• Zhu H, Cheung Y and Xie L. Stability and Efficiency of Personalised Cultural Markets. Proceedings of the ACM Web Conference 2023. (3447-3455).

    https://doi.org/10.1145/3543507.3583315

  • He S, Lu Y, Tang Q, Wang G and Wu C. Blockchain-Based P2P Content Delivery With Monetary Incentivization and Fairness Guarantee. IEEE Transactions on Parallel and Distributed Systems. 10.1109/TPDS.2022.3217036. 34:2. (746-765).

    https://ieeexplore.ieee.org/document/9929262/

  • Leonardos S, Sridhar S, Cheung Y and Piliouras G. (2023). Griefing Factors and Evolutionary In-Stabilities in Blockchain Mining Games. Mathematical Research for Blockchain Economy. 10.1007/978-3-031-18679-0_5. (75-94).

    https://link.springer.com/10.1007/978-3-031-18679-0_5

  • Kroer C and Stier-Moses N. (2022). Market Equilibrium Models in Large-Scale Internet Markets. Innovative Technology at the Interface of Finance and Operations. 10.1007/978-3-030-81945-3_7. (147-189).

    https://link.springer.com/10.1007/978-3-030-81945-3_7

  • FUJITA S. (2021). Semi-Structured BitTorrent Protocol with Application to Efficient P2P Video Streaming. IEICE Transactions on Information and Systems. 10.1587/transinf.2021EDP7011. E104.D:10. (1624-1631). Online publication date: 1-Oct-2021.

    https://www.jstage.jst.go.jp/article/transinf/E104.D/10/E104.D_2021EDP7011/_article

  • He S, Lu Y, Tang Q, Wang G and Wu C. (2021). Fair Peer-to-Peer Content Delivery via Blockchain. Computer Security – ESORICS 2021. 10.1007/978-3-030-88418-5_17. (348-369).

    https://link.springer.com/10.1007/978-3-030-88418-5_17

  • Nikolaidis S and Refanidis I. (2020). Privacy preserving distributed training of neural networks. Neural Computing and Applications. 10.1007/s00521-020-04880-0.

    http://link.springer.com/10.1007/s00521-020-04880-0

  • Gao G and Li R. (2019). Collaborative Caching in P2P Streaming Networks. Journal of Network and Systems Management. 27:3. (815-836). Online publication date: 1-Jul-2019.

    https://doi.org/10.1007/s10922-018-09485-6

  • Nikolaidis S and Refanidis I. (2019). Learnae: Distributed and Resilient Deep Neural Network Training for Heterogeneous Peer to Peer Topologies. Pädiatrie. 10.1007/978-3-030-20257-6_24. (286-298).

    http://link.springer.com/10.1007/978-3-030-20257-6_24

  • Kamara S and Küpçü A. DogFish: Decentralized Optimistic Game-theoretic FIle SHaring. Applied Cryptography and Network Security. (696-714).

    https://doi.org/10.1007/978-3-319-93387-0_36

  • Cheung Y, Cole R and Tao Y. Dynamics of Distributed Updating in Fisher Markets. Proceedings of the 2018 ACM Conference on Economics and Computation. (351-368).

    https://doi.org/10.1145/3219166.3219189

  • Gurtov A, Koskela J and Korzun D. (2017). Cyclic ranking in single-resource peer-to-peer exchange. Peer-to-Peer Networking and Applications. 10.1007/s12083-017-0578-0. 11:3. (632-643). Online publication date: 1-May-2018.

    http://link.springer.com/10.1007/s12083-017-0578-0

  • Shin K, Joe-Wong C, Ha S, Yi Y, Rhee I and Reeves D. (2017). T-Chain. IEEE/ACM Transactions on Networking. 25:4. (2122-2137). Online publication date: 1-Aug-2017.

    https://doi.org/10.1109/TNET.2017.2685560

  • Paganini F, Zubeldia M and Ferragut A. Reciprocity and Efficiency in Peer Exchange of Wireless Nodes Through Convex Optimization. IEEE Transactions on Network Science and Engineering. 10.1109/TNSE.2016.2600036. 3:4. (257-270).

    http://ieeexplore.ieee.org/document/7542597/

  • Joe-Wong C, Im Y, Shin K and Ha S. (2016). A Performance Analysis of Incentive Mechanisms for Cooperative Computing 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS). 10.1109/ICDCS.2016.103. 978-1-5090-1483-5. (108-117).

    http://ieeexplore.ieee.org/document/7536510/

  • Ferragut A and Paganini F. Fluid Models of Population and Download Progress in P2P Networks. IEEE Transactions on Control of Network Systems. 10.1109/TCNS.2015.2434092. 3:1. (34-45).

    http://ieeexplore.ieee.org/document/7109155/

  • Yuan Yao , Yong Tian , Weidong Liu and Jiaxing Song . A Mixture Distribution Based System in BitTorrent-Like P2P Networks. Proceedings of the 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS). (216-223).

    https://doi.org/10.1109/ICPADS.2015.35

  • Ferragut A and Paganini F. (2015). Queueing analysis of peer-to-peer swarms. Performance Evaluation. 93:C. (47-62). Online publication date: 1-Nov-2015.

    https://doi.org/10.1016/j.peva.2015.08.003

  • Paganini F, Zubeldia M and Ferragut A. (2015). Trading off efficiency and reciprocity in wireless peer-to-peer file sharing 2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt). 10.1109/WIOPT.2015.7151096. 978-3-9018-8274-6. (379-386).

    http://ieeexplore.ieee.org/document/7151096/

  • Wang J, Hu X, Xu X and Yang Y. (2013). A verifiable hierarchical circular shift cipher scheme for P2P chunk exchanges. Peer-to-Peer Networking and Applications. 10.1007/s12083-013-0225-3. 8:1. (103-110). Online publication date: 1-Jan-2015.

