木星链 木星链
Ctrl+D收藏木星链
首页 > 非小号 > 正文

AND:女巫攻击及防御方式详解

作者:

时间:1900/1/1 0:00:00

参考文献:GeorgeDanezis,ChrisLesniewski-laas,M.FransKaashoek,andRossAnderson.Sybil-resistantdhtrouting.InInESORICS,LectureNotesinComputerScience,pages305–318,Berlin,Heidelberg,2005.Springer.PetarMaymounkovandDavidMazi`eres.Kademlia:Apeer-to-peerinformationsystembasedonthexormetric.InPeterDruschel,M.FransKaashoek,andAntonyI.T.Rowstron,editors,IPTPS,LectureNotesinComputerScience,pages53–65,Berlin,Heidelberg,2002.Springer.IonStoica,RobertMorris,DavidR.Karger,M.FransKaashoek,andHariBalakrishnan.Chord:Ascalablepeer-to-peerlookupserviceforinternetapplications.InSIGCOMM,pages149–160,NewYork,NY,USA,2001.ACM.YongWang,XiaochunYun,andYifeiLi.Analyzingthecharacteristicsofgnutellaoverlays.InITNG,pages1095–1100,Washington,DC,USA,2007.IEEEComputerSociety.VivekPathakandLiviuIftode.Byzantinefaulttolerantpublickeyauthenticationinpeer-to-peersystems.ComputerNetworks,50(4):579–596,2006.JohnDouceurandJudithS.Donath.Thesybilattack.InIPDPS,pages251–260,Washington,DC,USA,2002.IEEE.HaifengYu,ChenweiShi,MichaelKaminsky,PhillipB.Gibbons,andFengXiao.Dsybil:Optimalsybil-resistanceforrecommendationsystems.InIEEESymposiumonSecurityandPrivacy,pages283–298,Washington,DC,USA,May2009.IEEEComputerSociety.MiguelCastro,PeterDruschel,AyalvadiJ.Ganesh,AntonyI.T.Rowstron,andDanS.Wallach.Secureroutingforstructuredpeer-to-peeroverlaynetworks.InOSDI,Berkeley,CA,USA,2002.USENIXAssociation.AtulAdya,WilliamJ.Bolosky,MiguelCastro,GeraldCermak,RonnieChaiken,JohnR.Douceur,JonHowell,JacobR.Lorch,MarvinTheimer,andRogerWattenhofer.Farsite:Federated,available,andreliablestorageforanincompletelytrustedenvironment.InOSDI,NewYork,NY,USA,2002.USENIXAssociation.JonathanLedlieandMargoI.Seltzer.Distributed,secureloadbalancingwithskew,heterogeneityandchurn.InINFOCOM,pages1419–1430,Washington,DC,USA,2005.IEEE.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Anefficientdistributedpkiforstructuredp2pnetworks.InProceedingofP2P,pages1–10,Washington,DC,USA,2009.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Adistributedcertificationsystemforstructuredp2pnetworks.InDavidHausheerandJ¨urgenSch¨onw¨alder,editors,AIMS,volume5127ofLectureNotesinComputerScience,pages40–52,Berlin,Heidelberg,2008.Springer.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybil-resistantadmissioncontrolcouplingsybilguardwithdistributedcertification.InWETICE,pages105–110,Washington,DC,USA,2008.