A. Legout and ©. , ? Get an accurate picture of peers identified by (IP,port) for each torrent hosted by the tracker ? (IP,port) gives ? Geographical information ? AS information ? Follow up with time, 2006.

. Zhang, Most Popular Trackers Credit

A. Legout and ©. , of the trackers track more than 1000 peers ?28% tracks more than 100 torrents Credit, 2006.

A. Legout and ©. , I Know Where You are and What You are Sharing [54] Real Use-Case: What Can We Get? Name Gender Birthday Language City of residence Job Photos Friends Arnaud Legout © 2006-2012 Does Rejecting Calls From Strangers Protect Against Tracking? No Arnaud Legout, 2006.

W. Keith, D. Ross, S. Rubenstein, J. Sen, and . Wang, P2P Systems Analysing peer-to-peer traffic across large networks, Infocom 2004 tutorial ACM SIGCOMM'02

T. Karagiannis, A. Broido, M. Faloutsos, and K. Claffy, Transport layer identification of P2P traffic, Proceedings of the 4th ACM SIGCOMM conference on Internet measurement , IMC '04
DOI : 10.1145/1028788.1028804

X. Yang and G. De-veciana, Service Capacity of Peer to Peer Networks

D. Qiu and R. Srikant, Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks, ACM SIGCOMM'04

J. H. Saltzer, D. P. Reed, and D. D. Clark, End-to-end arguments in system design, ACM Transactions on Computer Systems, vol.2, issue.4, pp.277-288, 1984.
DOI : 10.1145/357401.357402

P. Rodriguez and E. W. Biersack, Dynamic parallel access to replicated content in the Internet, IEEE/ACM Transactions on Networking, vol.10, issue.4, 2000.
DOI : 10.1109/TNET.2002.801413

E. W. Biersack, P. Rodriguez, and P. Felber, Performance Analysis of Peer-to-Peer Networks for File Distribution, 2004.
DOI : 10.1007/978-3-540-30193-6_1

P. A. Felber and E. W. Biersack, Self-scaling Networks for Content Distributions, Self- Star Properties in Complex Information Systems, 2005.

E. K. Lua, A Survey and Comparison of Peer-to-Peer Overlay Network Schemes, IEEE Communications survey and tutorial, 2004.

?. Liang, R. Kumar, and K. Ross, The KaZaA Overlay: A Measurement Study, Computer Networks (Special Issue on Overlays)
DOI : 10.1016/j.comnet.2005.07.014

]. Y. Kulbak, D. Bickson, C. Gkantsidis, and P. Rodriguez, The eMule Protocol Specification Network Coding for Large Scale Content Distribution, 2005.

D. Kostic, A. Rodriguez, J. Albrecht, and A. Vahdat, Bullet: High Bandwidth Data Dissemination Using an Overlay Mesh, 2003.

]. T. Klingberg and R. Manfredi, Gnutella Protocol Development v0, Partial File Sharing Protocol, vol.617, 2002.

]. A. Legout, G. Urvoy-keller, and P. Michiardi, Understanding BitTorrent: An Experimental Perspective, 2005.
URL : https://hal.archives-ouvertes.fr/inria-00000156

J. A. Pouwelse, The Bittorrent P2P File-Sharing System: Measurements and Analysis, IPTPS, 2005.
DOI : 10.1007/11558989_19

D. L. Chaum, Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms, Communications of the ACM, 1981.
DOI : 10.1007/978-1-4615-0239-5_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

. Stoica, Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications

D. Rowstron, Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems " ? [27] Maymounkov and Mazières " Kademlia: A peer-to-peer Information System Based on the XOR Metric " ? [28] Ratnasamy et al. " A Scalable Content-Addressable Network, p.1

. Gummadi, The impact of DHT routing geometry on resilience and proximity, Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications , SIGCOMM '03
DOI : 10.1145/863955.863998

]. C. Fragouli, J. Boudec, and J. Widmer, Network coding, ACM SIGCOMM Computer Communication Review, vol.36, issue.1, pp.63-68, 2006.
DOI : 10.1145/1111322.1111337

]. C. Gkantsidis, J. Miller, and P. Rodriguez, Comprehensive view of a live network coding P2P system, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, 2006.
DOI : 10.1145/1177080.1177104

C. Gkantsidis and P. Rodriguez, Cooperative Security for Network Coding File Distribution, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006.
DOI : 10.1109/INFOCOM.2006.233

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. R. Bharambe, C. Herley, and V. N. Padmanabhan, Analyzing and Improving a BitTorrent Network's Performance Mechanisms, Proc. of Infocom'06, 2006.

