A Discriminatory Rewarding Mechanism for Sybil Detection with Applications to Tor
暂无分享,去创建一个
[1] Zinaida Benenson,et al. Access control in wireless sensor networks , 2008 .
[2] Brian Neil Levine,et al. A Survey of Solutions to the Sybil Attack , 2006 .
[3] Alice Cheng,et al. Sybilproof reputation mechanisms , 2005, P2PECON '05.
[4] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[5] Jens-Peter Redlich,et al. Sybil proof anonymous reputation management , 2008, SecureComm.
[6] Ian Goldberg,et al. On the Security of the Tor Authentication Protocol , 2006, Privacy Enhancing Technologies.
[7] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[8] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[9] Hao Wang,et al. An auctioning reputation system based on anomaly , 2005, CCS.
[10] Mohammad Ilyas,et al. Secure Routing in Wireless Sensor Networks , 2010, Handbook of Information and Communication Security.
[11] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[12] Byoungcheon Lee,et al. Providing Receipt-Freeness in Mixnet-Based Voting Protocols , 2003, ICISC.
[13] Noam Nisan,et al. Algorithmic Mechanism Design , 2001, Games Econ. Behav..
[14] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[15] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[16] Joan Feigenbaum,et al. A Model of Onion Routing with Provable Anonymity , 2007, Financial Cryptography.
[17] Matthew K. Wright,et al. Analysis of an incentives-based secrets protection system , 2004, DRM '04.
[18] Brian Neil Levine,et al. Informant: Detecting Sybils Using Incentives , 2007, Financial Cryptography.
[19] Makoto Yokoo,et al. The effect of false-name bids in combinatorial auctions: new fraud in internet auctions , 2004, Games Econ. Behav..