比特幣交易所 比特幣交易所
Ctrl+D 比特幣交易所
ads

女巫攻擊及防御方式詳解_COM

Author:

Time:1900/1/1 0:00:00

參考文獻:GeorgeDanezis,ChrisLesniewski-laas,M.FransKaashoek,andRossAnderson.Sybil-resistantdhtrouting.InInESORICS,LectureNotesinComputerScience,pages305–318,Berlin,Heidelberg,2005.Springer.PetarMaymounkovandDavidMazi`eres.Kademlia:Apeer-to-peerinformationsystembasedonthexormetric.InPeterDruschel,M.FransKaashoek,andAntonyI.T.Rowstron,editors,IPTPS,LectureNotesinComputerScience,pages53–65,Berlin,Heidelberg,2002.Springer.IonStoica,RobertMorris,DavidR.Karger,M.FransKaashoek,andHariBalakrishnan.Chord:Ascalablepeer-to-peerlookupserviceforinternetapplications.InSIGCOMM,pages149–160,NewYork,NY,USA,2001.ACM.YongWang,XiaochunYun,andYifeiLi.Analyzingthecharacteristicsofgnutellaoverlays.InITNG,pages1095–1100,Washington,DC,USA,2007.IEEEComputerSociety.VivekPathakandLiviuIftode.Byzantinefaulttolerantpublickeyauthenticationinpeer-to-peersystems.ComputerNetworks,50(4):579–596,2006.JohnDouceurandJudithS.Donath.Thesybilattack.InIPDPS,pages251–260,Washington,DC,USA,2002.IEEE.HaifengYu,ChenweiShi,MichaelKaminsky,PhillipB.Gibbons,andFengXiao.Dsybil:Optimalsybil-resistanceforrecommendationsystems.InIEEESymposiumonSecurityandPrivacy,pages283–298,Washington,DC,USA,May2009.IEEEComputerSociety.MiguelCastro,PeterDruschel,AyalvadiJ.Ganesh,AntonyI.T.Rowstron,andDanS.Wallach.Secureroutingforstructuredpeer-to-peeroverlaynetworks.InOSDI,Berkeley,CA,USA,2002.USENIXAssociation.AtulAdya,WilliamJ.Bolosky,MiguelCastro,GeraldCermak,RonnieChaiken,JohnR.Douceur,JonHowell,JacobR.Lorch,MarvinTheimer,andRogerWattenhofer.Farsite:Federated,available,andreliablestorageforanincompletelytrustedenvironment.InOSDI,NewYork,NY,USA,2002.USENIXAssociation.JonathanLedlieandMargoI.Seltzer.Distributed,secureloadbalancingwithskew,heterogeneityandchurn.InINFOCOM,pages1419–1430,Washington,DC,USA,2005.IEEE.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Anefficientdistributedpkiforstructuredp2pnetworks.InProceedingofP2P,pages1–10,Washington,DC,USA,2009.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Adistributedcertificationsystemforstructuredp2pnetworks.InDavidHausheerandJ¨urgenSch¨onw¨alder,editors,AIMS,volume5127ofLectureNotesinComputerScience,pages40–52,Berlin,Heidelberg,2008.Springer.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybil-resistantadmissioncontrolcouplingsybilguardwithdistributedcertification.InWETICE,pages105–110,Washington,DC,USA,2008.