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybilproofdistributedidentitymanagementforp2pnetworks.InISCC,pages246–253,Washington,DC,USA,2008.IEEE.AgapiosAvramidis,PanayiotisKotzanikolaou,andChristosDouligeris.Chord-pki:Embeddingapublickeyinfrastructureintothechordoverlaynetwork.InJavierLopez,PierangelaSamarati,andJosepL.Ferrer,editors,EuroPKI,volume4582ofLectureNotesinComputerScience,pages354–361,Berlin,Heidelberg,2007.Springer.NikitaBorisov.Computationalpuzzlesassybildefenses.InAlbertoMontresor,AdamWierzbicki,andNahidShahmehri,editors,Peer-to-PeerComputing,pages171–176,Washington,DC,USA,2006.IEEEComputerSociety.HaifengYu,PhillipB.Gibbons,andMichaelKaminsky.Towardanoptimalsocialnetworkdefenseagainstsybilattacks.InIndranilGuptaandRogerWattenhofer,editors,PODC,pages376–377.ACM,2007.HaifengYu,PhillipB.Gibbons,MichaelKaminsky,andFengXiao.Sybillimit:Anear-optimalsocialnetworkdefenseagainstsybilattacks.InIEEESymposiumonSecurityandPrivacy,pages3–17,Washington,DC,USA,2008.IEEEComputerSociety.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamFlaxman.SybilGuard:defendingagainstsybilattacksviasocialnetworks.InLuigiRizzo,ThomasE.Anderson,andNickMcKeown,editors,SIGCOMM,pages267–278,NewYork,NY,USA,2006.ACM.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamD.Flaxman.Sybilguard:defendingagainstsybilattacksviasocialnetworks.IEEE/ACMTrans.Netw.,16(3):576–589,2008.NguyenTran,JinyangLi,LakshminarayananSubramanian,andShermanS.M.Chow.Optimalsybil-resilientnodeadmissioncontrol.InThe30thIEEEInternationalConferenceonComputerCommunications(INFOCOM2011),Shanghai,P.R.China,2011.IEEE.ChrisLesniewski-LassandM.FransKaashoek.Whˉanau:Asybil-proofdistributedhashtable.In7thUSENIXSymposiumonNetworkDesignandImplementation,pages3–17,Berkeley,CA,USA,2010.USENIXAssociation.C.Lesniewski-Laas.ASybil-proofone-hopDHT.InProceedingsofthe1stworkshoponSocialnetworksystems,pages19–24,NewYork,NY,USA,2008.ACM.PaulF.Syverson,DavidM.Goldschlag,andMichaelG.Reed.Anonymousconnectionsandonionrouting.InIEEESymposiumonSecurityandPrivacy,pages44–54,Washington,DC,USA,1997.IEEEComputerSociety.PengWang,JamesTyra,EricChan-tin,TysonMalchow,DenisFooKune,andYongdaeKim.Attackingthekadnetwork,2009.B.N.Levine,C.Shields,andN.B.Margolin.Asurveyofsolutionstothesybilattack.Technicalreport,UniversityofMassachusettsAmherst,Amherst,MA,2006.RodrigoRodrigues,BarbaraLiskov,andLiubaShrira.Thedesignofarobustpeer-to-peersystem.In10thACMSIGOPSEuropeanWorkshop,pages1–10,NewYork,NY,USA,2002.ACM.JamesNewsome,ElaineShi,DawnSong,andAdrianPerrig.Thesybilattackinsensornetworks:analysis&defenses.InIPSN’04:Proceedingsofthe3rdinternationalsymposiumonInformationprocessinginsensornetworks,pages259–268,NewYork,NY,USA,2004.ACM.MichaelJ.FreedmanandRobertMorris.Tarzan:apeer-to-peeranonymizingnetworklayer.InVijayalakshmiAtluri,editor,ACMConferenceonComputerandCommunicationsSecurity,pages193–206,Washington,DC,USA,2002.ACM.FabrizioCornelli,ErnestoDamiani,SabrinaDeCapitanidiVimercati,StefanoParaboschi,andPierangelaSamarati.Choosingreputableserventsinap2pnetwork.InWWW,pages376–386,NewYork,NY,USA,2002.ACM.BrentByungHoonKang,EricChan-Tin,ChristopherP.Lee,JamesTyra,HunJeongKang,ChrisNunnery,ZachariahWadler,GregSinclair,NicholasHopper,DavidDagon,andYongdaeKim.Towardscompletenodeenumerationinapeer-to-peerbotnet.InWanqingLi,WillySusilo,UdayaKiranTupakula,ReihanehSafavi-Naini,andVijayVaradharajan,editors,ASIACCS,pages23–34,NewYork,NY,USA,2009.ACM.FrankLi,PrateekMittal,MatthewCaesar,andNikitaBorisov.Sybilcontrol:practicalsybildefensewithcomputationalpuzzles.InProceedingsoftheseventhACMworkshoponScalabletrustedcomputing,pages67–78.ACM,2012.LuisvonAhn,ManuelBlum,NicholasJ.HopperandJohnLangford.Captcha:Usinghardaiproblemsforsecurity.InEliBiham,editor,EUROCRYPT,volume2656ofLectureNotesinComputerScience,pages294–311,Berlin,Heidelberg,2003.Springer.JeffYanandAhmadSalahElAhmad.Breakingvisualcaptchaswithnaivepatternrecognitionalgorithms.InACSAC,pages279–291,Washington,DC,USA,2007.IEEEComputerSociety.N.Tran,B.Min,J.Li,andL.Subramanian.Sybil-resilientonlinecontentvoting.InNSDI,Berkeley,CA,USA,2009.USENIX.SergioMarti,PrasannaGanesan,andHectorGarcia-Molina.Dhtroutingusingsociallinks.InIPTPS,pages100–111,Washington,DC,USA,2004.IEEE.DanieleQuerciaandStephenHailes.Sybilattacksagainstmobileusers:friendsandfoestotherescue.InINFOCOM’10:Proceedingsofthe29thconferenceonInformationcommunications,pages336–340,Piscataway,NJ,USA,2010.IEEEPress.AbedelazizMohaisen,AaramYun,andYongdaeKim.Measuringthemixingtimeofsocialgraphs.InProceedingsofthe10thannualconferenceonInternetmeasurement,IMC’10,pages383–389,NewYork,NY,USA,2010.ACM.BimalViswanath,AnsleyPost,KrishnaP.Gummadi,andAlanMislove.Ananalysisofsocialnetwork-basedsybildefenses.InSIGCOMM,NewYork,NY,USA,August2010.ACM.GeorgeDanezisandPrateekMittal.SybilInfer:Detectingsybilnodesusingsocialnetworks.InThe16thAnnualNetwork&DistributedSystemSecurityConference,LectureNotesinComputerScience,Berlin,Heidelberg,2009.Springer-Verlag.AbedelazizMohaisen,HuyTran,NicholasHopper,andYongdaeKim.Understandingsocialnetworkspropertiesfortrustworthycomputing.InICDCSWorkshops,pages154–159.IEEE,2011.AbedelazizMohaisenandScottHollenbeck.Improvingsocialnetwork-basedsybildefensesbyaugmentingsocialgraphs.InWISA,2013.AbedelazizMohaisen,NicholasHopper,andYongdaeKim.Keepyourfriendsclose:Incorporatingtrustintosocialnetwork-basedsybildefenses.InINFOCOM,pages1943–1951.IEEE,2011.HaifengYu.Sybildefensesviasocialnetworks:atutorialandsurvey.ACMSIGACTNews,42(3):80–101,2011.

