比特幣交易所 比特幣交易所
Ctrl+D 比特幣交易所
ads
首頁 > 屎幣 > Info

女巫攻擊及防御方式詳解_ING

Author:

Time:1900/1/1 0:00:00

參考文獻:GeorgeDanezis,ChrisLesniewski-laas,M.FransKaashoek,andRossAnderson.Sybil-resistantdhtrouting.InInESORICS,LectureNotesinComputerScience,pages305–318,Berlin,Heidelberg,2005.Springer.PetarMaymounkovandDavidMazi`eres.Kademlia:Apeer-to-peerinformationsystembasedonthexormetric.InPeterDruschel,M.FransKaashoek,andAntonyI.T.Rowstron,editors,IPTPS,LectureNotesinComputerScience,pages53–65,Berlin,Heidelberg,2002.Springer.IonStoica,RobertMorris,DavidR.Karger,M.FransKaashoek,andHariBalakrishnan.Chord:Ascalablepeer-to-peerlookupserviceforinternetapplications.InSIGCOMM,pages149–160,NewYork,NY,USA,2001.ACM.YongWang,XiaochunYun,andYifeiLi.Analyzingthecharacteristicsofgnutellaoverlays.InITNG,pages1095–1100,Washington,DC,USA,2007.IEEEComputerSociety.VivekPathakandLiviuIftode.Byzantinefaulttolerantpublickeyauthenticationinpeer-to-peersystems.ComputerNetworks,50(4):579–596,2006.JohnDouceurandJudithS.Donath.Thesybilattack.InIPDPS,pages251–260,Washington,DC,USA,2002.IEEE.HaifengYu,ChenweiShi,MichaelKaminsky,PhillipB.Gibbons,andFengXiao.Dsybil:Optimalsybil-resistanceforrecommendationsystems.InIEEESymposiumonSecurityandPrivacy,pages283–298,Washington,DC,USA,May2009.IEEEComputerSociety.MiguelCastro,PeterDruschel,AyalvadiJ.Ganesh,AntonyI.T.Rowstron,andDanS.Wallach.Secureroutingforstructuredpeer-to-peeroverlaynetworks.InOSDI,Berkeley,CA,USA,2002.USENIXAssociation.AtulAdya,WilliamJ.Bolosky,MiguelCastro,GeraldCermak,RonnieChaiken,JohnR.Douceur,JonHowell,JacobR.Lorch,MarvinTheimer,andRogerWattenhofer.Farsite:Federated,available,andreliablestorageforanincompletelytrustedenvironment.InOSDI,NewYork,NY,USA,2002.USENIXAssociation.JonathanLedlieandMargoI.Seltzer.Distributed,secureloadbalancingwithskew,heterogeneityandchurn.InINFOCOM,pages1419–1430,Washington,DC,USA,2005.IEEE.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Anefficientdistributedpkiforstructuredp2pnetworks.InProceedingofP2P,pages1–10,Washington,DC,USA,2009.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Adistributedcertificationsystemforstructuredp2pnetworks.InDavidHausheerandJ¨urgenSch¨onw¨alder,editors,AIMS,volume5127ofLectureNotesinComputerScience,pages40–52,Berlin,Heidelberg,2008.Springer.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybil-resistantadmissioncontrolcouplingsybilguardwithdistributedcertification.InWETICE,pages105–110,Washington,DC,USA,2008.