : 10.1007/s11227-007-0126-4
Data Persistence in Structured P2P Networks with Redundancy Schemes, Sixth International Conference on Grid and Cooperative Computing (GCC 2007), pp.542-549, 2007. ,
DOI : 10.1109/GCC.2007.59
Storage management and caching in PAST, a large -scale, persistent peer-to-peer storage utility, Proceedings of the eighteenth ACM symposium on Operating systems principles, pp.188-201, 2001. ,
Enhanced DHT-based P2P Architecture for Effective Resource Discovery and Management, Journal of Network and Systems Management, vol.7, issue.3, pp.335-354, 2007. ,
DOI : 10.1007/s10922-007-9067-8