]. A. Legout, G. Urvoy-keller, and P. Michiardi, Rarest first and choke algorithms are enough, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, 2006.
DOI : 10.1145/1177080.1177106

URL : https://hal.archives-ouvertes.fr/inria-00001111

]. A. Legout, N. Liogkas, E. Kohler, and L. Zhang, Clustering and Sharing Incentives in BitTorrent Systems, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00112066

S. Jun and M. Ahamad, Incentives in BitTorrent induce free riding, Proceeding of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems , P2PECON '05, 2005.
DOI : 10.1145/1080192.1080199

]. N. Liogkas, R. Nelson, E. Kohler, and L. Zhang, Exploiting Bittorrent For Fun (But Not Profit), Proc. of IPTPS'06, 2006.

]. T. Locher, P. Moor, S. Schmid, and R. Wattenhofer, Free Riding in BitTorrent is Cheap, Proc. of HotNets-V, 2006.

?. Shneidman, D. Parkes, and L. Massoulie, Faithfulness in internet algorithms, Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems , PINS '04, 2004.
DOI : 10.1145/1016527.1016537

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

?. Fan, J. Chiu, and . Lui, The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design, Proceedings of the 2006 IEEE International Conference on Network Protocols, 2006.
DOI : 10.1109/ICNP.2006.320217

K. Fukuda, H. Esaki, and A. Kato, Observing Slow Crustal Movement in Residential User Traffic, 2008.

]. C. Zhang, P. Dunghel, D. Wu, and K. W. Ross, Unraveling the BitTorrent Ecosystem, IEEE Transactions on Parallel and Distributed Systems, vol.22, issue.7
DOI : 10.1109/TPDS.2010.123

URL : http://cis.poly.edu/~ross/papers/PublicEcosystem.pdf

A. Stevens-le-blond, W. Legout, and . Dabbous, Pushing BitTorrent Locality to the Limit, Computer Networks, 2010.

A. Anwar, N. Hamra, A. Liogkas, C. Legout, and . Barakat, Swarming Overlay Construction Strategies, Proc. of ICCCN'2009, 2009.

]. T. Karagiannis, P. Rodriguez, and K. Papagiannaki, Should internet service providers fear peer-assisted content distribution?, Proceedings of the 5th ACM SIGCOMM conference on Internet measurement , IMC '05, 2005.
DOI : 10.1145/1330107.1330115

]. H. Xie, Y. R. Yang, A. Krishnamurthy, Y. Liu, and A. Silberschatz, P4p: Provider portal for applications, Proc. of ACM SIGCOMM, 2008.

D. R. Choffnes and F. E. Bustamante, Taming the torrent: A practical approach to reducing cross-isp traffic in p2p systems, Proc. of ACM SIGCOMM, 2008.

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The Second-Generation Onion Router, bittorrent.org/beps/bep_0003.html ? [49] Peer ID Conventions proc. of Usenix Security, 2004.

?. Ferguson, B. Schneier, and T. Kohno, Cryptography Engineering, 2010.
DOI : 10.1002/9781118722367

A. Stevens-le-blond, F. Legout, W. Lefessant, M. A. Dabbous, and . Kaafar, Spying the World from your Laptop -Identifying and Profiling Content Providers and Big Downloaders in BitTorrent, Proc. of LEET'10, 2010.

C. Stevens-le-blond, A. Zhang, K. Legout, W. Ross, and . Dabbous, I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy, Proc. of ACM SIGCOMM/USENIX IMC'11, 2011.

P. Stevens-le-blond, A. Manils, M. A. Chaabane, C. Kaafar, A. Castelluccia et al., One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users, Proc. of LEET'11, 2011.