18,657 ETH从Binance转移到未知钱包:金色财经报道,数据显示,18,657 ETH (价值约33,295,276 美元) 从Binance转移到未知钱包。[2023/3/19 13:12:33]

加拿大加密新法规要求交易平台遵守投资者保护承诺:金色财经报道,加拿大证券管理局周三公布了当地加密货币行业的新指南,警告交易所和其他平台必须遵守 \"加强投资者保护承诺\"。

根据一份新闻稿,希望在加拿大运营的公司必须通过预注册程序做出这些承诺,同时致力于他们的实际注册。他们有30天的时间来遵守。在这个预注册过程中,交易所和其他公司将必须遵守托管规则,其中讨论了隔离为当地客户持有的加密货币资产,禁止保证金或其他形式的杠杆,以及禁止未经CSA许可出售稳定币。[2023/2/23 12:23:44]

Cumberland DRW交易主管:2023年加密市场将会复苏:金色财经报道,加密货币交易公司Cumberland DRW交易主管Jonah Van Bourg表示,在俄罗斯放松管制以及主要科技公司继续采用区块链技术之后,他预计比特币明年最终会出现上升趋势。

Van Bourg表示,最近在经历了非常复杂的一个月之后,加密货币价格走势正在巩固,鉴于加密货币的性质及其背后发生的构造变化,我们预计目前这种情况不会持续下去。”[2022/12/13 21:40:46]

外媒:Mutant Ape #30005以2300ETH(391万美元)售出:8月11日消息,Mutant Ape #30005(Trippy Mega Mutant Bored Ape)已经以2300ETH(391万美元)的价格售出,买家是@Lior.Eth,卖家为NFT收藏家@0xb1。

据悉,Mutant Ape #30005之所以珍贵有几个原因,首先,它可能是现存最不寻常的猿类;此外,这只变异猿是使用极为罕见的Mega药水制成的,今年二月Trippy Mega Mutant Ape #30005的原始持有者@0xb1 使用最后剩下的一个Mega药水创造了该变异猿。(NFTEvening)[2022/8/11 12:19:12]

路易斯安那州考虑采用加密货币:金色财经报道,根据位于路易斯安那州拉斐特的地区性报纸 The Daily Advertiser的一份报告,美国人口第 25 大的州正在创建一个加密货币采用委员会。路易斯安那州州众议员马克赖特提出了一项成立委员会的决议,在获得众议院拨款委员会的批准后,它必须在全院通过后才能进入路易斯安那州参议院。赖特还提出了一项法案,允许政客接受加密货币的竞选捐款。这位共和党议员认为,路易斯安那州可能成为加密领域的开拓者。(u.today)[2022/5/19 3:28:25]

标签:ANDINGORKCOMMANDOX币boring币值得投资吗Bumono NetworkCommercium

非小号热门资讯
YGG:Axie最大公会YGG今日IDO:Play to Earn模式中的DAO

作者:方沁雨如果你在追赶P2E的风潮,正为没有抓住AxieInfinity感到懊恼,那么关注YieldGuildGames可能是一个机会.

1900/1/1 0:00:00
比特币:矿业上演哭笑不得一幕, 「水电厂」竟然卖到闲鱼上

来源:财联社;作者:姜樊原标题:《国内虚拟货币“挖矿”产业上演“大逃亡”“水电厂”竟然卖到闲鱼上!》除了卖银行股权,闲鱼上还能卖什么?近日,财联社记者注意到,在闲鱼二手转让平台上.

1900/1/1 0:00:00
ROLL:从长远来看,Rollup如何赢过Polygon和BSC?

在过去6个月中,以太坊上最大的事便是交易需求的爆炸。交易费用已经超过了历史最高水平,导致许多日常用户现在已经不愿意使用以太坊了.

1900/1/1 0:00:00
SEC:【Deribit期权市场播报】0731——ETH2600

播报数据由Greeks.live格致数据实验室和Deribit官网提供。今天以太坊大宗看涨成交爆发式增长,39600张成交,占比28%,这个大宗成交量接近历史最高水平.

1900/1/1 0:00:00
DYDX:Layer 2加持下的去中心化衍生品解决方案,能否再次撼动中心化交易所地位?

传统金融世界中金融衍生品根据产品的形态分为以下几类:远期合约、期货合约、期权合约以及掉期合约。而其对应的原生资产又分为股票、利率、货币与商品.

1900/1/1 0:00:00
EFI:一文理解总锁仓价值(TVL)指标

DeFi已经成了业内最热议的话题之一,每月都有数十个新的DeFi项目启动。DeFi应用使得创建能够自动执行的金融合约成为可能。总的来说,这些合约有利于促进密码学资产的发行、借贷、交易和管理.

1900/1/1 0:00:00