Unchained Identities: Putting a Price on Sybil Nodes in Mobile Ad Hoc Networks
暂无分享,去创建一个
[1] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[2] O. Bussmann. The Future of Finance: FinTech, Tech Disruption, and Orchestrating Innovation , 2017 .
[3] Bin Xiao,et al. Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.
[4] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[5] Feng Hao,et al. Authenticated Key Exchange over Bitcoin , 2015, SSR.
[6] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[7] Dieter Hogrefe,et al. Self-managed and blockchain-based vehicular ad-hoc networks , 2016, UbiComp Adjunct.
[8] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[9] Jubilant J. Kizhakkethottam,et al. A survey of techniques to prevent sybil attacks , 2015, 2015 International Conference on Soft-Computing and Networks Security (ICSNS).
[10] J. Li,et al. Smart city and the applications , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).
[11] Muhammad Irfan,et al. Mobile Ad-Hoc Networks Applications and Its Challenges , 2016 .
[12] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[13] Patrick Dai,et al. Smart-Contract Value-Transfer Protocols on a Distributed Mobile Application Platform , 2017 .
[14] Quoc Khanh Nguyen,et al. Blockchain - A Financial Technology for Future Sustainable Development , 2016, 2016 3rd International Conference on Green Technology and Sustainable Development (GTSD).
[15] Madjid Merabti,et al. Lightweight Sybil Attack Detection in MANETs , 2013, IEEE Systems Journal.
[16] Rajamani Vayanaperumal,et al. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method , 2015, TheScientificWorldJournal.
[17] Joseph P. Macker,et al. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.
[18] Daniel Miller,et al. Digital Anthropology , 2018, Cambridge Encyclopedia of Anthropology.
[19] Abdellah Ait Ouahman,et al. Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT , 2017 .
[20] George Kesidis,et al. Robust Sybil Detection for MANETs , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[21] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[22] Benjamin Leiding,et al. Authcoin: Validation and Authentication in Decentralized Networks , 2016, MCIS.
[23] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[24] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).