    http://link.springer.com/10.1007/s12083-013-0225-3

  • Cheng Y, Deng X, Pi Y and Yan X. (2015). Can Bandwidth Sharing Be Truthful?. Algorithmic Game Theory. 10.1007/978-3-662-48433-3_15. (190-202).

    http://link.springer.com/10.1007/978-3-662-48433-3_15

  • Paganini F and Ferragut A. (2014). Monotonicity and global stability in download dynamics of content-sharing networks 2014 IEEE 53rd Annual Conference on Decision and Control (CDC). 10.1109/CDC.2014.7040220. 978-1-4673-6090-6. (5314-5319).

    http://ieeexplore.ieee.org/document/7040220/

  • Lai P, Chow K, Hui L and Yiu S. (2011). Modeling the initial stage of a file sharing process on a BitTorrent network. Peer-to-Peer Networking and Applications. 10.1007/s12083-011-0118-2. 7:4. (311-319). Online publication date: 1-Dec-2014.

    http://link.springer.com/10.1007/s12083-011-0118-2

  • Chao X. An Approach to Web-Based Course of English Language Teaching Based on P2P Technology. Proceedings of the 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation. (82-86).

    https://doi.org/10.1109/ICMTMA.2014.25

  • Paganini F, Ferragut A and Zubeldia M. (2013). Dynamics of heterogeneous peer-to-peer networks 2013 IEEE 52nd Annual Conference on Decision and Control (CDC). 10.1109/CDC.2013.6760386. 978-1-4673-5717-3. (3293-3298).

    http://ieeexplore.ieee.org/document/6760386/

  • Qing-Hua Y. An Approach to Web-Based Course of English Language Teaching Based on P2P Technology. Proceedings of the 2013 Fourth International Conference on Intelligent Systems Design and Engineering Applications. (89-94).

    https://doi.org/10.1109/ISDEA.2013.426

  • Vega D, Meseguer R, Freitag F and Ochoa S. (2013). Effort-based incentives for resource sharing in collaborative volunteer applications 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD). 10.1109/CSCWD.2013.6580936. 978-1-4673-6085-2. (37-42).

    http://ieeexplore.ieee.org/document/6580936/

  • Korzun D and Gurtov A. (2013). Terminology, Problems, and Design Issues. Structured Peer-to-Peer Systems. 10.1007/978-1-4614-5483-0_1. (5-23).

    http://link.springer.com/10.1007/978-1-4614-5483-0_1

  • Sherman A, Nieh J and Stein C. (2012). FairTorrent. IEEE/ACM Transactions on Networking. 20:5. (1361-1374). Online publication date: 1-Oct-2012.

    https://doi.org/10.1109/TNET.2012.2185058

  • Lehmann M, Santos F, Gaspary L and Barcellos M. (2012). Denial-of-service attacks and countermeasures on BitTorrent. Computer Networks: The International Journal of Computer and Telecommunications Networking. 56:15. (3479-3498). Online publication date: 1-Oct-2012.

    https://doi.org/10.1016/j.comnet.2012.07.005

  • So J and Reeves D. (2012). AntiLiar: Defending against cheating attacks in mesh based streaming 2012 IEEE Twelfth International Conference on Peer-to-Peer Computing (P2P). 10.1109/P2P.2012.6335791. 978-1-4673-2862-3. (115-125).

    http://ieeexplore.ieee.org/document/6335791/

  • Wang J, Xu X, Wu X and Yang Y. Enabling Re-encryption of Hierarchical Verifiable Permutation Scheme for Bittorrent Chunk Exchanges. Proceedings of the 2012 International Conference on Computer Science and Service System. (926-929).

    https://doi.org/10.1109/CSSS.2012.235

  • Landa R, Mykoniati E, Clegg R, Griffin D and Rio M. Modelling the tradeoffs in Overlay-ISP cooperation. Proceedings of the 11th international IFIP TC 6 conference on Networking - Volume Part II. (223-237).

    https://doi.org/10.1007/978-3-642-30054-7_18

  • Rezvani M and Analoui M. (2012). An Economic Auction Mechanism for Multirate Single-Service Overlay Networks Using Optimum Hops. 2011 International Conference in Electrics, Communication and Automatic Control Proceedings. 10.1007/978-1-4419-8849-2_14. (101-108).

    https://link.springer.com/10.1007/978-1-4419-8849-2_14

  • Wong E, Levy I, Alvisi L, Clement A and Dahlin M. Regret freedom isn't free. Proceedings of the 15th international conference on Principles of Distributed Systems. (80-95).

    https://doi.org/10.1007/978-3-642-25873-2_7

  • Jian Wang , Xiaoming Hu , Yinchun Yang and Xiaolin Xu . (2011). Verifiable re-encryption Scheme in BitTorrent-like cipherblock exchange protocols 2011 International Conference on Computer Science and Network Technology (ICCSNT). 10.1109/ICCSNT.2011.6182125. 978-1-4577-1587-7. (979-982).

    http://ieeexplore.ieee.org/document/6182125/

  • Wang J, Xiaoming Hu , Yinchun Yang and Xiumei Wu . (2011). A misbehavior resilient cipherblock trading protocol in BitTorrent-like networks 2011 International Conference on Computer Science and Network Technology (ICCSNT). 10.1109/ICCSNT.2011.6182103. 978-1-4577-1587-7. (885-888).

    http://ieeexplore.ieee.org/document/6182103/

  • Wang J, Xiaoming Hu , Xiaolin Xu and Yinchun Yang . (2011). Permutation cipher scheme for verifiable P2P chunk exchange 2011 International Conference on Computer Science and Network Technology (ICCSNT). 10.1109/ICCSNT.2011.6182076. 978-1-4577-1587-7. (762-765).

    http://ieeexplore.ieee.org/document/6182076/

  • Yusuo Hu , Yeqi Lu , Minyi Guo and Feng Wu . (2011). Proportional Response Based Bandwidth Allocation for Layered P2P Live Streaming 2011 IEEE Global Communications Conference (GLOBECOM 2011). 10.1109/GLOCOM.2011.6134520. 978-1-4244-9268-8. (1-6).

    http://ieeexplore.ieee.org/document/6134520/

  • So J and Reeves D. Adaptive neighbor management for cooperative P2P video-on-demand streaming. Proceedings of the 30th IEEE International Performance Computing and Communications Conference. (1-10).

    https://doi.org/10.1109/PCCC.2011.6108084

  • Ciccarelli G and Lo Cigno R. (2011). Collusion in peer-to-peer systems. Computer Networks: The International Journal of Computer and Telecommunications Networking. 55:15. (3517-3532). Online publication date: 1-Oct-2011.

    https://doi.org/10.1016/j.comnet.2011.06.028

  • Esposito F, Matta I, Bera D and Michiardi P. (2011). On the impact of seed scheduling in peer-to-peer networks. Computer Networks: The International Journal of Computer and Telecommunications Networking. 55:15. (3303-3317). Online publication date: 1-Oct-2011.

    https://doi.org/10.1016/j.comnet.2011.06.020

  • Analoui M and Rezvani M. (2011). Microeconomics-based resource allocation in overlay networks by using non-strategic behavior modeling. Communications in Nonlinear Science and Numerical Simulation. 10.1016/j.cnsns.2010.04.005. 16:1. (493-508). Online publication date: 1-Jan-2011.

    http://linkinghub.elsevier.com/retrieve/pii/S1007570410001930

  • Rezvani M and Analoui M. (2011). An Economic Auction-Based Mechanism for Multi-service Overlay Multicast Networks. Information Technology and Mobile Communication. 10.1007/978-3-642-20573-6_83. (461-467).

    http://link.springer.com/10.1007/978-3-642-20573-6_83

  • Analoui M and Rezvani M. A Non-strategic Microeconomic Model for Single-Service Multi-rate Application Layer Multicast. Proceedings of the First International Conference on Information Computing and Applications - Volume 6377. (1-8).

    https://doi.org/10.1007/978-3-642-16167-4_1

  • Probst M, Park J, Abraham R and Kasera S. SocialSwarm. Proceedings of the The 18th IEEE International Conference on Network Protocols. (263-274).

    https://doi.org/10.1109/ICNP.2010.5762775

  • Backes M, Ciobotaru O and Krohmer A. RatFish. Proceedings of the 15th European conference on Research in computer security. (607-625).

    /doi/10.5555/1888881.1888928

  • Wong E, Leners J and Alvisi L. It's on me! the benefit of altruism in BAR environment. Proceedings of the 24th international conference on Distributed computing. (406-420).

    /doi/10.5555/1888781.1888836

  • Vater A, Schindelhauer C and Ortolf C. Tree network coding for peer-to-peer networks. Proceedings of the twenty-second annual ACM symposium on Parallelism in algorithms and architectures. (114-123).

    https://doi.org/10.1145/1810479.1810503

  • Rahman R, Hales D, Vinko T, Pouwelse J and Sips H. (2010). No more crash or crunch: Sustainable credit dynamics in a P2P community Simulation (HPCS). 10.1109/HPCS.2010.5547112. 978-1-4244-6827-0. (332-340).

    http://ieeexplore.ieee.org/document/5547112/

  • Analoui M and Rezvani M. (2010). An Economic Case for End System Multicast. Future Internet - FIS 2010. 10.1007/978-3-642-15877-3_5. (40-48).

    http://link.springer.com/10.1007/978-3-642-15877-3_5

  • Wong E, Leners J and Alvisi L. (2010). It’s on Me! The Benefit of Altruism in BAR Environments. Distributed Computing. 10.1007/978-3-642-15763-9_41. (406-420).

    http://link.springer.com/10.1007/978-3-642-15763-9_41

  • Backes M, Ciobotaru O and Krohmer A. (2010). RatFish: A File Sharing Protocol Provably Secure against Rational Users. Computer Security – ESORICS 2010. 10.1007/978-3-642-15497-3_37. (607-625).

    http://link.springer.com/10.1007/978-3-642-15497-3_37

  • Bhattacharjee B and Rabinovich M. (2010). Overlay Networking and Resiliency. Guide to Reliable Internet Services and Applications. 10.1007/978-1-84882-828-5_7. (221-251).

    http://link.springer.com/10.1007/978-1-84882-828-5_7

  • Ortolf C, Schindelhauer C and Vater A. Classifying peer-to-peer network coding schemes. Proceedings of the twenty-first annual symposium on Parallelism in algorithms and architectures. (310-318).

    https://doi.org/10.1145/1583991.1584066

  • Esposito F, Matta I, Michiardi P, Mitsutake N and Carra D. Seed Scheduling for Peer-to-Peer Networks. Proceedings of the 2009 Eighth IEEE International Symposium on Network Computing and Applications. (28-35).

    https://doi.org/10.1109/NCA.2009.15

  • Ortolf C, Schindelhauer C and Vater A. Paircoding. Proceedings of the 2009 Fourth International Conference on Internet and Web Applications and Services. (49-57).

    https://doi.org/10.1109/ICIW.2009.16

  • Zohar A and Rosenschein J. Adding incentives to file-sharing systems. Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2. (859-866).