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybilproofdistributedidentitymanagementforp2pnetworks.InISCC,pages246–253,Washington,DC,USA,2008.IEEE.AgapiosAvramidis,PanayiotisKotzanikolaou,andChristosDouligeris.Chord-pki:Embeddingapublickeyinfrastructureintothechordoverlaynetwork.InJavierLopez,PierangelaSamarati,andJosepL.Ferrer,editors,EuroPKI,volume4582ofLectureNotesinComputerScience,pages354–361,Berlin,Heidelberg,2007.Springer.NikitaBorisov.Computationalpuzzlesassybildefenses.InAlbertoMontresor,AdamWierzbicki,andNahidShahmehri,editors,Peer-to-PeerComputing,pages171–176,Washington,DC,USA,2006.IEEEComputerSociety.HaifengYu,PhillipB.Gibbons,andMichaelKaminsky.Towardanoptimalsocialnetworkdefenseagainstsybilattacks.InIndranilGuptaandRogerWattenhofer,editors,PODC,pages376–377.ACM,2007.HaifengYu,PhillipB.Gibbons,MichaelKaminsky,andFengXiao.Sybillimit:Anear-optimalsocialnetworkdefenseagainstsybilattacks.InIEEESymposiumonSecurityandPrivacy,pages3–17,Washington,DC,USA,2008.IEEEComputerSociety.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamFlaxman.SybilGuard:defendingagainstsybilattacksviasocialnetworks.InLuigiRizzo,ThomasE.Anderson,andNickMcKeown,editors,SIGCOMM,pages267–278,NewYork,NY,USA,2006.ACM.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamD.Flaxman.Sybilguard:defendingagainstsybilattacksviasocialnetworks.IEEE/ACMTrans.Netw.,16(3):576–589,2008.NguyenTran,JinyangLi,LakshminarayananSubramanian,andShermanS.M.Chow.Optimalsybil-resilientnodeadmissioncontrol.InThe30thIEEEInternationalConferenceonComputerCommunications(INFOCOM2011),Shanghai,P.R.China,2011.IEEE.ChrisLesniewski-LassandM.FransKaashoek.Whˉanau:Asybil-proofdistributedhashtable.In7thUSENIXSymposiumonNetworkDesignandImplementation,pages3–17,Berkeley,CA,USA,2010.USENIXAssociation.C.Lesniewski-Laas.ASybil-proofone-hopDHT.InProceedingsofthe1stworkshoponSocialnetworksystems,pages19–24,NewYork,NY,USA,2008.ACM.PaulF.Syverson,DavidM.Goldschlag,andMichaelG.Reed.Anonymousconnectionsandonionrouting.InIEEESymposiumonSecurityandPrivacy,pages44–54,Washington,DC,USA,1997.IEEEComputerSociety.PengWang,JamesTyra,EricChan-tin,TysonMalchow,DenisFooKune,andYongdaeKim.Attackingthekadnetwork,2009.B.N.Levine,C.Shields,andN.B.Margolin.Asurveyofsolutionstothesybilattack.Technicalreport,UniversityofMassachusettsAmherst,Amherst,MA,2006.RodrigoRodrigues,BarbaraLiskov,andLiubaShrira.Thedesignofarobustpeer-to-peersystem.In10thACMSIGOPSEuropeanWorkshop,pages1–10,NewYork,NY,USA,2002.ACM.JamesNewsome,ElaineShi,DawnSong,andAdrianPerrig.Thesybilattackinsensornetworks:analysis&defenses.InIPSN’04:Proceedingsofthe3rdinternationalsymposiumonInformationprocessinginsensornetworks,pages259–268,NewYork,NY,USA,2004.ACM.MichaelJ.FreedmanandRobertMorris.Tarzan:apeer-to-peeranonymizingnetworklayer.InVijayalakshmiAtluri,editor,ACMConferenceonComputerandCommunicationsSecurity,pages193–206,Washington,DC,USA,2002.ACM.FabrizioCornelli,ErnestoDamiani,SabrinaDeCapitanidiVimercati,StefanoParaboschi,andPierangelaSamarati.Choosingreputableserventsinap2pnetwork.InWWW,pages376–386,NewYork,NY,USA,2002.ACM.BrentByungHoonKang,EricChan-Tin,ChristopherP.Lee,JamesTyra,HunJeongKang,ChrisNunnery,ZachariahWadler,GregSinclair,NicholasHopper,DavidDagon,andYongdaeKim.Towardscompletenodeenumerationinapeer-to-peerbotnet.InWanqingLi,WillySusilo,UdayaKiranTupakula,ReihanehSafavi-Naini,andVijayVaradharajan,editors,ASIACCS,pages23–34,NewYork,NY,USA,2009.ACM.FrankLi,PrateekMittal,MatthewCaesar,andNikitaBorisov.Sybilcontrol:practicalsybildefensewithcomputationalpuzzles.InProceedingsoftheseventhACMworkshoponScalabletrustedcomputing,pages67–78.ACM,2012.LuisvonAhn,ManuelBlum,NicholasJ.HopperandJohnLangford.Captcha:Usinghardaiproblemsforsecurity.InEliBiham,editor,EUROCRYPT,volume2656ofLectureNotesinComputerScience,pages294–311,Berlin,Heidelberg,2003.Springer.JeffYanandAhmadSalahElAhmad.Breakingvisualcaptchaswithnaivepatternrecognitionalgorithms.InACSAC,pages279–291,Washington,DC,USA,2007.IEEEComputerSociety.N.Tran,B.Min,J.Li,andL.Subramanian.Sybil-resilientonlinecontentvoting.InNSDI,Berkeley,CA,USA,2009.USENIX.SergioMarti,PrasannaGanesan,andHectorGarcia-Molina.Dhtroutingusingsociallinks.InIPTPS,pages100–111,Washington,DC,USA,2004.IEEE.DanieleQuerciaandStephenHailes.Sybilattacksagainstmobileusers:friendsandfoestotherescue.InINFOCOM’10:Proceedingsofthe29thconferenceonInformationcommunications,pages336–340,Piscataway,NJ,USA,2010.IEEEPress.AbedelazizMohaisen,AaramYun,andYongdaeKim.Measuringthemixingtimeofsocialgraphs.InProceedingsofthe10thannualconferenceonInternetmeasurement,IMC’10,pages383–389,NewYork,NY,USA,2010.ACM.BimalViswanath,AnsleyPost,KrishnaP.Gummadi,andAlanMislove.Ananalysisofsocialnetwork-basedsybildefenses.InSIGCOMM,NewYork,NY,USA,August2010.ACM.GeorgeDanezisandPrateekMittal.SybilInfer:Detectingsybilnodesusingsocialnetworks.InThe16thAnnualNetwork&DistributedSystemSecurityConference,LectureNotesinComputerScience,Berlin,Heidelberg,2009.Springer-Verlag.AbedelazizMohaisen,HuyTran,NicholasHopper,andYongdaeKim.Understandingsocialnetworkspropertiesfortrustworthycomputing.InICDCSWorkshops,pages154–159.IEEE,2011.AbedelazizMohaisenandScottHollenbeck.Improvingsocialnetwork-basedsybildefensesbyaugmentingsocialgraphs.InWISA,2013.AbedelazizMohaisen,NicholasHopper,andYongdaeKim.Keepyourfriendsclose:Incorporatingtrustintosocialnetwork-basedsybildefenses.InINFOCOM,pages1943–1951.IEEE,2011.HaifengYu.Sybildefensesviasocialnetworks:atutorialandsurvey.ACMSIGACTNews,42(3):80–101,2011.

