火星链 火星链
Ctrl+D收藏火星链
首页 > 莱特币 > 正文

COM:女巫攻击及防御方式详解

作者:

时间:1900/1/1 0:00:00

参考文献:GeorgeDanezis,ChrisLesniewski-laas,M.FransKaashoek,andRossAnderson.Sybil-resistantdhtrouting.InInESORICS,LectureNotesinComputerScience,pages305–318,Berlin,Heidelberg,2005.Springer.PetarMaymounkovandDavidMazi`eres.Kademlia:Apeer-to-peerinformationsystembasedonthexormetric.InPeterDruschel,M.FransKaashoek,andAntonyI.T.Rowstron,editors,IPTPS,LectureNotesinComputerScience,pages53–65,Berlin,Heidelberg,2002.Springer.IonStoica,RobertMorris,DavidR.Karger,M.FransKaashoek,andHariBalakrishnan.Chord:Ascalablepeer-to-peerlookupserviceforinternetapplications.InSIGCOMM,pages149–160,NewYork,NY,USA,2001.ACM.YongWang,XiaochunYun,andYifeiLi.Analyzingthecharacteristicsofgnutellaoverlays.InITNG,pages1095–1100,Washington,DC,USA,2007.IEEEComputerSociety.VivekPathakandLiviuIftode.Byzantinefaulttolerantpublickeyauthenticationinpeer-to-peersystems.ComputerNetworks,50(4):579–596,2006.JohnDouceurandJudithS.Donath.Thesybilattack.InIPDPS,pages251–260,Washington,DC,USA,2002.IEEE.HaifengYu,ChenweiShi,MichaelKaminsky,PhillipB.Gibbons,andFengXiao.Dsybil:Optimalsybil-resistanceforrecommendationsystems.InIEEESymposiumonSecurityandPrivacy,pages283–298,Washington,DC,USA,May2009.IEEEComputerSociety.MiguelCastro,PeterDruschel,AyalvadiJ.Ganesh,AntonyI.T.Rowstron,andDanS.Wallach.Secureroutingforstructuredpeer-to-peeroverlaynetworks.InOSDI,Berkeley,CA,USA,2002.USENIXAssociation.AtulAdya,WilliamJ.Bolosky,MiguelCastro,GeraldCermak,RonnieChaiken,JohnR.Douceur,JonHowell,JacobR.Lorch,MarvinTheimer,andRogerWattenhofer.Farsite:Federated,available,andreliablestorageforanincompletelytrustedenvironment.InOSDI,NewYork,NY,USA,2002.USENIXAssociation.JonathanLedlieandMargoI.Seltzer.Distributed,secureloadbalancingwithskew,heterogeneityandchurn.InINFOCOM,pages1419–1430,Washington,DC,USA,2005.IEEE.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Anefficientdistributedpkiforstructuredp2pnetworks.InProceedingofP2P,pages1–10,Washington,DC,USA,2009.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Adistributedcertificationsystemforstructuredp2pnetworks.InDavidHausheerandJ¨urgenSch¨onw¨alder,editors,AIMS,volume5127ofLectureNotesinComputerScience,pages40–52,Berlin,Heidelberg,2008.Springer.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybil-resistantadmissioncontrolcouplingsybilguardwithdistributedcertification.InWETICE,pages105–110,Washington,DC,USA,2008.