    /doi/10.5555/1558109.1558131

  • Xiao Y, Varvello M and Kuzmanovic A. (2022). Monetizing Spare Bandwidth. Proceedings of the ACM on Measurement and Analysis of Computing Systems. 6:2. (1-27). Online publication date: 26-May-2022.

    https://doi.org/10.1145/3530899

  • Galanopoulos A, Salonidis T and Iosifidis G. Cooperative Edge Computing of Data Analytics for the Internet of Things. IEEE Transactions on Cognitive Communications and Networking. 10.1109/TCCN.2020.3019610. 6:4. (1166-1179).

    https://ieeexplore.ieee.org/document/9178340/

  • Galanopoulos A, Iosifidis G and Salonidis T. Cooperative Analytics for the Internet of Things. Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing. (395-396).

    https://doi.org/10.1145/3323679.3326631

  • Gao G and Li R. (2019). Collaborative Caching in P2P Streaming Networks. Journal of Network and Systems Management. 27:3. (815-836). Online publication date: 1-Jul-2019.

    https://doi.org/10.1007/s10922-018-09485-6

  • Cheung Y, Hoefer M and Nakhe P. Tracing Equilibrium in Dynamic Markets via Distributed Adaptation. Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems. (1225-1233).

    /doi/10.5555/3306127.3331825

  • Awasthi S and Singh Y. (2018). Simplified Biased Contribution Index (SBCI): A mechanism to make P2P network fair and efficient for resource sharing. Journal of Parallel and Distributed Computing. 10.1016/j.jpdc.2018.10.002. Online publication date: 1-Oct-2018.

    https://linkinghub.elsevier.com/retrieve/pii/S0743731518307366

  • Yang Y, Lu Z, Li V and Xu K. Noncooperative Information Diffusion in Online Social Networks Under the Independent Cascade Model. IEEE Transactions on Computational Social Systems. 10.1109/TCSS.2017.2719056. 4:3. (150-162).

    http://ieeexplore.ieee.org/document/8008788/

  • Vilaça X and Rodrigues L. Accountability in Dynamic Networks. Proceedings of the 18th International Conference on Distributed Computing and Networking. (1-10).

    https://doi.org/10.1145/3007748.3007769

  • Landa R, Charalambides M, Clegg R, Griffin D and Rio M. Self-Tuning Service Provisioning for Decentralized Cloud Applications. IEEE Transactions on Network and Service Management. 10.1109/TNSM.2016.2549698. 13:2. (197-211).

    http://ieeexplore.ieee.org/document/7445875/

  • Guo D, Kwok Y, Jin X and Deng J. (2016). A performance study of incentive schemes in peer-to-peer file-sharing systems. The Journal of Supercomputing. 72:3. (1152-1178). Online publication date: 1-Mar-2016.

    https://doi.org/10.1007/s11227-016-1648-4

  • Gonçalves G, Cunha Í, Vieira A and Almeida J. (2016). Predicting the level of cooperation in a Peer-to-Peer live streaming application. Multimedia Systems. 22:2. (161-180). Online publication date: 1-Mar-2016.

    https://doi.org/10.1007/s00530-014-0434-5

  • Zhang H, Vasudevan S, Li R and Towsley D. (2015). Coalitions improve performance in data swarming systems. IEEE/ACM Transactions on Networking. 23:6. (1790-1804). Online publication date: 1-Dec-2015.

    https://doi.org/10.1109/TNET.2014.2345574

  • Esposito F and Cerroni W. (2015). Integrating Piece and Peer Selection in Content Distribution Networks GLOBECOM 2015 - 2015 IEEE Global Communications Conference. 10.1109/GLOCOM.2015.7417806. 978-1-4799-5952-5. (1-6).

    http://ieeexplore.ieee.org/document/7417806/

  • Zubeldía M, Ferragut A and Paganini F. (2015). Neighbor selection for proportional fairness in P2P networks. Computer Networks: The International Journal of Computer and Telecommunications Networking. 83:C. (249-264). Online publication date: 4-Jun-2015.

    https://doi.org/10.1016/j.comnet.2015.03.016

  • Sánchez-Carmona A, Robles S and Borrego C. (2015). Endeavouring to be in the good books. Awarding DTN network use for acknowledging the reception of bundles. Computer Networks: The International Journal of Computer and Telecommunications Networking. 83:C. (149-166). Online publication date: 4-Jun-2015.

    https://doi.org/10.1016/j.comnet.2015.03.007

  • Shin K, Joe-Wong C, Ha S, Yi Y, Rhee I and Reeves D. (2015). T-Chain: A General Incentive Scheme for Cooperative Computing 2015 IEEE 35th International Conference on Distributed Computing Systems (ICDCS). 10.1109/ICDCS.2015.25. 978-1-4673-7214-5. (163-174).

    http://ieeexplore.ieee.org/document/7164903/

  • Li Q, Qin T, Guan X and Zheng Q. (2014). Analysis of user’s behavior and resource characteristics for private trackers. Peer-to-Peer Networking and Applications. 10.1007/s12083-014-0266-2. 8:3. (432-446). Online publication date: 1-May-2015.

    http://link.springer.com/10.1007/s12083-014-0266-2

  • HyunYong Lee and Nakao A. (2015). A study of user incentive mechanism in named data networking 2015 7th International Conference on Communication Systems and Networks (COMSNETS). 10.1109/COMSNETS.2015.7098669. 978-1-4799-8439-8. (1-8).

    http://ieeexplore.ieee.org/document/7098669/

  • Lee H and Nakao A. (2015). A study of user-assisted content distribution performance in named data networking 2015 7th International Conference on Communication Systems and Networks (COMSNETS). 10.1109/COMSNETS.2015.7098668. 978-1-4799-8439-8. (1-8).

    http://ieeexplore.ieee.org/document/7098668/

  • Cai Q and Lo K. (2013). A multi-faced measurement study on a large private BitTorrent community. Peer-to-Peer Networking and Applications. 10.1007/s12083-013-0207-5. 8:1. (32-48). Online publication date: 1-Jan-2015.

