Preventing Sybil Attack in Blockchain using Distributed Behavior Monitoring of Miners
暂无分享,去创建一个
[1] Pramod Viswanath,et al. Dandelion , 2017, Proc. ACM Meas. Anal. Comput. Syst..
[2] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[3] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[4] Mauro Conti,et al. A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.
[5] Pedro Moreno-Sanchez,et al. P2P Mixing and Unlinkable Bitcoin Transactions , 2017, NDSS.
[6] Ethan Heilman,et al. TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub , 2017, NDSS.
[7] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[8] Pedro Moreno-Sanchez,et al. ValueShuffle: Mixing Confidential Transactions for Comprehensive Transaction Privacy in Bitcoin , 2017, Financial Cryptography Workshops.
[9] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[10] Iuon-Chang Lin,et al. A Survey of Blockchain Security Issues and Challenges , 2017, Int. J. Netw. Secur..
[11] Bai Nan,et al. Location based Technique to prevent Sybil attack in wireless sensor networks , 2018 .
[12] S. Justin Samuel,et al. An efficient technique to detect and prevent Sybil attacks in social network applications , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).
[13] Maged Hamada Ibrahim. SecureCoin: A Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem , 2017, Int. J. Netw. Secur..
[14] Nick Feamster,et al. Identifying and Characterizing Sybils in the Tor Network , 2016, USENIX Security Symposium.
[15] Ling Xu,et al. Resisting Sybil Attack By Social Network and Network Clustering , 2010, 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet.
[16] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[17] Pedro Moreno-Sanchez,et al. CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin , 2014, ESORICS.
[18] Luke Valenta,et al. Blindcoin: Blinded, Accountable Mixes for Bitcoin , 2015, Financial Cryptography Workshops.
[19] Larry J. Greenstein,et al. Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.
[20] Noureddine Boudriga,et al. A privacy preserving solution for the protection against sybil attacks in vehicular ad hoc networks , 2013, 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC).
[21] Brian Neil Levine,et al. Sybil-Resistant Mixing for Bitcoin , 2014, WPES.
[22] Jeremy Clark,et al. Mixcoin: Anonymity for Bitcoin with Accountable Mixes , 2014, Financial Cryptography.
[23] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[24] Quoc Khanh Nguyen,et al. Blockchain - A Financial Technology for Future Sustainable Development , 2016, 2016 3rd International Conference on Green Technology and Sustainable Development (GTSD).