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybilproofdistributedidentitymanagementforp2pnetworks.InISCC,pages246–253,Washington,DC,USA,2008.IEEE.AgapiosAvramidis,PanayiotisKotzanikolaou,andChristosDouligeris.Chord-pki:Embeddingapublickeyinfrastructureintothechordoverlaynetwork.InJavierLopez,PierangelaSamarati,andJosepL.Ferrer,editors,EuroPKI,volume4582ofLectureNotesinComputerScience,pages354–361,Berlin,Heidelberg,2007.Springer.NikitaBorisov.Computationalpuzzlesassybildefenses.InAlbertoMontresor,AdamWierzbicki,andNahidShahmehri,editors,Peer-to-PeerComputing,pages171–176,Washington,DC,USA,2006.IEEEComputerSociety.HaifengYu,PhillipB.Gibbons,andMichaelKaminsky.Towardanoptimalsocialnetworkdefenseagainstsybilattacks.InIndranilGuptaandRogerWattenhofer,editors,PODC,pages376–377.ACM,2007.HaifengYu,PhillipB.Gibbons,MichaelKaminsky,andFengXiao.Sybillimit:Anear-optimalsocialnetworkdefenseagainstsybilattacks.InIEEESymposiumonSecurityandPrivacy,pages3–17,Washington,DC,USA,2008.IEEEComputerSociety.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamFlaxman.SybilGuard:defendingagainstsybilattacksviasocialnetworks.InLuigiRizzo,ThomasE.Anderson,andNickMcKeown,editors,SIGCOMM,pages267–278,NewYork,NY,USA,2006.ACM.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamD.Flaxman.Sybilguard:defendingagainstsybilattacksviasocialnetworks.IEEE/ACMTrans.Netw.,16(3):576–589,2008.NguyenTran,JinyangLi,LakshminarayananSubramanian,andShermanS.M.Chow.Optimalsybil-resilientnodeadmissioncontrol.InThe30thIEEEInternationalConferenceonComputerCommunications(INFOCOM2011),Shanghai,P.R.China,2011.IEEE.ChrisLesniewski-LassandM.FransKaashoek.Whˉanau:Asybil-proofdistributedhashtable.In7thUSENIXSymposiumonNetworkDesignandImplementation,pages3–17,Berkeley,CA,USA,2010.USENIXAssociation.C.Lesniewski-Laas.ASybil-proofone-hopDHT.InProceedingsofthe1stworkshoponSocialnetworksystems,pages19–24,NewYork,NY,USA,2008.ACM.PaulF.Syverson,DavidM.Goldschlag,andMichaelG.Reed.Anonymousconnectionsandonionrouting.InIEEESymposiumonSecurityandPrivacy,pages44–54,Washington,DC,USA,1997.IEEEComputerSociety.PengWang,JamesTyra,EricChan-tin,TysonMalchow,DenisFooKune,andYongdaeKim.Attackingthekadnetwork,2009.B.N.Levine,C.Shields,andN.B.Margolin.Asurveyofsolutionstothesybilattack.Technicalreport,UniversityofMassachusettsAmherst,Amherst,MA,2006.RodrigoRodrigues,BarbaraLiskov,andLiubaShrira.Thedesignofarobustpeer-to-peersystem.In10thACMSIGOPSEuropeanWorkshop,pages1–10,NewYork,NY,USA,2002.ACM.JamesNewsome,ElaineShi,DawnSong,andAdrianPerrig.Thesybilattackinsensornetworks:analysis&defenses.InIPSN’04:Proceedingsofthe3rdinternationalsymposiumonInformationprocessinginsensornetworks,pages259–268,NewYork,NY,USA,2004.ACM.MichaelJ.FreedmanandRobertMorris.Tarzan:apeer-to-peeranonymizingnetworklayer.InVijayalakshmiAtluri,editor,ACMConferenceonComputerandCommunicationsSecurity,pages193–206,Washington,DC,USA,2002.ACM.FabrizioCornelli,ErnestoDamiani,SabrinaDeCapitanidiVimercati,StefanoParaboschi,andPierangelaSamarati.Choosingreputableserventsinap2pnetwork.InWWW,pages376–386,NewYork,NY,USA,2002.ACM.BrentByungHoonKang,EricChan-Tin,ChristopherP.Lee,JamesTyra,HunJeongKang,ChrisNunnery,ZachariahWadler,GregSinclair,NicholasHopper,DavidDagon,andYongdaeKim.Towardscompletenodeenumerationinapeer-to-peerbotnet.InWanqingLi,WillySusilo,UdayaKiranTupakula,ReihanehSafavi-Naini,andVijayVaradharajan,editors,ASIACCS,pages23–34,NewYork,NY,USA,2009.ACM.FrankLi,PrateekMittal,MatthewCaesar,andNikitaBorisov.Sybilcontrol:practicalsybildefensewithcomputationalpuzzles.InProceedingsoftheseventhACMworkshoponScalabletrustedcomputing,pages67–78.ACM,2012.LuisvonAhn,ManuelBlum,NicholasJ.HopperandJohnLangford.Captcha:Usinghardaiproblemsforsecurity.InEliBiham,editor,EUROCRYPT,volume2656ofLectureNotesinComputerScience,pages294–311,Berlin,Heidelberg,2003.Springer.JeffYanandAhmadSalahElAhmad.Breakingvisualcaptchaswithnaivepatternrecognitionalgorithms.InACSAC,pages279–291,Washington,DC,USA,2007.IEEEComputerSociety.N.Tran,B.Min,J.Li,andL.Subramanian.Sybil-resilientonlinecontentvoting.InNSDI,Berkeley,CA,USA,2009.USENIX.SergioMarti,PrasannaGanesan,andHectorGarcia-Molina.Dhtroutingusingsociallinks.InIPTPS,pages100–111,Washington,DC,USA,2004.IEEE.DanieleQuerciaandStephenHailes.Sybilattacksagainstmobileusers:friendsandfoestotherescue.InINFOCOM’10:Proceedingsofthe29thconferenceonInformationcommunications,pages336–340,Piscataway,NJ,USA,2010.IEEEPress.AbedelazizMohaisen,AaramYun,andYongdaeKim.Measuringthemixingtimeofsocialgraphs.InProceedingsofthe10thannualconferenceonInternetmeasurement,IMC’10,pages383–389,NewYork,NY,USA,2010.ACM.BimalViswanath,AnsleyPost,KrishnaP.Gummadi,andAlanMislove.Ananalysisofsocialnetwork-basedsybildefenses.InSIGCOMM,NewYork,NY,USA,August2010.ACM.GeorgeDanezisandPrateekMittal.SybilInfer:Detectingsybilnodesusingsocialnetworks.InThe16thAnnualNetwork&DistributedSystemSecurityConference,LectureNotesinComputerScience,Berlin,Heidelberg,2009.Springer-Verlag.AbedelazizMohaisen,HuyTran,NicholasHopper,andYongdaeKim.Understandingsocialnetworkspropertiesfortrustworthycomputing.InICDCSWorkshops,pages154–159.IEEE,2011.AbedelazizMohaisenandScottHollenbeck.Improvingsocialnetwork-basedsybildefensesbyaugmentingsocialgraphs.InWISA,2013.AbedelazizMohaisen,NicholasHopper,andYongdaeKim.Keepyourfriendsclose:Incorporatingtrustintosocialnetwork-basedsybildefenses.InINFOCOM,pages1943–1951.IEEE,2011.HaifengYu.Sybildefensesviasocialnetworks:atutorialandsurvey.ACMSIGACTNews,42(3):80–101,2011.

