<--- Back to Details
First PageDocument Content
Distributed hash table / Kademlia / Peer-to-peer / Sybil attack / Statistics / Hash table / Subnetwork / Kullback–Leibler divergence / Distributed data storage / Computing / Network architecture
Date: 2010-06-21 05:56:10
Distributed hash table
Kademlia
Peer-to-peer
Sybil attack
Statistics
Hash table
Subnetwork
Kullback–Leibler divergence
Distributed data storage
Computing
Network architecture

Add to Reading List

Source URL: hal.inria.fr

Download Document from Source Website

File Size: 314,32 KB

Share Document on Facebook

Similar Documents

Computing / Internet / Network architecture / File sharing / Computer networking / Distributed computing architecture / Overlay network / Routing / Round-trip delay time / Peer-to-peer / Sybil attack / Tor

Secure Latency Estimation with Treeple Eric Chan-Tin and Nicholas Hopper University of Minnesota Minneapolis, MN USA {dchantin, hopper}@cs.umn.edu

DocID: 1qTuT - View Document

Distributed data storage / Computer network security / Reputation management / Sybil attack / Distributed hash table / Routing / Flow network / Distributed computing

Canal: Scaling Social Network-Based Sybil Tolerance Schemes Bimal Viswanath Mainack Mondal Krishna P. Gummadi

DocID: 1pGTf - View Document

File sharing / Reputation management / Distributed data storage / Peer-to-peer computing / Peer-to-peer / EigenTrust / Sybil attack / Social peer-to-peer processes / Distributed hash table / Reputation system / Distributed computing / Anonymous P2P

Taxonomy of Trust: Categorizing P2P Reputation Systems ! Sergio Marti and Hector Garcia-Molina Stanford University {smarti, hector}cs.stanford.edu

DocID: 1pqPT - View Document

Computer network security / Reputation management / Sybil attack / Distributed data storage / Cryptocurrencies / Networks / Reputation system / Sibyl / Distributed hash table / Sybil / Dash / Community structure

Exploring the design space of social network-based Sybil defenses Bimal Viswanath∗, Mainack Mondal∗ , Allen Clement∗, Peter Druschel∗, Krishna P. Gummadi∗ , Alan Mislove†, and Ansley Post∗ ∗ Max

DocID: 1ozfr - View Document

Computer network security / Reputation management / Sybil attack / Yelp / Sibyl / Sybil

Strength in Numbers: Robust Tamper Detection in Crowd Computations Bimal Viswanath MPI-SWS

DocID: 1ooNd - View Document