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybilproofdistributedidentitymanagementforp2pnetworks.InISCC,pages246–253,Washington,DC,USA,2008.IEEE.AgapiosAvramidis,PanayiotisKotzanikolaou,andChristosDouligeris.Chord-pki:Embeddingapublickeyinfrastructureintothechordoverlaynetwork.InJavierLopez,PierangelaSamarati,andJosepL.Ferrer,editors,EuroPKI,volume4582ofLectureNotesinComputerScience,pages354–361,Berlin,Heidelberg,2007.Springer.NikitaBorisov.Computationalpuzzlesassybildefenses.InAlbertoMontresor,AdamWierzbicki,andNahidShahmehri,editors,Peer-to-PeerComputing,pages171–176,Washington,DC,USA,2006.IEEEComputerSociety.HaifengYu,PhillipB.Gibbons,andMichaelKaminsky.Towardanoptimalsocialnetworkdefenseagainstsybilattacks.InIndranilGuptaandRogerWattenhofer,editors,PODC,pages376–377.ACM,2007.HaifengYu,PhillipB.Gibbons,MichaelKaminsky,andFengXiao.Sybillimit:Anear-optimalsocialnetworkdefenseagainstsybilattacks.InIEEESymposiumonSecurityandPrivacy,pages3–17,Washington,DC,USA,2008.IEEEComputerSociety.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamFlaxman.SybilGuard:defendingagainstsybilattacksviasocialnetworks.InLuigiRizzo,ThomasE.Anderson,andNickMcKeown,editors,SIGCOMM,pages267–278,NewYork,NY,USA,2006.ACM.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamD.Flaxman.Sybilguard:defendingagainstsybilattacksviasocialnetworks.IEEE/ACMTrans.Netw.,16(3):576–589,2008.NguyenTran,JinyangLi,LakshminarayananSubramanian,andShermanS.M.Chow.Optimalsybil-resilientnodeadmissioncontrol.InThe30thIEEEInternationalConferenceonComputerCommunications(INFOCOM2011),Shanghai,P.R.China,2011.IEEE.ChrisLesniewski-LassandM.FransKaashoek.Whˉanau:Asybil-proofdistributedhashtable.In7thUSENIXSymposiumonNetworkDesignandImplementation,pages3–17,Berkeley,CA,USA,2010.USENIXAssociation.C.Lesniewski-Laas.ASybil-proofone-hopDHT.InProceedingsofthe1stworkshoponSocialnetworksystems,pages19–24,NewYork,NY,USA,2008.ACM.PaulF.Syverson,DavidM.Goldschlag,andMichaelG.Reed.Anonymousconnectionsandonionrouting.InIEEESymposiumonSecurityandPrivacy,pages44–54,Washington,DC,USA,1997.IEEEComputerSociety.PengWang,JamesTyra,EricChan-tin,TysonMalchow,DenisFooKune,andYongdaeKim.Attackingthekadnetwork,2009.B.N.Levine,C.Shields,andN.B.Margolin.Asurveyofsolutionstothesybilattack.Technicalreport,UniversityofMassachusettsAmherst,Amherst,MA,2006.RodrigoRodrigues,BarbaraLiskov,andLiubaShrira.Thedesignofarobustpeer-to-peersystem.In10thACMSIGOPSEuropeanWorkshop,pages1–10,NewYork,NY,USA,2002.ACM.JamesNewsome,ElaineShi,DawnSong,andAdrianPerrig.Thesybilattackinsensornetworks:analysis&defenses.InIPSN’04:Proceedingsofthe3rdinternationalsymposiumonInformationprocessinginsensornetworks,pages259–268,NewYork,NY,USA,2004.ACM.MichaelJ.FreedmanandRobertMorris.Tarzan:apeer-to-peeranonymizingnetworklayer.InVijayalakshmiAtluri,editor,ACMConferenceonComputerandCommunicationsSecurity,pages193–206,Washington,DC,USA,2002.ACM.FabrizioCornelli,ErnestoDamiani,SabrinaDeCapitanidiVimercati,StefanoParaboschi,andPierangelaSamarati.Choosingreputableserventsinap2pnetwork.InWWW,pages376–386,NewYork,NY,USA,2002.ACM.BrentByungHoonKang,EricChan-Tin,ChristopherP.Lee,JamesTyra,HunJeongKang,ChrisNunnery,ZachariahWadler,GregSinclair,NicholasHopper,DavidDagon,andYongdaeKim.Towardscompletenodeenumerationinapeer-to-peerbotnet.InWanqingLi,WillySusilo,UdayaKiranTupakula,ReihanehSafavi-Naini,andVijayVaradharajan,editors,ASIACCS,pages23–34,NewYork,NY,USA,2009.ACM.FrankLi,PrateekMittal,MatthewCaesar,andNikitaBorisov.Sybilcontrol:practicalsybildefensewithcomputationalpuzzles.InProceedingsoftheseventhACMworkshoponScalabletrustedcomputing,pages67–78.ACM,2012.LuisvonAhn,ManuelBlum,NicholasJ.HopperandJohnLangford.Captcha:Usinghardaiproblemsforsecurity.InEliBiham,editor,EUROCRYPT,volume2656ofLectureNotesinComputerScience,pages294–311,Berlin,Heidelberg,2003.Springer.JeffYanandAhmadSalahElAhmad.Breakingvisualcaptchaswithnaivepatternrecognitionalgorithms.InACSAC,pages279–291,Washington,DC,USA,2007.IEEEComputerSociety.N.Tran,B.Min,J.Li,andL.Subramanian.Sybil-resilientonlinecontentvoting.InNSDI,Berkeley,CA,USA,2009.USENIX.SergioMarti,PrasannaGanesan,andHectorGarcia-Molina.Dhtroutingusingsociallinks.InIPTPS,pages100–111,Washington,DC,USA,2004.IEEE.DanieleQuerciaandStephenHailes.Sybilattacksagainstmobileusers:friendsandfoestotherescue.InINFOCOM’10:Proceedingsofthe29thconferenceonInformationcommunications,pages336–340,Piscataway,NJ,USA,2010.IEEEPress.AbedelazizMohaisen,AaramYun,andYongdaeKim.Measuringthemixingtimeofsocialgraphs.InProceedingsofthe10thannualconferenceonInternetmeasurement,IMC’10,pages383–389,NewYork,NY,USA,2010.ACM.BimalViswanath,AnsleyPost,KrishnaP.Gummadi,andAlanMislove.Ananalysisofsocialnetwork-basedsybildefenses.InSIGCOMM,NewYork,NY,USA,August2010.ACM.GeorgeDanezisandPrateekMittal.SybilInfer:Detectingsybilnodesusingsocialnetworks.InThe16thAnnualNetwork&DistributedSystemSecurityConference,LectureNotesinComputerScience,Berlin,Heidelberg,2009.Springer-Verlag.AbedelazizMohaisen,HuyTran,NicholasHopper,andYongdaeKim.Understandingsocialnetworkspropertiesfortrustworthycomputing.InICDCSWorkshops,pages154–159.IEEE,2011.AbedelazizMohaisenandScottHollenbeck.Improvingsocialnetwork-basedsybildefensesbyaugmentingsocialgraphs.InWISA,2013.AbedelazizMohaisen,NicholasHopper,andYongdaeKim.Keepyourfriendsclose:Incorporatingtrustintosocialnetwork-basedsybildefenses.InINFOCOM,pages1943–1951.IEEE,2011.HaifengYu.Sybildefensesviasocialnetworks:atutorialandsurvey.ACMSIGACTNews,42(3):80–101,2011.

