1. Belen R (2009) Detecting Disguised Missing Data. Ph.D. Dissertation, Middle East Technical University
2. Chawathe Y, Ratnasamy S, Breslau L, Lanham N, Shenker S (2003) Making Gnutella-like P2P systems scalable. In: Proceedings of the ACM special interest group on data communication conference, Karlsruhe, pp 407–418
3. Chuang YT, Michel Lombera I, Moser LE, Melliar-Smith PM (2011) Trustworthy distributed search and retrieval over the Internet. In: Proceedings of the international conference on internet computing, Las Vegas, pp 169–175
4. Chuang YT, Melliar-Smith PM, Moser LE, Michel Lombera I (2012) Protecting the iTrust information retrieval network against malicious attacks. J Comput Sci Eng 6(3):179–192
5. Chuang YT, Melliar-Smith PM, Moser LE, Michel Lombera I Membership protocols for the iTrust community network, submitted