A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord
暂无分享,去创建一个
[1] Shin-Ming Cheng,et al. On Designing Energy Efficient Wi-Fi P2P Connections for Internet of Things , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).
[2] Prateek Mittal,et al. X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks , 2012, NDSS.
[3] Jie Liu,et al. The Comparison of Distributed P2P Trust Models Based on Quantitative Parameters in the File Downloading Scenarios , 2016, J. Electr. Comput. Eng..
[4] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[5] Michael Kohnen. Applying trust and reputation mechanisms to a Kademlia-based Distributed Hash Table , 2012, 2012 IEEE International Conference on Communications (ICC).
[6] Mahdi N. Al-Ameen,et al. Persea: a sybil-resistant social DHT , 2013, CODASPY '13.
[7] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[8] Leandros A. Maglaras,et al. Vulnerability Analysis of Network Scanning on SCADA Systems , 2018, Secur. Commun. Networks.
[9] Lei Shi,et al. A modification on the Chord finger table for improving search efficiency , 2014, 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS).
[10] Lim Tong Ming,et al. Investigate SPRON Convergence Time Using Aggressive Chord and Aggressive AP-Chord , 2015, 2015 12th International Conference on Information Technology - New Generations.
[11] Ashiq Anjum,et al. Blockchain Standards for Compliance and Trust , 2017, IEEE Cloud Computing.
[12] Raouf Boutaba,et al. Reputation-Based Trust Management in Peer-to-Peer Systems: Taxonomy and Anatomy , 2010 .
[13] Angelo Spognardi,et al. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation , 2018, Secur. Commun. Networks.
[14] Pamela Zave,et al. Reasoning About Identifier Spaces: How to Make Chord Correct , 2016, IEEE Transactions on Software Engineering.
[15] Wei Zhang,et al. Trustchord: chord protocol based on the trust management mechanism , 2010 .
[16] M. Frans Kaashoek,et al. Whanau: A Sybil-proof Distributed Hash Table , 2010, NSDI.
[17] Kalman Graffi,et al. Moving peers in distributed, location-based peer-to-peer overlays , 2017, 2017 International Conference on Computing, Networking and Communications (ICNC).
[18] Xuemin Shen,et al. Handbook of Peer-to-Peer Networking , 2009 .
[19] Chi Zhang,et al. TrueTop: A Sybil-Resilient System for User Influence Measurement on Twitter , 2015, IEEE/ACM Transactions on Networking.
[20] Riccardo Pecori,et al. S-Kademlia: A trust and reputation method to mitigate a Sybil attack in Kademlia , 2016, Comput. Networks.
[21] Xiao Wang,et al. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils , 2016, IEEE Transactions on Dependable and Secure Computing.
[22] Dongxu Liu,et al. GeTrust: A Guarantee-Based Trust Model in Chord-Based P2P Networks , 2018, IEEE Transactions on Dependable and Secure Computing.
[23] Rashmi Ranjan Rout,et al. Trust-based decentralized service discovery in structured Peer-to-Peer networks , 2014, 2014 Annual IEEE India Conference (INDICON).
[24] Riccardo Pecori. A comparison analysis of trust-adaptive approaches to deliver signed public keys in P2P systems , 2015, 2015 7th International Conference on New Technologies, Mobility and Security (NTMS).
[25] Takeshi Tsuchiya,et al. A trust-based routing strategy in structured P2P overlay networks , 2013, The International Conference on Information Networking 2013 (ICOIN).
[26] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[27] Osamu Takahashi,et al. An Effective Lookup Strategy for Recursive and Iterative Lookup on Hierarchical DHT , 2012 .
[28] Weisong Shi,et al. PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[29] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[30] Mohammad S. Obaidat,et al. MR-Chord: Improved Chord Lookup Performance in Structured Mobile P2P Networks , 2015, IEEE Systems Journal.
[31] Cheng Yang,et al. Autonomous Gait Event Detection with Portable Single-Camera Gait Kinematics Analysis System , 2016, J. Sensors.
[32] Xingwei Wang,et al. A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P Networks , 2016, Mob. Inf. Syst..
[33] Mahdi Nasrullah Al-Ameen,et al. iPersea: Towards improving the Sybil-resilience of social DHT , 2016, J. Netw. Comput. Appl..
[34] Michael Kohnen. Analysis and optimization of routing trust values in a Kademlia-based Distributed Hash Table in a malicious environment , 2012, 2012 2nd Baltic Congress on Future Internet Communications.
[35] Keiichi Koyanagi,et al. Study on trust-based maintenance of overlays in structured P2P systems , 2011, 2011 International Conference on Computational Problem-Solving (ICCP).
[36] Luca Veltri,et al. Trust-based routing for Kademlia in a sybil scenario , 2014, 2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM).
[37] Michele Amoretti,et al. Simulating mobile and distributed systems with DEUS and ns-3 , 2013, 2013 International Conference on High Performance Computing & Simulation (HPCS).
[38] Guillermo Navarro-Arribas,et al. Cryptocurrency Networks: A New P2P Paradigm , 2018, Mob. Inf. Syst..
[39] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[40] Luca Veltri,et al. 3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications , 2016, Comput. Commun..
[41] Xing Long Xie,et al. Creditability assessment of dealers in P2P e-commerce , 2016, 2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC).
[42] Thomas F. La Porta,et al. Limiting Sybil Attacks in Structured P2P Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.