Sybil attack

Results: 61



#Item
41

臺灣電腦網路危機處理暨協調中心 (TWCERT/CC) Sybil Attack(女巫攻擊) Sybil Attack 字面翻譯為女巫攻擊。是一種攻擊者透過大量匿名實體增加不成比 例的巨大影響,來破壞 P2

Add to Reading List

Source URL: www.cert.org.tw

Language: Korean - Date: 2014-12-18 10:30:16
    42Communications protocol / Data transmission / Protocols / Adversarial system / Social peer-to-peer processes / Sybil attack / Peer-to-peer / Adversary / Inference / Information / Data / Logic

    A Game-Theoretic Framework for Analyzing Trust-Inference Protocols Ruggero Morselli∗ Jonathan Katz∗

    Add to Reading List

    Source URL: www.cs.umd.edu

    Language: English - Date: 2004-06-01 10:54:35
    43Computing / Payment systems / Electronic commerce / Peer-to-peer / Electronic money / Sybil attack / Software / Bitcoin / Peer-to-peer computing

    On Bitcoin and Red Balloons MOSHE BABAIOFF Microsoft Research, Silicon Valley and SHAHAR DOBZINSKI Department of Computer Science, Cornell University

    Add to Reading List

    Source URL: www.sigecom.org

    Language: English - Date: 2011-12-19 04:27:42
    44Computer architecture / Kademlia / Chord / Pastry / Peer-to-peer / Sybil attack / Overlay network / Kad network / Distributed data storage / Computing / Distributed hash table

    This article (preprint) has been accepted for publication in a future issue of IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS. The official preprint is available at http://doi.ieeecomputersociety.org[removed]TPDS.

    Add to Reading List

    Source URL: www.cs.indiana.edu

    Language: English - Date: 2013-10-18 10:01:08
    45Distributed computing / File sharing / Distributed hash table / Reputation management / Peer-to-peer computing / Peer-to-peer / Sybil attack / Chord / Lookup table / Computing / Distributed data storage / Concurrent computing

    ReDS: Reputation for Directory Services in P2P Systems Ruj Akavipat† , Apurv Dhadphale‡ , Apu Kapadia† , Matthew Wright‡ † School of Informatics and Computing Indiana University Bloomington

    Add to Reading List

    Source URL: www.cs.indiana.edu

    Language: English - Date: 2010-09-14 17:16:16
    46Spamming / Internet ethics / Email / Reputation management / Sybil attack / Anonymity / Online identity / Pseudonymous remailer / Pseudonym / Internet / Computing / Internet privacy

    An Offline Foundation for Online Accountable Pseudonyms Bryan Ford Jacob Strauss

    Add to Reading List

    Source URL: pdos.csail.mit.edu

    Language: English - Date: 2014-09-23 03:33:34
    47Sybil attack / Denial-of-service attack / Adversary model / Adversary / Scalability / Electronic voting / System software / Distributed computing / Computing / LOCKSS / Peer-to-peer

    1 Impeding Attrition Attacks in P2P Systems Petros Maniatis TJ Giuli

    Add to Reading List

    Source URL: lockss.org

    Language: English - Date: 2011-01-02 18:55:49
    48Online chat / Internet privacy / Software / Anonymous post / Pseudonymity / Internet Relay Chat / Anonymizer / Tor / Sybil attack / Computing / Anonymity / Internet

    Hang With Your Buddies to Resist Intersection Attacks David Isaac Wolinsky, Ewa Syta, and Bryan Ford Yale University {david.wolinsky,ewa.syta,bryan.ford}@yale.edu

    Add to Reading List

    Source URL: dedis.cs.yale.edu

    Language: English - Date: 2013-08-27 00:18:21
    49Peer-to-peer / Denial-of-service attack / Scalability / Concurrent computing / Sybil attack / Poll /  Cologne / Distributed computing / File sharing networks / Computing / LOCKSS

    Attrition Defenses for a Peer-to-Peer Digital Preservation System TJ Giuli Stanford University, CA Petros Maniatis Intel Research, Berkeley, CA

    Add to Reading List

    Source URL: lockss.org

    Language: English - Date: 2011-05-12 17:00:33
    50Network theory / Reputation management / Sybil attack / Distributed data storage / Routing / Sybil / Distributed hash table / Shortest path problem / Flow network / Graph theory / Mathematics / Theoretical computer science

    Canal: Scaling Social Network-Based Sybil Tolerance Schemes Bimal Viswanath Mainack Mondal Krishna P. Gummadi

    Add to Reading List

    Source URL: www.mpi-sws.org

    Language: English - Date: 2012-02-26 12:45:40
    UPDATE