Aura:redactedcartel已投票决定继续将AURA作为一级资产:7月11日消息,Balancer生态收益治理平台Aura发推称,redactedcartel已投票决定继续将AURA作为一级资产,并继续锁定其AURA余额。[2023/7/11 10:47:32]

Waves创始人:Feature 19现已启动,将在一周内开始回购XTN:6月30日消息,Waves创始人Sasha Ivanov发推称,Feature 19现已启动,将在一周内开始XTN回购活动。根据Feature 19,每个区块奖励中的2枚WAVES将被分配给XTN回购,而另外2枚WAVES将用于Waves DAO。Sasha表示,通过回购与销毁XTN,可以实现生态系统的指数功能。该过程将允许XTN持有者卖出头寸,收回资金。[2023/6/30 22:11:07]

Peter Brandt再次表示支持NFT:金色财经报道,传奇交易员Peter Brandt发推文要求他的粉丝向他推销他们最喜欢的NFT。NFT社区在推特上发布了各种NFT的图片,包括2021年以888 ETH购买的The EtherRock。[2022/10/21 16:33:11]

币安在LUNA交易页面附加警告信息,称韩国已对Terra 2.0联创发出逮捕令:9月21日消息,币安在LUNA交易页面附加警告信息,页面显示:“注意:韩国法院在2022年9月14日对Terra 2.0(LUNA)的联合创始人发出逮捕令。请注意风险并谨慎交易。币安不对任何交易行为承担担保、赔偿等责任。

此外,币安在USTC、LUNC交易页面附加风险提示,称该代币可能出现剧烈的价格波动,需谨慎交易。

此前消息,韩国检方对Terra创始人Do Kwon等5人发出逮捕令,并要求外交部强制注销Do Kwon等人的护照,且已要求国际刑警组织对Terra创始人Do Kwon发出红色通缉令。[2022/9/21 7:10:56]

Axie Infinity将于15:00部署Origin补丁,开启Origin第二阶段:6月30日消息,Axie Infinity宣布将于北京时间今日15:00部署一个大型Origin补丁,正式进入第二阶段。在更新完成之前,游戏将停止。Origin第二阶段中冒险模式将完全重置,所有进度将被删除,玩家可以再次击败并获得奖励。另外,MMR和排行榜也将被重置,部分AXS奖励将在此阶段结束时分配给排名前位的玩家。[2022/6/30 1:41:25]

标签:ANDINGORKCOMDHANDSAMAZINGTEAM价格Next Generation NetworkYearn Income

莱特币热门资讯
APP:DappRadar报告:游戏、DeFi和NFT已成加密生态三剑客

Odaily星球日报译者|Moni 加密货币市场似乎已经走出“五月阴霾”,在刚刚过去的七月里,去中心化应用行业再次展现了令人兴奋的高速发展.

1900/1/1 0:00:00
CRYP:Crypto世界的今日与未来宏图

原文标题:《LP该怎么进场Crypto?》,作者溯元育新团队全球顶尖的另类投资管理公司CambridgeAssociates,在PEVC行业LP圈子里有不可比拟的影响力.

1900/1/1 0:00:00
比特币:大佬也FOMO,盈透证券创始人称自己已持有加密货币

Odaily星球日报译者|余顺遂摘要:在线经纪先驱ThomasPeterffy表示,“就连我自己也投了一点钱购买加密货币。”这位亿万富翁、盈透证券创始人兼董事长没有具体说明自己拥有哪些加密货币.

1900/1/1 0:00:00
PORT:先发制人,对话Solana生态早鸟借贷协议Port Finance

凭借着优越的性能,Solana已成为了以太坊之外发展势头最为迅猛的公链生态之一。提到Solana生态内的DeFi协议,大家最先想到的可能都是Serum以及Raydium等两大DEX,但如果要问S.

1900/1/1 0:00:00
ERA:ZED RUN抢跑,DeRace后来居上,赛马游戏能走多远?

区块链行业从来不缺乏创新。继Defi、NFT、元宇宙大火以后,又出来一个新概念:Gamefi,即游戏与Defi的结合。而今天我们介绍的项目,更是把游戏伸向了Gamble行业.

1900/1/1 0:00:00
数字货币:为什么说2021 Q2或是数字货币史上最重要的一季

Odaily星球日报译者|Moni 2021年第二季度,可能是数字货币历史上最重要的季度之一。2021年4月14日,Coinbase成功上市,员工开香槟庆祝,市场欢欣鼓舞.

1900/1/1 0:00:00