買以太坊 買以太坊
Ctrl+D 買以太坊
ads
首頁 > BNB價格 > Info

COM:女巫攻擊及防御方式詳解_Peerex Network

Author:

Time:1900/1/1 0:00:00

參考文獻:GeorgeDanezis,ChrisLesniewski-laas,M.FransKaashoek,andRossAnderson.Sybil-resistantdhtrouting.InInESORICS,LectureNotesinComputerScience,pages305–318,Berlin,Heidelberg,2005.Springer.PetarMaymounkovandDavidMazi`eres.Kademlia:Apeer-to-peerinformationsystembasedonthexormetric.InPeterDruschel,M.FransKaashoek,andAntonyI.T.Rowstron,editors,IPTPS,LectureNotesinComputerScience,pages53–65,Berlin,Heidelberg,2002.Springer.IonStoica,RobertMorris,DavidR.Karger,M.FransKaashoek,andHariBalakrishnan.Chord:Ascalablepeer-to-peerlookupserviceforinternetapplications.InSIGCOMM,pages149–160,NewYork,NY,USA,2001.ACM.YongWang,XiaochunYun,andYifeiLi.Analyzingthecharacteristicsofgnutellaoverlays.InITNG,pages1095–1100,Washington,DC,USA,2007.IEEEComputerSociety.VivekPathakandLiviuIftode.Byzantinefaulttolerantpublickeyauthenticationinpeer-to-peersystems.ComputerNetworks,50(4):579–596,2006.JohnDouceurandJudithS.Donath.Thesybilattack.InIPDPS,pages251–260,Washington,DC,USA,2002.IEEE.HaifengYu,ChenweiShi,MichaelKaminsky,PhillipB.Gibbons,andFengXiao.Dsybil:Optimalsybil-resistanceforrecommendationsystems.InIEEESymposiumonSecurityandPrivacy,pages283–298,Washington,DC,USA,May2009.IEEEComputerSociety.MiguelCastro,PeterDruschel,AyalvadiJ.Ganesh,AntonyI.T.Rowstron,andDanS.Wallach.Secureroutingforstructuredpeer-to-peeroverlaynetworks.InOSDI,Berkeley,CA,USA,2002.USENIXAssociation.AtulAdya,WilliamJ.Bolosky,MiguelCastro,GeraldCermak,RonnieChaiken,JohnR.Douceur,JonHowell,JacobR.Lorch,MarvinTheimer,andRogerWattenhofer.Farsite:Federated,available,andreliablestorageforanincompletelytrustedenvironment.InOSDI,NewYork,NY,USA,2002.USENIXAssociation.JonathanLedlieandMargoI.Seltzer.Distributed,secureloadbalancingwithskew,heterogeneityandchurn.InINFOCOM,pages1419–1430,Washington,DC,USA,2005.IEEE.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Anefficientdistributedpkiforstructuredp2pnetworks.InProceedingofP2P,pages1–10,Washington,DC,USA,2009.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Adistributedcertificationsystemforstructuredp2pnetworks.InDavidHausheerandJ¨urgenSch¨onw¨alder,editors,AIMS,volume5127ofLectureNotesinComputerScience,pages40–52,Berlin,Heidelberg,2008.Springer.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybil-resistantadmissioncontrolcouplingsybilguardwithdistributedcertification.InWETICE,pages105–110,Washington,DC,USA,2008.