IPC測試網上線,用戶、開發者和存儲提供者可以展開子網實驗:4月21日消息,經過18個月的開發,IPC的首次公開部署會在Spacenet測試網上,這是首次有一個長時間運行的IPC測試網對公眾可用,讓用戶、開發者和存儲提供者可以展開子網實驗,嘗試Filecoin根網絡之外的其他共識模型。據悉,IPC讓終端用戶和應用開發者可以動態啟動層級化的子網,能夠并行執行交易,從而將根網絡(Filecoin主網)的一些過量負載移除出去,同時能夠為應用的需求提供更好的運作條件。此外,IPC框架還利用主網提供的更強的安全保證,來實現跨子網交易和子網安全性守護機制。[2023/4/21 14:18:42]

數字時尚品牌Syky完成950萬美元 A 輪融資:金色財經報道,數字時尚品牌Syky完成950萬美元 A 輪融資,七七六領投,Brevan Howard Digital、Leadout Capital、First Light Capital Group 和 Polygon Ventures等公司參投。?

Syky 由前 Ralph Lauren 首席數字官 Alice Delahunt 領導,旨在建立一個支持區塊鏈的奢侈品平臺。[2023/1/18 11:19:31]

全球資管巨頭貝萊德為Maker提供美國國債和公司債券投資服務:10月24日消息,據外媒報道,全球資管巨頭貝萊德正在為Maker提供美國國債和公司債券投資服務,此外 Maker也在與 Coinbase、Gemini和Coinshares 等公司合作進行相關購買交易。

本月初,MakerDAO宣布撥款5億DAI用于投資美國短期國債與公司債券,其中80%用于美國短期國債,其余20%用于投資級公司債券。(decrypt)[2022/10/24 16:36:34]

納指盤中跌1.3%,至2020年9月以來最低水平:10月10日消息,行情顯示,納指盤中跌1.3%,至2020年9月以來最低水平。(金十)[2022/10/11 10:30:13]

區塊鏈生態系統Topl完成1500萬美元A輪融資,Cryptology Asset Group等領投:7月26日消息,區塊鏈生態系統Topl宣布完成1500萬美元A輪融資,本輪融資由Mercury、Republic Asia和Cryptology Asset Group共同領投。本輪融資資金將用于在未來一年中擴張團隊,進一步去中心化以便進行社區治理,以及發布其2款新的基于區塊鏈的應用程序。

Topl創始人Chris Georgen表示,該公司此前已在2020年的種子輪融資中籌集500萬美元,目前正與一些財富500強公司合作將其內部ESG報告系統轉移到Topl區塊鏈上。Topl可以幫助公司跟蹤其社會影響計劃并將其Token化,到今年年底,Topl生態預計將有大約40到50個項目上鏈。[2022/7/26 2:39:06]

Tags:ANDINGORKCOMHonorLandEOSKINGDOMVNetworkPoorQUACK.com

POL幣最新價格
想了解韓國幣圈及生態?看這一篇文章就夠了_數字貨幣

智科創新院社群開張啦!歡迎廣大區塊鏈愛好者進群和我們共同交流~ 1、前言 區塊鏈行業主要由幣圈、鏈圈、和產業圈組成。相比于技術屬性居多的鏈圈和圈外人難以理解的產業圈,幣圈是最“接地氣”的.

1900/1/1 0:00:00
【Deribit期權市場播報】0707——利空再臨_FTW

收錄于話題 #每日期權播報播報數據由Greeks.live格致數據實驗室和Deribit官網提供。消息面的利空再度降臨,但是市場反應不大,現在市場對于利空已經脫敏了,消息上的利空影響不大.

1900/1/1 0:00:00
一文讀盡NFT產業價值鏈內外投資邏輯_CRYP

撰文:JasmineZhang與FionaHe,分別為A&TCapital合伙人與投資經理。6月下旬,我們發布了一篇在NFT賽道領域的研究并闡述了我們重點關注的NFT領域的投資機會.

1900/1/1 0:00:00
Deribit期權市場播報0702: 遠期Call

收錄于話題 #每日期權播報 播報數據由Greeks.live格致數據實驗室和Deribit官網提供。得益于近期行情的穩定,比特幣偏短期的平值和淺虛值看漲貢獻了主要交易量.

1900/1/1 0:00:00
在 Solana 上開發 DeFi 的三大理由_SOL

撰文:Francium-Solana生態聚合收益器第?部分:Solana鏈底層的優勢 交易成本 Ethereum的交易成本已經影響了??對于DeFi的正常使?.

1900/1/1 0:00:00
星球日報 | 美聯儲與耶魯大學研究人員為穩定幣制定兩個監管框架;《南華早報》啟動“ARTIFACT”計劃,將基于其歷史新聞創建NFT(7月20日)_穩定幣

頭條 美聯儲與耶魯大學研究人員為穩定幣制定兩個監管框架美聯儲正在進行的關于央行數字貨幣的研究,已經擴大到包括穩定幣以及它們是否能得到有效監管的問題.

1900/1/1 0:00:00
ads