SyMon: A practical approach to defend large structured P2P systems against Sybil Attack
暂无分享,去创建一个
[1] Matei Ripeanu,et al. Peer-to-peer architecture case study: Gnutella network , 2001, Proceedings First International Conference on Peer-to-Peer Computing.
[2] Anne-Marie Kermarrec,et al. Peer counting and sampling in overlay networks: random walk methods , 2006, PODC '06.
[3] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[4] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[5] Eran Tromer,et al. On the Cost of Factoring RSA-1024 , 2003 .
[6] Butler W. Lampson,et al. SPKI Certificate Theory , 1999, RFC.
[7] Thomas F. La Porta,et al. Limiting Sybil Attacks in Structured P2P Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[8] Warwick Ford,et al. Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework , 2003, RFC.
[9] Nikita Borisov,et al. Computational Puzzles as Sybil Defenses , 2006, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06).
[10] Ashish Goel,et al. Avoiding ballot stuffing in eBay-like reputation systems , 2005, P2PECON '05.
[11] C. Costa,et al. Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems , 2007 .
[12] Ari Juels,et al. $evwu Dfw , 1998 .
[13] Emin Gün Sirer,et al. Fighting peer-to-peer SPAM and decoys with object reputation , 2005, P2PECON '05.
[14] Brent Waters,et al. New client puzzle outsourcing techniques for DoS resistance , 2004, CCS '04.
[15] Nicolas Christin,et al. Content availability, pollution and poisoning in file sharing peer-to-peer networks , 2005, EC '05.
[16] D. Janaki Ram,et al. SyMon: Defending large structured P2P systems against Sybil attack , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.
[17] Jon Crowcroft,et al. A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.
[18] Bruce Schneier,et al. Second Preimages on n-bit Hash Functions for Much Less than 2n Work , 2005, IACR Cryptol. ePrint Arch..
[19] George Danezis,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.
[20] Adam Wierzbicki,et al. Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing , 2006 .
[21] Carl A. Gunter,et al. Using rhythmic nonces for puzzle-based DoS resistance , 2008, CSAW '08.
[22] Keith W. Ross,et al. Efficient Blacklisting and Pollution-Level Estimation in P2P File-Sharing Systems , 2005, AINTEC.
[23] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[24] Lakshminarayanan Subramanian,et al. Sybil-Resilient Online Content Voting , 2009, NSDI.
[25] Anirban DasGupta,et al. The matching, birthday and the strong birthday problem: a contemporary review , 2005 .
[26] Kris Tiri,et al. Side-Channel Attack Pitfalls , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[27] E. Friedman,et al. The Social Cost of Cheap Pseudonyms , 2001 .
[28] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[29] Adi Shamir,et al. Factoring Estimates for a 1024-Bit RSA Modulus , 2003, ASIACRYPT.
[30] Seif Haridi,et al. A Practical Approach to Network Size Estimation for Structured Overlays , 2008, IWSOS.
[31] Miguel Castro,et al. Controlling the Cost of Reliability in Peer-to-Peer Overlays , 2003, IPTPS.
[32] Gade Krishna,et al. A scalable peer-to-peer lookup protocol for Internet applications , 2012 .
[33] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[34] Hari Balakrishnan,et al. Malware prevalence in the KaZaA file-sharing network , 2006, IMC '06.
[35] Rakesh Kumar,et al. Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[36] Qinyuan Feng,et al. RepTrap: a novel attack on feedback-based reputation systems , 2008, SecureComm.
[37] Adam Back,et al. Hashcash - A Denial of Service Counter-Measure , 2002 .
[38] Brent Waters,et al. Harvesting verifiable challenges from oblivious online sources , 2007, CCS '07.
[39] William Stallings. Secure Hash Algorithm , 2011, Encyclopedia of Cryptography and Security.
[40] Hannes Hartenstein,et al. Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[41] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks , 2010, IEEE/ACM Trans. Netw..
[42] Jussara M. Almeida,et al. Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems , 2007, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007).