TrustChain: A Sybil-resistant scalable blockchain
暂无分享,去创建一个
Johan Pouwelse | Martijn de Vos | Pim Otte | J. Pouwelse | M. Vos | P. Otte
[1] Johan Pouwelse,et al. Targeted and scalable information dissemination in a distributed reputation mechanism , 2012, STC '12.
[2] P. Resnick,et al. The value of reputation on eBay: A controlled experiment , 2006 .
[3] Yoad Lewenberg,et al. Inclusive Block Chain Protocols , 2015, Financial Cryptography.
[4] Krishna P. Gummadi,et al. An analysis of social network-based Sybil defenses , 2010, SIGCOMM 2010.
[5] Lakshminarayanan Subramanian,et al. Sybil-Resilient Online Content Voting , 2009, NSDI.
[6] Sven Seuken,et al. Sybil-proof accounting mechanisms with transitive trust , 2014, AAMAS.
[7] James B. Orlin,et al. Max flows in O(nm) time, or better , 2013, STOC '13.
[8] D. R. Fulkerson,et al. Maximal Flow Through a Network , 1956 .
[9] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[10] Alexandru Iosup,et al. TRIBLER: a social-based peer-to-peer system: Research Articles , 2008 .
[11] Paul Resnick,et al. Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.
[12] Ravindra K. Ahuja,et al. Network Flows: Theory, Algorithms, and Applications , 1993 .
[13] Rafid Fadul,et al. The tragedy of the commons revisited. , 2009, The New England journal of medicine.
[14] Aviv Zohar,et al. Secure High-Rate Transaction Processing in Bitcoin , 2015, Financial Cryptography.
[15] Ruihong Huang,et al. LOBSTER: Limit Order Book Reconstruction System , 2011 .
[16] Andrew V. Goldberg,et al. A new approach to the maximum flow problem , 1986, STOC '86.
[17] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks , 2010, IEEE/ACM Trans. Netw..
[18] Richard M. Karp,et al. Theoretical Improvements in Algorithmic Efficiency for Network Flow Problems , 1972, Combinatorial Optimization.
[19] Elaine Shi,et al. On Scaling Decentralized Blockchains - (A Position Paper) , 2016, Financial Cryptography Workshops.
[20] Emin Gün Sirer,et al. Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.
[21] Robert E. Tarjan,et al. A faster deterministic maximum flow algorithm , 1992, SODA '92.
[22] Sven Seuken,et al. Accounting Mechanisms for Distributed Work Systems , 2010, AAAI.
[23] David Schuff,et al. What Makes a Helpful Review? A Study of Customer Reviews on Amazon.com , 2010 .
[24] Johan A. Pouwelse,et al. Trust-based collection of information in distributed reputation networks , 2015, SAC.
[25] T. C. Hu,et al. Multi-Terminal Network Flows , 1961 .
[26] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[27] Jun Wang,et al. TRIBLER: a social‐based peer‐to‐peer system , 2008, IPTPS.
[28] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[29] George Danezis,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.
[30] Improved Accuracy and Coverage in the BarterCast Reputation Mechanism , 2010 .
[31] P. Otte. Sybil-resistant trust mechanisms in distributed systems , 2016 .
[32] Yefim Dinitz,et al. Dinitz' Algorithm: The Original Version and Even's Version , 2006, Essays in Memory of Shimon Even.
[33] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[34] Johan A. Pouwelse,et al. BarterCast: A practical approach to prevent lazy freeriding in P2P networks , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.
[35] Idit Keidar,et al. Distributed computing column 43: using social networks to overcome Sybil attacks , 2011, SIGA.
[36] Paul Resnick,et al. The value of reputation on eBay: A controlled experiment , 2002 .
[37] Johan A. Pouwelse,et al. Online Video Using BitTorrent and HTML5 Applied to Wikipedia , 2010, 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P).