Back to Results
First PageMeta Content
Sybil attack / Chord / Peer-to-peer / Tapestry / Pastry / Computer cluster / Distributed computing / Vanish / Node / Distributed data storage / Computing / Distributed hash table


SybilControl: Practical Sybil Defense with Computational Puzzles Frank Li1 Prateek Mittal2
Add to Reading List

Document Date: 2013-09-14 01:52:05


Open Document

File Size: 282,52 KB

Share Result on Facebook
UPDATE