Y. Zhang, Z. Li, Z. Hu, H. Tu, and H. Lin, A P2P E-commerce Related Network Security Issue: P2P Worm, 2008 International Symposium on Electronic Commerce and Security, pp.114-117, 2008.
DOI : 10.1109/ISECS.2008.187

W. Yu, S. Chellappan, X. Wang, and D. Xuan, Peer-to-peer system-based active worm attacks: Modeling, analysis and defense, Computer Communications, vol.31, issue.17, pp.4005-4017, 2008.
DOI : 10.1016/j.comcom.2008.08.008

J. Winter, Routing of structured queries in large-scale distributed systems LSDS-IR '08: Proceeding of the 2008 ACM workshop on Large-Scale distributed systems for information retrieval, pp.11-18, 2008.

K. Needels and M. Kwon, Secure routing in peer-to-peer distributed hash tables, Proceedings of the 2009 ACM symposium on Applied Computing, SAC '09, 2009.
DOI : 10.1145/1529282.1529292

C. Lu, Z. Li, H. Lin, and Q. Huang, Fault-Tolerant Routing for P2P System with Structured Topology, 2008 International Conference on Computer Science and Software Engineering, pp.102-105, 2008.
DOI : 10.1109/CSSE.2008.1379

F. Atalla, D. Miranda, J. Almeida, M. A. Gon\c{c}alves, and V. Almeida, Analyzing the impact of churn and malicious behavior on the quality of peer-to-peer web search, Proceedings of the 2008 ACM symposium on Applied computing , SAC '08, pp.1137-1144, 2008.
DOI : 10.1145/1363686.1363950

O. D. Sahin, Supporting complex queries over structured p2p networks, 2005.

V. Vishnumurthy and P. Francis, A comparison of structured and unstructured P2P approaches to heterogeneous random peer selection, ATC'07: 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference, pp.1-14, 2007.

R. Tout, N. Lumineau, P. Ghodous, and M. Tanasoiu, Schedule-based P2P network organization, 2007 2nd International Conference on Digital Information Management, 2007.
DOI : 10.1109/ICDIM.2007.4444253

R. Tout, P. Ghodous, A. Ouksel, and M. Tanasoiu, Backup Scheduling in Clustered P2P Network, 16th ISPE International Conference on Concurrent Engineering (CE2009), 2009.
DOI : 10.1007/978-1-84800-972-1_17

O. Peres and T. Herault, Table de hachage distribuée autostabilisante, 9ème Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Ile d'Oléron, pp.63-66, 2007.

I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, Chord: A scalable peer-topeer lookup service for internet applications, SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pp.149-160, 2001.

A. I. Rowstron and P. Druschel, Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems, Middleware '01: Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, pp.329-350, 2001.
DOI : 10.1007/3-540-45518-3_18

K. D. John, OceanStore: An Architecture for Global-Scale Persistent Storage, Proceedings of the Ninth international Conference on Architectural Support For Programming Languages and Operating Systems, pp.190-201, 2000.

P. Drusche and A. Rowstron, PAST: A large-scale, persistent peer-to-peer storage utility, Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, pp.75-80, 2001.

C. Batten, K. Barr, A. Saraf, and S. Trepetin, pStore: A Secure Peer-to-Peer Backup System, 2001.

M. Landers, H. Zhang, and K. Tan, PeerStore: better performance by relaxing in peer-to-peer backup, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings., pp.72-79, 2004.
DOI : 10.1109/PTP.2004.1334933

L. P. Cox, O. P. Cox, C. D. Murray, and B. D. Noble, Pastiche: Making Backup Cheap and Easy, Proceedings of the 5th Symposium on Operating Systems Design and Implementation, 2002.

L. P. Noble, Samsara: Honor Among Thieves in Peer-to-Peer Storage, Proceedings of the 5th Symposium on Operating Systems Design and Implementation, pp.120-132, 2003.

P. K. Gummadi, S. Saroiu, and S. D. Gribble, A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems, ACM SIGCOMM Computer Communication Review, vol.32, issue.1, pp.82-82, 2002.
DOI : 10.1145/510726.510756

V. Gramoli, A. Kermarrec, A. Mostéfaoui, M. Raynal, and B. Sericola, Core Persistence in Peer-to-Peer Systems: Relating Size to Lifetime, Proceedings of the On The Move International Workshop on Reliability in Decentralized Distributed systems, pp.1470-1479, 2006.
DOI : 10.1007/11915072_52

URL : https://hal.archives-ouvertes.fr/inria-00201164

W. J. Bolosky, J. R. Douceur, D. Ely, and M. Theimer, Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs, ACM SIGMETRICS Performance Evaluation Review, vol.28, issue.1, pp.34-43, 2000.
DOI : 10.1145/345063.339345

H. Weatherspoon and J. Kubiatowicz, Erasure Coding Vs. Replication: A Quantitative Comparison, IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp.328-338, 2002.
DOI : 10.1007/3-540-45748-8_31

D. A. Patterson, G. Gibson, and R. H. Katz, A case for redundant arrays of inexpensive disks (RAID), SIGMOD '88: Proceedings of the 1988 ACM SIGMOD international conference on Management of data, pp.109-116, 1988.

H. F. Mattson and G. Solomon, A New Treatment of Bose-Chaudhuri Codes, Journal of the Society for Industrial and Applied Mathematics, vol.9, issue.4, pp.654-669, 1961.
DOI : 10.1137/0109055

M. Luby, The Use of Forward Error Correction (FEC) in Reliable Multicast, 2002.
DOI : 10.17487/rfc3453

M. Luby, M. Mitzenmacher, A. Shokrollahi, D. Spielman, and V. Stemann, Practical loss-resilient codes, Proceedings of the twenty-ninth annual ACM symposium on Theory of computing , STOC '97, 1997.
DOI : 10.1145/258533.258573

J. W. Byers, M. Luby, M. Mitzenmacher, and A. Rege, A digital fountain approach to reliable distribution of bulk data, ACM SIGCOMM Computer Communication Review, vol.28, issue.4, pp.56-67, 1998.
DOI : 10.1145/285243.285258

R. Bhagwan, K. Tati, Y. Cheng, S. Savage, and G. M. Voelker, Total recall: system support for automated availability management, Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation, pp.25-25, 2004.

R. Rodrigues and B. Liskov, High Availability in DHTs: Erasure Coding vs. Replication, Proceedings of IPTPS, 2005.
DOI : 10.1007/11558989_21

G. Chen, T. Qiu, and F. Wu, Insight into redundancy schemes in DHTs, The Journal of Supercomputing, vol.8, issue.1, pp.183-198, 2008.
DOI : 10.1007/s11227-007-0126-4

H. Li and G. Chen, Data Persistence in Structured P2P Networks with Redundancy Schemes, Sixth International Conference on Grid and Cooperative Computing (GCC 2007), pp.542-549, 2007.
DOI : 10.1109/GCC.2007.59

A. Rowstron and P. Druschel, Storage management and caching in PAST, a large -scale, persistent peer-to-peer storage utility, Proceedings of the eighteenth ACM symposium on Operating systems principles, pp.188-201, 2001.

N. Ghamri-doudane and . Agoulmine, Enhanced DHT-based P2P Architecture for Effective Resource Discovery and Management, Journal of Network and Systems Management, vol.7, issue.3, pp.335-354, 2007.
DOI : 10.1007/s10922-007-9067-8