暂无分享,去创建一个
[1] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[2] Philip W. L. Fong. Relationship-based access control: protection model and policy language , 2011, CODASPY '11.
[3] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[4] T. Kohno,et al. Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[5] Christian Scheideler,et al. Group Spreading: A Protocol for Provably Secure Distributed Name Service , 2004, ICALP.
[6] Diogo Monica,et al. Thwarting The Sybil Attack in Wireless Ad Hoc Networks , 2009 .
[7] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[8] Philip W. L. Fong. Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems , 2011, 2011 IEEE Symposium on Security and Privacy.
[9] Brian Neil Levine,et al. Informant: Detecting Sybils Using Incentives , 2007, Financial Cryptography.
[10] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[11] Brian Neil Levine,et al. A Survey of Solutions to the Sybil Attack , 2006 .
[12] Michael Sirivianos,et al. Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.
[13] George Kesidis,et al. Robust Sybil Detection for MANETs , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[14] Mohammad Ilyas,et al. Secure Routing in Wireless Sensor Networks , 2010, Handbook of Information and Communication Security.
[15] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[16] Mary Baker,et al. Preserving peer replicas by rate-limited sampled voting , 2003, SOSP '03.
[17] Tricia Walker,et al. Computer science , 1996, English for academic purposes series.
[18] Wei Hong,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .
[19] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[20] Mary Baker,et al. The LOCKSS peer-to-peer digital preservation system , 2005, TOCS.
[21] Barbara Carminati,et al. Enforcing relationships privacy through collaborative access control in web-based Social Networks , 2009, 2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[22] Sugata Sanyal,et al. A distributed security scheme for ad hoc networks , 2004, CROS.
[23] Philip W. L. Fong,et al. Relationship-based access control policies and their policy languages , 2011, SACMAT '11.