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybilproofdistributedidentitymanagementforp2pnetworks.InISCC,pages246–253,Washington,DC,USA,2008.IEEE.AgapiosAvramidis,PanayiotisKotzanikolaou,andChristosDouligeris.Chord-pki:Embeddingapublickeyinfrastructureintothechordoverlaynetwork.InJavierLopez,PierangelaSamarati,andJosepL.Ferrer,editors,EuroPKI,volume4582ofLectureNotesinComputerScience,pages354–361,Berlin,Heidelberg,2007.Springer.NikitaBorisov.Computationalpuzzlesassybildefenses.InAlbertoMontresor,AdamWierzbicki,andNahidShahmehri,editors,Peer-to-PeerComputing,pages171–176,Washington,DC,USA,2006.IEEEComputerSociety.HaifengYu,PhillipB.Gibbons,andMichaelKaminsky.Towardanoptimalsocialnetworkdefenseagainstsybilattacks.InIndranilGuptaandRogerWattenhofer,editors,PODC,pages376–377.ACM,2007.HaifengYu,PhillipB.Gibbons,MichaelKaminsky,andFengXiao.Sybillimit:Anear-optimalsocialnetworkdefenseagainstsybilattacks.InIEEESymposiumonSecurityandPrivacy,pages3–17,Washington,DC,USA,2008.IEEEComputerSociety.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamFlaxman.SybilGuard:defendingagainstsybilattacksviasocialnetworks.InLuigiRizzo,ThomasE.Anderson,andNickMcKeown,editors,SIGCOMM,pages267–278,NewYork,NY,USA,2006.ACM.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamD.Flaxman.Sybilguard:defendingagainstsybilattacksviasocialnetworks.IEEE/ACMTrans.Netw.,16(3):576–589,2008.NguyenTran,JinyangLi,LakshminarayananSubramanian,andShermanS.M.Chow.Optimalsybil-resilientnodeadmissioncontrol.InThe30thIEEEInternationalConferenceonComputerCommunications(INFOCOM2011),Shanghai,P.R.China,2011.IEEE.ChrisLesniewski-LassandM.FransKaashoek.Whˉanau:Asybil-proofdistributedhashtable.In7thUSENIXSymposiumonNetworkDesignandImplementation,pages3–17,Berkeley,CA,USA,2010.USENIXAssociation.C.Lesniewski-Laas.ASybil-proofone-hopDHT.InProceedingsofthe1stworkshoponSocialnetworksystems,pages19–24,NewYork,NY,USA,2008.ACM.PaulF.Syverson,DavidM.Goldschlag,andMichaelG.Reed.Anonymousconnectionsandonionrouting.InIEEESymposiumonSecurityandPrivacy,pages44–54,Washington,DC,USA,1997.IEEEComputerSociety.PengWang,JamesTyra,EricChan-tin,TysonMalchow,DenisFooKune,andYongdaeKim.Attackingthekadnetwork,2009.B.N.Levine,C.Shields,andN.B.Margolin.Asurveyofsolutionstothesybilattack.Technicalreport,UniversityofMassachusettsAmherst,Amherst,MA,2006.RodrigoRodrigues,BarbaraLiskov,andLiubaShrira.Thedesignofarobustpeer-to-peersystem.In10thACMSIGOPSEuropeanWorkshop,pages1–10,NewYork,NY,USA,2002.ACM.JamesNewsome,ElaineShi,DawnSong,andAdrianPerrig.Thesybilattackinsensornetworks:analysis&defenses.InIPSN’04:Proceedingsofthe3rdinternationalsymposiumonInformationprocessinginsensornetworks,pages259–268,NewYork,NY,USA,2004.ACM.MichaelJ.FreedmanandRobertMorris.Tarzan:apeer-to-peeranonymizingnetworklayer.InVijayalakshmiAtluri,editor,ACMConferenceonComputerandCommunicationsSecurity,pages193–206,Washington,DC,USA,2002.ACM.FabrizioCornelli,ErnestoDamiani,SabrinaDeCapitanidiVimercati,StefanoParaboschi,andPierangelaSamarati.Choosingreputableserventsinap2pnetwork.InWWW,pages376–386,NewYork,NY,USA,2002.ACM.BrentByungHoonKang,EricChan-Tin,ChristopherP.Lee,JamesTyra,HunJeongKang,ChrisNunnery,ZachariahWadler,GregSinclair,NicholasHopper,DavidDagon,andYongdaeKim.Towardscompletenodeenumerationinapeer-to-peerbotnet.InWanqingLi,WillySusilo,UdayaKiranTupakula,ReihanehSafavi-Naini,andVijayVaradharajan,editors,ASIACCS,pages23–34,NewYork,NY,USA,2009.ACM.FrankLi,PrateekMittal,MatthewCaesar,andNikitaBorisov.Sybilcontrol:practicalsybildefensewithcomputationalpuzzles.InProceedingsoftheseventhACMworkshoponScalabletrustedcomputing,pages67–78.ACM,2012.LuisvonAhn,ManuelBlum,NicholasJ.HopperandJohnLangford.Captcha:Usinghardaiproblemsforsecurity.InEliBiham,editor,EUROCRYPT,volume2656ofLectureNotesinComputerScience,pages294–311,Berlin,Heidelberg,2003.Springer.JeffYanandAhmadSalahElAhmad.Breakingvisualcaptchaswithnaivepatternrecognitionalgorithms.InACSAC,pages279–291,Washington,DC,USA,2007.IEEEComputerSociety.N.Tran,B.Min,J.Li,andL.Subramanian.Sybil-resilientonlinecontentvoting.InNSDI,Berkeley,CA,USA,2009.USENIX.SergioMarti,PrasannaGanesan,andHectorGarcia-Molina.Dhtroutingusingsociallinks.InIPTPS,pages100–111,Washington,DC,USA,2004.IEEE.DanieleQuerciaandStephenHailes.Sybilattacksagainstmobileusers:friendsandfoestotherescue.InINFOCOM’10:Proceedingsofthe29thconferenceonInformationcommunications,pages336–340,Piscataway,NJ,USA,2010.IEEEPress.AbedelazizMohaisen,AaramYun,andYongdaeKim.Measuringthemixingtimeofsocialgraphs.InProceedingsofthe10thannualconferenceonInternetmeasurement,IMC’10,pages383–389,NewYork,NY,USA,2010.ACM.BimalViswanath,AnsleyPost,KrishnaP.Gummadi,andAlanMislove.Ananalysisofsocialnetwork-basedsybildefenses.InSIGCOMM,NewYork,NY,USA,August2010.ACM.GeorgeDanezisandPrateekMittal.SybilInfer:Detectingsybilnodesusingsocialnetworks.InThe16thAnnualNetwork&DistributedSystemSecurityConference,LectureNotesinComputerScience,Berlin,Heidelberg,2009.Springer-Verlag.AbedelazizMohaisen,HuyTran,NicholasHopper,andYongdaeKim.Understandingsocialnetworkspropertiesfortrustworthycomputing.InICDCSWorkshops,pages154–159.IEEE,2011.AbedelazizMohaisenandScottHollenbeck.Improvingsocialnetwork-basedsybildefensesbyaugmentingsocialgraphs.InWISA,2013.AbedelazizMohaisen,NicholasHopper,andYongdaeKim.Keepyourfriendsclose:Incorporatingtrustintosocialnetwork-basedsybildefenses.InINFOCOM,pages1943–1951.IEEE,2011.HaifengYu.Sybildefensesviasocialnetworks:atutorialandsurvey.ACMSIGACTNews,42(3):80–101,2011.

