<--- Back to Details
First PageDocument Content
Computing / Distributed data storage / Concurrent computing / File sharing / Distributed computing architecture / Network architecture / Dark web / Distributed hash table / Freenet / Sybil attack / Kademlia / Overlay network
Date: 2009-08-11 22:57:58
Computing
Distributed data storage
Concurrent computing
File sharing
Distributed computing architecture
Network architecture
Dark web
Distributed hash table
Freenet
Sybil attack
Kademlia
Overlay network

Add to Reading List

Source URL: www-users.cs.umn.edu

Download Document from Source Website

File Size: 524,86 KB

Share Document on Facebook

Similar Documents

Computing / Internet / Network architecture / File sharing / Computer networking / Distributed computing architecture / Overlay network / Routing / Round-trip delay time / Peer-to-peer / Sybil attack / Tor

Secure Latency Estimation with Treeple Eric Chan-Tin and Nicholas Hopper University of Minnesota Minneapolis, MN USA {dchantin, hopper}@cs.umn.edu

DocID: 1qTuT - View Document

Distributed data storage / Computer network security / Reputation management / Sybil attack / Distributed hash table / Routing / Flow network / Distributed computing

Canal: Scaling Social Network-Based Sybil Tolerance Schemes Bimal Viswanath Mainack Mondal Krishna P. Gummadi

DocID: 1pGTf - View Document

File sharing / Reputation management / Distributed data storage / Peer-to-peer computing / Peer-to-peer / EigenTrust / Sybil attack / Social peer-to-peer processes / Distributed hash table / Reputation system / Distributed computing / Anonymous P2P

Taxonomy of Trust: Categorizing P2P Reputation Systems ! Sergio Marti and Hector Garcia-Molina Stanford University {smarti, hector}cs.stanford.edu

DocID: 1pqPT - View Document

Computer network security / Reputation management / Sybil attack / Distributed data storage / Cryptocurrencies / Networks / Reputation system / Sibyl / Distributed hash table / Sybil / Dash / Community structure

Exploring the design space of social network-based Sybil defenses Bimal Viswanath∗, Mainack Mondal∗ , Allen Clement∗, Peter Druschel∗, Krishna P. Gummadi∗ , Alan Mislove†, and Ansley Post∗ ∗ Max

DocID: 1ozfr - View Document

Computer network security / Reputation management / Sybil attack / Yelp / Sibyl / Sybil

Strength in Numbers: Robust Tamper Detection in Crowd Computations Bimal Viswanath MPI-SWS

DocID: 1ooNd - View Document