    http://link.springer.com/10.1007/s12083-013-0207-5

  • Jin X, Kwok Y and Deng J. (2014). Variegated competing peer-to-peer systems with selfish peers. Computer Networks: The International Journal of Computer and Telecommunications Networking. 75:PA. (313-330). Online publication date: 24-Dec-2014.

    https://doi.org/10.1016/j.comnet.2014.10.017

  • Esposito F and Cerroni W. (2014). Integrating Piece and Peer Selection in Content Distribution Networks GLOBECOM 2015 - 2015 IEEE Global Communications Conference. 10.1109/GLOCOM.2014.7417806. 978-1-4799-5952-5. (1-6).

    http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=7417806

  • Hu Y, Wang D, Zhong H and Wu F. (2013). SocialTrust: Enabling long-term social cooperation in peer-to-peer services. Peer-to-Peer Networking and Applications. 10.1007/s12083-013-0198-2. 7:4. (525-538). Online publication date: 1-Dec-2014.

    http://link.springer.com/10.1007/s12083-013-0198-2

  • Sharma A, Venkataramani A and Rocha A. (2014). Pros & cons of model-based bandwidth control for client-assisted content delivery 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS). 10.1109/COMSNETS.2014.6734893. 978-1-4799-3635-9. (1-8).

    http://ieeexplore.ieee.org/document/6734893/

  • Luo J, Xiao B, Bu K and Zhou S. (2013). Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol. IEEE Transactions on Parallel and Distributed Systems. 24:12. (2526-2537). Online publication date: 1-Dec-2013.

    https://doi.org/10.1109/TPDS.2013.8

  • Sugiyama K, Kubo T, Tagami A and Parekh A. (2013). Incentive mechanism for DTN-based message delivery services 2013 IEEE Global Communications Conference (GLOBECOM 2013). 10.1109/GLOCOM.2013.6831549. 978-1-4799-1353-4. (3108-3113).

    http://ieeexplore.ieee.org/document/6831549/

  • Dingding Guo and Yu-Kwong Kwok . (2013). Valuation promotes cooperation in peer-to-peer file-sharing 2013 IEEE Global Communications Conference (GLOBECOM 2013). 10.1109/GLOCOM.2013.6831548. 978-1-4799-1353-4. (3102-3107).

    http://ieeexplore.ieee.org/document/6831548/

  • Miao Wang , Yujun Zhang and Xuying Meng . (2013). A reputation based incentive mechanism for selfish BitTorrent system 2013 IEEE Global Communications Conference (GLOBECOM 2013). 10.1109/GLOCOM.2013.6831261. 978-1-4799-1353-4. (1348-1353).

    http://ieeexplore.ieee.org/document/6831261/

  • Zhao M, Aditya P, Chen A, Lin Y, Haeberlen A, Druschel P, Maggs B, Wishon B and Ponec M. Peer-assisted content distribution in Akamai netsession. Proceedings of the 2013 conference on Internet measurement conference. (31-42).

    https://doi.org/10.1145/2504730.2504752

  • Zubeldia M, Ferragut A and Paganini F. (2013). Proportional fairness in heterogeneous peer-to-peer networks through reciprocity and Gibbs sampling 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton). 10.1109/Allerton.2013.6736514. 978-1-4799-3410-2. (123-130).

    http://ieeexplore.ieee.org/document/6736514/

  • Jiang H, Jin H, Guo S and Liao X. (2012). A measurement‐based study on user management in private BitTorrent communities. Concurrency and Computation: Practice and Experience. 10.1002/cpe.2884. 25:14. (2052-2066). Online publication date: 25-Sep-2013.

    https://onlinelibrary.wiley.com/doi/10.1002/cpe.2884

  • Carra D, Michiardi P, Salah H and Strufe T. On the Impact of Incentives in eMule {Analysis and Measurements of a Popular File-Sharing Application}. IEEE Journal on Selected Areas in Communications. 10.1109/JSAC.2013.SUP.0513009. 31:9. (94-104).

    http://ieeexplore.ieee.org/document/6559993/

  • Cai Q and Lo K. (2013). Two Blocks Are Enough. IEEE Transactions on Parallel and Distributed Systems. 24:8. (1682-1694). Online publication date: 1-Aug-2013.

    https://doi.org/10.1109/TPDS.2012.211

  • Luo J, Xiao B and Zhou S. (2013). A bottom-up model for heterogeneous BitTorrent systems. Journal of Parallel and Distributed Computing. 73:8. (1116-1126). Online publication date: 1-Aug-2013.

    https://doi.org/10.1016/j.jpdc.2013.04.003

  • Wong E and Alvisi L. What's a little collusion between friends?. Proceedings of the 2013 ACM symposium on Principles of distributed computing. (240-249).

    https://doi.org/10.1145/2484239.2484242

  • Jin X, Deng J and Kwok Y. (2013). A new analytical framework for studying protocol diversity in P2P networks ICC 2013 - 2013 IEEE International Conference on Communications. 10.1109/ICC.2013.6654871. 978-1-4673-3122-7. (2293-2297).

    http://ieeexplore.ieee.org/document/6654871/

  • D'Acunto L, Chiluka N, Vinkó T and Sips H. (2013). BitTorrent-like P2P approaches for VoD. Computer Networks: The International Journal of Computer and Telecommunications Networking. 57:5. (1253-1276). Online publication date: 1-Apr-2013.

    https://doi.org/10.1016/j.comnet.2012.12.016

  • Shafiee Sarjaz B and Abbaspour M. (2012). Securing BitTorrent using a new reputation-based trust management system. Peer-to-Peer Networking and Applications. 10.1007/s12083-012-0141-y. 6:1. (86-100). Online publication date: 1-Mar-2013.