Chia Network向美SEC秘密提交擬議IPO的注冊聲明草案:金色財經報道,節能區塊鏈和智能交易平臺 Chia Network 宣布已向美國證券交易委員會(SEC)秘密提交一份關于 Form S-1 的注冊聲明草案,涉及其普通股的擬議首次公開發行(IPO),擬議發行的規模與價格范圍尚未確定。IPO 預計將在 SEC 完成審查程序后開始,具體取決于市場和其他條件。[2023/4/14 14:04:57]

法庭文件:Voyager和Binance.US交易需在4月13日之前得到解決:金色財經報道,根據周一提交的法律文件,如果美國政府提出的法律異議不能在4月13日之前得到解決,Voyager公司及其債權人將損失1億美元。這家破產的加密貨幣貸款機構正在采取緊急法律行動,讓幣安以10億美元的價格收購。

Voyager債權人在一份文件中表示,在4月13日之前完成該計劃對于維護巨大的債權人價值是必要的,如果交易未能完成,Voyager的債權人將損失大約1億美元的價值。

另外,根據最初于12月簽署并于3月獲得破產法官 Michael Wiles 批準的交易條款,如果協議未在四個月內完成,Binance.US 可以退出交易。[2023/4/4 13:44:15]

Nansen:過去30天超60億美元BUSD被銷毀:金色財經報道,Nansen分析師Andrew T在社交平臺表示,過去30天內超過60億美元BUSD被銷毀,相當于市值排名前20的加密貨幣,目前仍有110億美元BUSD流通,其中約97億美元存放于Binance。[2023/2/28 12:33:31]

騰訊成立“元宇宙”金融團隊:金色財經報道,從騰訊內部獲悉,騰訊云日前成立全真互聯金融團隊。據了解,該團隊將依托騰訊云實時音視頻TRTC、AI、數智人、云渲染、數字孿生等優勢產品能力,探索新一代金融場景全真交互解決方案,推動全真互聯在金融行業落地。[2023/1/18 11:19:04]

新加坡MAS希望培育數字資產,限制加密貨幣投機:金色財經報道,新加坡金融管理局(Monetary Authority of Singapore)局長Ravi Menon在演講中表示,新加坡央行希望在促進數字資產生態系統的同時,限制加密貨幣的價格投機,并表示價格投機是加密世界問題的根源。此外,還表示希望加強對該國散戶加密貨幣投資者的保護。

與此同時,MAS一直專注于促進數字資產生態系統發展,包括現金和債券等金融資產,藝術品和財產等實物資產,以及碳信用和計算資源等虛擬項目的代幣化。

此前消息,今年早些時候,在三箭資本(Three Arrows Capital)和vault等多家與新加坡有聯系的知名加密公司倒閉后,新加坡金管局和該國其他監管機構一直在試圖監管新加坡的加密領域。(CoinDesk)[2022/8/29 12:55:43]

Tags:ANDINGORKCOMsand幣未來價格預測Anonverse Gaming TokenPeerex Networkdefi community

BNB價格
API:一周融資速遞 | 一級市場活躍度持續下降;數據服務賽道熱度攀升(6.21-6.27)_ITA

經Odaily星球日報不完全統計,6月21日-6月27日當周公布的海內外區塊鏈融資事件共16起,連續兩周呈減少趨勢,已披露融資總額約4.56億美元,較上一周基本持平.

1900/1/1 0:00:00
DEFI:短期看跌中期看漲,DeFi 協議正適應新常態?_CokeFinance

Odaily星球日報譯者|Moni 閱讀延伸:《Messari二季度DeFi報告:DeFi正向全球開放金融體系大步邁進》隨著DeFi繼續下行,市場可能會進入一個短期看跌但中期看漲的狀態.

1900/1/1 0:00:00
比特幣:加密世界迎來升級季——BTC、ETH和Cardano的未來_cardano

如果有人能總結2021年加密界發生了什么,那就說明這一年一開始很順利,但到了年中,情況就變壞了.

1900/1/1 0:00:00
SYNBIT:目前依然是反彈,不是反轉,需認清當下局勢 丨行情分析_WOICH

BTC行情分析 先看兩則消息,然后再給大家破除一下幻想;“6月28日訊,據CME“美聯儲觀察”:美聯儲9月維持利率在0%-0.25%區間的概率為96.7%.

1900/1/1 0:00:00
NFT:為什么NBA如此青睞加密貨幣和NFT?_NFTNDR

NBA是最具前瞻性的職業體育聯盟之一,在區塊鏈和加密貨幣領域始終走在世界體育行業的前沿。上至聯盟,下至球員,NBA聯盟的加密色彩愈發濃厚:聯盟試圖透過NFT和加密貨幣投資改善收入結構;球隊希望借.

1900/1/1 0:00:00
Crust:波卡項目如何看待多鏈生態布局_CRU

Moonbeam登月宇航員 2021年6月21日的Moonbeam登月宇航員線上活動,我們很榮幸地邀請到了圓桌嘉賓MathWallet的EricYu.

1900/1/1 0:00:00
ads