貝萊德高管:重點關注代幣化及其與Circle的合作關系:金色財經報道,貝萊德戰略生態系統合作關系負責人Joseph Chalom認為,短期內機構對代幣化的采用可能比預期的要慢,但從長遠來看,它將對塑造我們的生態系統產生巨大影響。Chalom周四在紐約的一個活動上表示,“我們需要與優秀的參與者合作,有了良好的基礎設施,這就會自我強化,然后資金和采用就會到來。貝萊德一直在與傳統和加密原生客戶進行大量對話,重點是代幣化及其與Circle的合作伙伴關系。他補充說,該行業需要圍繞某些資產進行整合,并優先考慮實際用例。”[2023/6/23 21:56:04]

美股漲跌不一 美股地區性銀行股多數走高:金色財經報道,美股漲跌不一,道指開漲約40點,納指開跌0.03%,標普500指數開漲0.1%。美股地區性銀行股多數走高,西太平洋合眾銀行(PACW.O)漲27%,阿萊恩斯西部銀行(WAL.N)漲超10%,第一公民銀行股份(FCNCA.O)漲超7%。[2023/5/9 14:50:38]

Kraken向加拿大安大略省證券委員會提交預注冊文件,承諾遵守更嚴格的規則:金色財經報道,加密交易所 Kraken 已向加拿大安大略省證券委員會提交了預注冊承諾,并承諾遵守該國金融監管機構加拿大證券管理局 (CSA) 制定的更嚴格規定。Kraken 已為加拿大客戶服務超過 10 年,并在加拿大擁有超過 250 名團隊成員。自 2019 年以來,該交易所已在加拿大金融交易和報告分析中心(FINTRAC)注冊為加拿大貨幣服務企業。[2023/3/30 13:35:55]

IG Group成立Web3子公司并推出自托管數字錢包:12月2日消息,金融經紀公司及衍生品交易商IG Group宣布推出專注于數字資產、Web3和DeFi的軟件技術公司tasty Software Solutions, LLC,并且發布了首款產品:支持比特幣和以太坊網絡的自托管區塊鏈錢包,讓用戶能夠控制自己的數字資產,包括加密貨幣、代幣和NFT。此外,該錢包還支持用戶使用許可第三方支付提供資金,在鏈上兌換代幣,也可以使用經紀賬戶將加密貨幣轉移到錢包。(financefeeds)[2022/12/2 21:16:44]

ETH主網用戶必須在9月6日之前將客戶端Teku升級到v22.81:金色財經報道,Watcher.Guru發推表示,ETH主網用戶必須在 9 月 6 日之前將客戶端 Teku 升級到 v22.81,其中包括合并轉換配置。[2022/8/22 12:41:20]

Tags:ANDINGORKCOMpowercandyDeFi KingdomCeler NetworkSAFECOM幣

屎幣
Circle在數字金融世界的探索:一路坎坷,終覓USDC_CIR

「一個人生命中的最大幸運,莫過于在他的人生中途,即在他年富力強時發現了自己生活的使命。」茨威格在《人類群星閃耀時》中如此寫道.

1900/1/1 0:00:00
【Deribit期權市場播報】0727——十億成交_OLV

收錄于話題#每日期權播報播報數據由Greeks.live格致數據實驗室和Deribit官網提供。今天比特幣期權成交量暴漲,總成交金額高達13億美元,持倉量也逼近60億刀.

1900/1/1 0:00:00
薩爾瓦多將購買1.35億美元比特幣,并向全民發放, 9月7日正式流通_比特幣

本文轉自比特幣之家,星球日報經授權轉載薩爾瓦多總統曾表示,政府將向每位公民提供30美元比特幣。并于今年9月7日正式采用比特幣作為法定貨幣,那時估計有450萬成年公民.

1900/1/1 0:00:00
Solana Season Hackathon Asia獲獎項目&人氣項目一覽_SOL

7月2日,SolanaSeasonHackathon亞洲賽區在DoraHacks開發者平臺HackerLink完成二次方投票,并立即進入寬限期.

1900/1/1 0:00:00
權益NFT去中心化交易平臺CHAIR能帶領NTF出圈嗎?_NFT

縱觀NFT的發展歷程:從2012年的一篇博文討論“coloredcoin”開始到2017年CryptoKitties游戲的出現,將NFT應用到游戲上推向了主流市場.

1900/1/1 0:00:00
Web3.0 橋梁構建之旅:圖解Mask Network生態全景_MASK

撰文:錢自宜DeFi的爆發為加密貨幣市場乃至區塊鏈技術帶來了前所未有的活力,「去中心化」與「金融」有機結合讓市場切實體驗到了加密世界的魅力,不過隨著DeFi逐漸走向成熟.

1900/1/1 0:00:00
ads