    http://link.springer.com/10.1007/s12083-012-0141-y

  • Noroozian A, de Weerdt M and Witteveen C. (2013). Incentivizing Cooperation in P2P File Sharing. Agents and Data Mining Interaction. 10.1007/978-3-642-36288-0_5. (36-50).

    http://link.springer.com/10.1007/978-3-642-36288-0_5

  • Izhak-Ratzin R, Park H and van der Schaar M. (2012). Online Learning in BitTorrent Systems. IEEE Transactions on Parallel and Distributed Systems. 23:12. (2280-2288). Online publication date: 1-Dec-2012.

    https://doi.org/10.1109/TPDS.2012.90

  • Yu H, Gibbons P and Shi C. DCast. Proceedings of the 2012 ACM conference on Computer and communications security. (567-580).

    https://doi.org/10.1145/2382196.2382256

  • Sherman A, Nieh J and Stein C. (2012). FairTorrent. IEEE/ACM Transactions on Networking. 20:5. (1361-1374). Online publication date: 1-Oct-2012.

    https://doi.org/10.1109/TNET.2012.2185058

  • Carlsson N, Dan G, Eager D and Mahanti A. (2012). Tradeoffs in cloud and peer-assisted content delivery systems 2012 IEEE Twelfth International Conference on Peer-to-Peer Computing (P2P). 10.1109/P2P.2012.6335805. 978-1-4673-2862-3. (249-260).

    http://ieeexplore.ieee.org/document/6335805/

  • Eidenbenz R, Locher T, Schmid S and Wattenhofer R. (2012). Boosting market liquidity of peer-to-peer systems through cyclic trading 2012 IEEE Twelfth International Conference on Peer-to-Peer Computing (P2P). 10.1109/P2P.2012.6335796. 978-1-4673-2862-3. (155-166).

    http://ieeexplore.ieee.org/document/6335796/

  • Alimi R, Chen L, Kutscher D, Liu H, Rahman A, Song H, Yang Y, Zhang D and Zong N. An open content delivery infrastructure using data lockers. Proceedings of the second edition of the ICN workshop on Information-centric networking. (25-30).

    https://doi.org/10.1145/2342488.2342495

  • Gonçalves G, Guimarães A, Vieira A, Cunha Í and Almeida J. Using centrality metrics to predict peer cooperation in live streaming applications. Proceedings of the 11th international IFIP TC 6 conference on Networking - Volume Part II. (84-96).

    https://doi.org/10.1007/978-3-642-30054-7_7

  • Zhang H and Vasudevan S. (2012). Design and analysis of a choking strategy for coalitions in data swarming systems IEEE INFOCOM 2012 - IEEE Conference on Computer Communications. 10.1109/INFCOM.2012.6195698. 978-1-4673-0775-8. (2776-2780).

    http://ieeexplore.ieee.org/document/6195698/

  • Wu C, Li Z, Qiu X and Lau F. (2012). Auction-based P2P VoD streaming. ACM Transactions on Multimedia Computing, Communications, and Applications. 8:1S. (1-22). Online publication date: 1-Feb-2012.

    https://doi.org/10.1145/2089085.2089091

  • Gao G, Li R, Wen K and Gu X. (2012). Proactive replication for rare objects in unstructured peer-to-peer networks. Journal of Network and Computer Applications. 35:1. (85-96). Online publication date: 1-Jan-2012.

    https://doi.org/10.1016/j.jnca.2011.02.007

  • Rezvani M and Analoui M. (2012). An Economic Auction Mechanism for Multirate Single-Service Overlay Networks Using Optimum Hops. 2011 International Conference in Electrics, Communication and Automatic Control Proceedings. 10.1007/978-1-4419-8849-2_14. (101-108).

    https://link.springer.com/10.1007/978-1-4419-8849-2_14

  • Carra D, Neglia G, Michiardi P and Albanese F. (2011). On the Robustness of BitTorrent Swarms to Greedy Peers. IEEE Transactions on Parallel and Distributed Systems. 22:12. (2071-2078). Online publication date: 1-Dec-2011.

    https://doi.org/10.1109/TPDS.2011.94

  • Khan U and Saif U. BitTorrent for the less privileged. Proceedings of the 10th ACM Workshop on Hot Topics in Networks. (1-6).

    https://doi.org/10.1145/2070562.2070582

  • Peterson R, Wong B and Sirer E. (2011). A content propagation metric for efficient content distribution. ACM SIGCOMM Computer Communication Review. 41:4. (326-337). Online publication date: 22-Oct-2011.

    https://doi.org/10.1145/2043164.2018474

  • Rahman R, Vinkó T, Hales D, Pouwelse J and Sips H. (2011). Design space analysis for modeling incentives in distributed systems. ACM SIGCOMM Computer Communication Review. 41:4. (182-193). Online publication date: 22-Oct-2011.

    https://doi.org/10.1145/2043164.2018458

  • Zhang H, Vasudevan S, Li R and Towsley D. A case for coalitions in data swarming systems. Proceedings of the 2011 19th IEEE International Conference on Network Protocols. (246-255).

    https://doi.org/10.1109/ICNP.2011.6089058

  • Peterson R, Wong B and Sirer E. A content propagation metric for efficient content distribution. Proceedings of the ACM SIGCOMM 2011 conference. (326-337).

    https://doi.org/10.1145/2018436.2018474

  • Rahman R, Vinkó T, Hales D, Pouwelse J and Sips H. Design space analysis for modeling incentives in distributed systems. Proceedings of the ACM SIGCOMM 2011 conference. (182-193).

    https://doi.org/10.1145/2018436.2018458

  • Rezvani M and Analoui M. (2011). Strategic behavior modeling of multi-service overlay multicast networks based on auction mechanism design. Journal of Parallel and Distributed Computing. 71:8. (1125-1141). Online publication date: 1-Aug-2011.

    https://doi.org/10.1016/j.jpdc.2011.04.008

  • Birnbaum B, Devanur N and Xiao L. Distributed algorithms via gradient descent for fisher markets. Proceedings of the 12th ACM conference on Electronic commerce. (127-136).

    https://doi.org/10.1145/1993574.1993594

  • So J and Reeves D. Defending against Sybil nodes in BitTorrent. Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part II. (25-39).

