Sybil Tolerant Consensus Method Using Mutual Proof of Validation
暂无分享,去创建一个
[1] Yongdae Kim,et al. Impossibility of Full Decentralization in Permissionless Blockchains , 2019, AFT.
[2] Prateek Mittal,et al. SybilControl: practical sybil defense with computational puzzles , 2012, STC '12.
[3] Aziz Mohaisen,et al. Measuring the mixing time of social graphs , 2010, IMC '10.
[4] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[5] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[6] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[7] George Danezis,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.
[8] Johan Pouwelse,et al. TrustChain: A Sybil-resistant scalable blockchain , 2017, Future Gener. Comput. Syst..
[9] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[10] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[11] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[12] Silvio Micali,et al. Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..