1. Artigas M, Lopez P, Ahullo J, Skarmeta A (2005) Cyclone: a novel design schema for hierarchical dhts. In: Fifth IEEE international conference on peer-to-peer computing, 2005, P2P 2005, pp 49–56
2. Banerjee S, Griffin T, Pias M (2004) The interdomain connectivity of Planetlab nodes. In: Passive and active network measurement, pp 73–82
3. Baset S, Schulzrinne H, Matuszewski M (2007) Peer-to-peer protocol (P2PP). Internet draft draft-baset-p2psip-p2pp-01.txt
4. Bauer K, Sherr M, McCoy D, Grunwald D (2011) Experimentor: a testbed for safe and realistic tor experimentation. In: Proceedings of the 4th conference on cyber security experimentation and test, CSET’11. USENIX Association, Berkeley, CA, USA, pp 7–7. http://dl.acm.org/citation.cfm?id=2027999.2028006
5. Bryan D, Matthews P, Shim E, Willis D, Dawkins S (2010) Concepts and terminology for peer to peer sip. Internet draft draft-ietf-p2psip-concepts-03.txt