    /doi/10.5555/2008826.2008830

  • Rezvani M and Analoui M. A Case for Multi-service Overlay Multicast Networks Based on Auction Mechanism. Proceedings of the 2011 Eighth International Conference on Information Technology: New Generations. (953-958).

    https://doi.org/10.1109/ITNG.2011.163

  • Izhak-Ratzin R, Park H and van der Schaar M. (2011). Reinforcement learning in BitTorrent systems IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. 10.1109/INFCOM.2011.5935192. 978-1-4244-9919-9. (406-410).

    http://ieeexplore.ieee.org/document/5935192/

  • Wang Y, Nakao A, Vasilakos A and Ma J. (2011). P2P soft security. Computer Communications. 34:3. (241-249). Online publication date: 1-Mar-2011.

    https://doi.org/10.1016/j.comcom.2010.01.021

  • Park H, Ratzin R and van der Schaar M. Peer-to-Peer Networks. Streaming Media Architectures, Techniques, and Applications. 10.4018/978-1-61692-831-5.ch011. (262-294).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61692-831-5.ch011

  • Rezvani M and Analoui M. (2011). Towards strategic resource allocation in overlay networks based on monopoly auction mechanism 2011 IEEE Consumer Communications and Networking Conference (CCNC). 10.1109/CCNC.2011.5766583. 978-1-4244-8789-9. (710-714).

    http://ieeexplore.ieee.org/document/5766583/

  • So J and Reeves D. (2011). Defending against Sybil Nodes in BitTorrent. NETWORKING 2011. 10.1007/978-3-642-20798-3_3. (25-39).

    http://link.springer.com/10.1007/978-3-642-20798-3_3

  • Rezvani M and Analoui M. (2011). An Economic Auction-Based Mechanism for Multi-service Overlay Multicast Networks. Information Technology and Mobile Communication. 10.1007/978-3-642-20573-6_83. (461-467).

    http://link.springer.com/10.1007/978-3-642-20573-6_83

  • Wang M, Zhang Y and Li G. (2010). Odd for Even: A Selfishness Prevention File Swap Scheme for BitTorrent GLOBECOM 2010 - 2010 IEEE Global Communications Conference. 10.1109/GLOCOM.2010.5685234. 978-1-4244-5636-9. (1-6).

    http://ieeexplore.ieee.org/document/5685234/

  • Wang X, Govindan K and Mohapatra P. (2010). Provenance-Based Information Trustworthiness Evaluation in Multi-Hop Networks GLOBECOM 2010 - 2010 IEEE Global Communications Conference. 10.1109/GLOCOM.2010.5684158. 978-1-4244-5636-9. (1-5).

    http://ieeexplore.ieee.org/document/5684158/

  • Wang Q, Chen Z, Chen C and Pissinou N. (2010). On the Robustness of the Botnet Topology Formed by Worm Infection GLOBECOM 2010 - 2010 IEEE Global Communications Conference. 10.1109/GLOCOM.2010.5684002. 978-1-4244-5636-9. (1-6).

    http://ieeexplore.ieee.org/document/5684002/

  • Rezvani M and Analoui M. (2010). An information economy for single-service application layer multicast networks 2010 IEEE 15th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). 10.1109/CAMAD.2010.5686978. 978-1-4244-7634-3. (111-115).

    http://ieeexplore.ieee.org/document/5686978/

  • Analoui M and Rezvani M. A non-strategic microeconomic model for single-service multi-rate application layer multicast. Proceedings of the First international conference on Information computing and applications. (1-8).

    /doi/10.5555/1925974.1925976

  • Analoui M and Rezvani M. A Non-strategic Microeconomic Model for Single-Service Multi-rate Application Layer Multicast. Proceedings of the First International Conference on Information Computing and Applications - Volume 6377. (1-8).

    https://doi.org/10.1007/978-3-642-16167-4_1

  • Tran N, Li J and Subramanian L. Collusion-resilient credit-based reputations for peer-to-peer content distribution. Proceedings of the 2010 Workshop on Economics of Networks, Systems, and Computation. (1-8).

    https://doi.org/10.1145/1879082.1879085

  • Wang J, Shen R, Ullrich C, Luo H and Niu C. (2010). Resisting free-riding behavior in BitTorrent. Future Generation Computer Systems. 26:8. (1285-1299). Online publication date: 1-Oct-2010.

    https://doi.org/10.1016/j.future.2009.05.014

  • Analoui M and Rezvani M. An economic case for end system multicast. Proceedings of the Third future internet conference on Future internet. (40-48).

    /doi/10.5555/1929268.1929273

  • Leong B, Wang Y, Wen S, Carbunaru C, Teo Y, Chang C and Ho T. Improving peer-to-peer file distribution. Proceedings of the first ACM asia-pacific workshop on Workshop on systems. (55-60).

    https://doi.org/10.1145/1851276.1851289

  • Kaune S, Tyson G, Pussep K, Mauthe A and Steinmetz R. (2010). The Seeder Promotion Problem: Measurements, Analysis and Solution Space 2010 19th International Conference on Computer Communications and Networks ( ICCCN 2010). 10.1109/ICCCN.2010.5560089. 978-1-4244-7114-0. (1-8).

    http://ieeexplore.ieee.org/document/5560089/

  • Pang Y and Guo Z. Price differentiation all-pay auction-based incentives in bittorrent. Proceedings of the 5th international conference on Advances in Grid and Pervasive Computing. (689-697).

    https://doi.org/10.1007/978-3-642-13067-0_71

  • Rahman R, Meulpolder M, Hales D, Pouwelse J, Epema D and Sips H. (2010). Improving Efficiency and Fairness in P2P Systems with Effort-Based Incentives ICC 2010 - 2010 IEEE International Conference on Communications. 10.1109/ICC.2010.5502544. 978-1-4244-6402-9. (1-5).

    http://ieeexplore.ieee.org/document/5502544/

  • Piatek M, Krishnamurthy A, Venkataramani A, Yang R, Zhang D and Jaffe A. Contracts. Proceedings of the 7th USENIX conference on Networked systems design and implementation. (6-6).

