Defeating against Sybil-attacks in Peer-to-peer Networks
暂无分享,去创建一个
[1] George Danezis,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.
[2] Alice Cheng,et al. Sybilproof reputation mechanisms , 2005, P2PECON '05.
[3] Lakshminarayanan Subramanian,et al. Sybil-Resilient Online Content Voting , 2009, NSDI.
[4] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[5] A. K. Somani,et al. Reputation management framework and its use as currency in large-scale peer-to-peer networks , 2004 .
[6] Lakshminarayanan Subramanian,et al. Optimal Sybil-resilient node admission control , 2011, 2011 Proceedings IEEE INFOCOM.
[7] Michael Kaminsky,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.
[8] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[9] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[10] Ingmar Baumgart,et al. S/Kademlia: A practicable approach towards secure key-based routing , 2007, 2007 International Conference on Parallel and Distributed Systems.
[11] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[12] J. Frankel,et al. The gnutella protocol specification v0.4 document revision 1.2 , 2000 .
[13] B. Cohen,et al. Incentives Build Robustness in Bit-Torrent , 2003 .
[14] Nikita Borisov,et al. Computational Puzzles as Sybil Defenses , 2006, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06).
[15] Krishna P. Gummadi,et al. An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.
[16] Thomas F. La Porta,et al. Limiting Sybil Attacks in Structured P2P Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.