    /doi/10.5555/1855711.1855717

  • Xing X, Mishra S and Liu X. ARBOR. Proceedings of the 29th conference on Information communications. (1352-1360).

    /doi/10.5555/1833515.1833712

  • Xing K and Cheng X. (2010). From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks IEEE INFOCOM 2010 - IEEE Conference on Computer Communications. 10.1109/INFCOM.2010.5461977. 978-1-4244-5836-3. (1-9).

    http://ieeexplore.ieee.org/document/5461977/

  • Menasche D, Massoulie L and Towsley D. (2010). Reciprocity and Barter in Peer-to-Peer Systems IEEE INFOCOM 2010 - IEEE Conference on Computer Communications. 10.1109/INFCOM.2010.5461967. 978-1-4244-5836-3. (1-9).

    http://ieeexplore.ieee.org/document/5461967/

  • Xing X, Mishra S and Liu X. (2010). ARBOR: Hang Together Rather Than Hang Separately in 802.11 WiFi Networks IEEE INFOCOM 2010 - IEEE Conference on Computer Communications. 10.1109/INFCOM.2010.5461908. 978-1-4244-5836-3. (1-9).

    http://ieeexplore.ieee.org/document/5461908/

  • Liu W, Peng D, Lin C, Chen Z and Song J. (2009). Enhancing tit-for-tat for incentive in BitTorrent networks. Peer-to-Peer Networking and Applications. 10.1007/s12083-009-0043-9. 3:1. (27-35). Online publication date: 1-Mar-2010.

    http://link.springer.com/10.1007/s12083-009-0043-9

  • Analoui M and Rezvani M. (2010). An Economic Case for End System Multicast. Future Internet - FIS 2010. 10.1007/978-3-642-15877-3_5. (40-48).

    http://link.springer.com/10.1007/978-3-642-15877-3_5

  • Analoui M and Rezvani M. (2010). Towards Microeconomic Resources Allocation in Overlay Networks. Active Media Technology. 10.1007/978-3-642-15470-6_24. (220-231).

    http://link.springer.com/10.1007/978-3-642-15470-6_24

  • Sherman A, Nieh J and Stein C. FairTorrent. Proceedings of the 5th international conference on Emerging networking experiments and technologies. (133-144).

    https://doi.org/10.1145/1658939.1658955

  • Wei G, Xie M, Mao Y and Vasilakos A. A Budget-Based Cost-Effective Incentive Model. Proceedings of the 2009 International Conference on Parallel Processing Workshops. (449-456).

    https://doi.org/10.1109/ICPPW.2009.30

  • Champel M, Kermarrec A and Le Scouarnec N. (2009). Phosphite: Guaranteeing out-of-order download in P2P video on demand 2009 IEEE Ninth International Conference on Peer-to-Peer Computing (P2P). 10.1109/P2P.2009.5284545. 978-1-4244-5066-4. (281-290).

    http://ieeexplore.ieee.org/document/5284545/

  • Roy S and Wenjun Zeng . (2009). prTorrent: On establishment of piece rarity in the BitTorrent unchoking algorithm 2009 IEEE Ninth International Conference on Peer-to-Peer Computing (P2P). 10.1109/P2P.2009.5284542. 978-1-4244-5066-4. (252-261).

    http://ieeexplore.ieee.org/document/5284542/

  • Jain S and Parkes D. The role of game theory in human computation systems. Proceedings of the ACM SIGKDD Workshop on Human Computation. (58-61).

    https://doi.org/10.1145/1600150.1600171

  • Kim H and Ramachandran U. FlashLite. Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems. (534-541).

    https://doi.org/10.1109/ICDCS.2009.27

  • Ryoo S and Bahk S. Spatial reuse enhanced MAC for wireless dense networks. Proceedings of the first international conference on Ubiquitous and future networks. (225-229).

    /doi/10.5555/1671729.1671772

  • Sunheui Ryoo and Saewoong Bahk . (2009). Spatial reuse enhanced MAC for wireless dense networks 2009 First International Conference on Ubiquitous and Future Networks (ICUFN). 10.1109/ICUFN.2009.5174316. 978-1-4244-4215-7. (225-229).

    http://ieeexplore.ieee.org/document/5174316/

  • Huang K, Zhang D and Wang L. An Activeness-Based Seed Choking Algorithm for Enhancing BitTorrent's Robustness. Proceedings of the 4th International Conference on Advances in Grid and Pervasive Computing. (376-387).

    https://doi.org/10.1007/978-3-642-01671-4_34

  • Levin D, Douceur J, Lorch J and Moscibroda T. TrInc. Proceedings of the 6th USENIX symposium on Networked systems design and implementation. (1-14).

    /doi/10.5555/1558977.1558978

  • Incentive-aware routing in DTNs. Proceedings of the 2008 IEEE International Conference on Network Protocols.

    https://doi.org/10.1109/ICNP.2008.4697042

  • Trautman L. Virtual Currencies: Bitcoin & What Now after Liberty Reserve and Silk Road?. SSRN Electronic Journal. 10.2139/ssrn.2393537.

    http://www.ssrn.com/abstract=2393537