月亮链 月亮链
Ctrl+D收藏月亮链
首页 > DAI > 正文

AND:女巫攻击及防御方式详解_Androttweiler Token

作者:

时间:1900/1/1 0:00:00

参考文献:GeorgeDanezis,ChrisLesniewski-laas,M.FransKaashoek,andRossAnderson.Sybil-resistantdhtrouting.InInESORICS,LectureNotesinComputerScience,pages305–318,Berlin,Heidelberg,2005.Springer.PetarMaymounkovandDavidMazi`eres.Kademlia:Apeer-to-peerinformationsystembasedonthexormetric.InPeterDruschel,M.FransKaashoek,andAntonyI.T.Rowstron,editors,IPTPS,LectureNotesinComputerScience,pages53–65,Berlin,Heidelberg,2002.Springer.IonStoica,RobertMorris,DavidR.Karger,M.FransKaashoek,andHariBalakrishnan.Chord:Ascalablepeer-to-peerlookupserviceforinternetapplications.InSIGCOMM,pages149–160,NewYork,NY,USA,2001.ACM.YongWang,XiaochunYun,andYifeiLi.Analyzingthecharacteristicsofgnutellaoverlays.InITNG,pages1095–1100,Washington,DC,USA,2007.IEEEComputerSociety.VivekPathakandLiviuIftode.Byzantinefaulttolerantpublickeyauthenticationinpeer-to-peersystems.ComputerNetworks,50(4):579–596,2006.JohnDouceurandJudithS.Donath.Thesybilattack.InIPDPS,pages251–260,Washington,DC,USA,2002.IEEE.HaifengYu,ChenweiShi,MichaelKaminsky,PhillipB.Gibbons,andFengXiao.Dsybil:Optimalsybil-resistanceforrecommendationsystems.InIEEESymposiumonSecurityandPrivacy,pages283–298,Washington,DC,USA,May2009.IEEEComputerSociety.MiguelCastro,PeterDruschel,AyalvadiJ.Ganesh,AntonyI.T.Rowstron,andDanS.Wallach.Secureroutingforstructuredpeer-to-peeroverlaynetworks.InOSDI,Berkeley,CA,USA,2002.USENIXAssociation.AtulAdya,WilliamJ.Bolosky,MiguelCastro,GeraldCermak,RonnieChaiken,JohnR.Douceur,JonHowell,JacobR.Lorch,MarvinTheimer,andRogerWattenhofer.Farsite:Federated,available,andreliablestorageforanincompletelytrustedenvironment.InOSDI,NewYork,NY,USA,2002.USENIXAssociation.JonathanLedlieandMargoI.Seltzer.Distributed,secureloadbalancingwithskew,heterogeneityandchurn.InINFOCOM,pages1419–1430,Washington,DC,USA,2005.IEEE.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Anefficientdistributedpkiforstructuredp2pnetworks.InProceedingofP2P,pages1–10,Washington,DC,USA,2009.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Adistributedcertificationsystemforstructuredp2pnetworks.InDavidHausheerandJ¨urgenSch¨onw¨alder,editors,AIMS,volume5127ofLectureNotesinComputerScience,pages40–52,Berlin,Heidelberg,2008.Springer.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybil-resistantadmissioncontrolcouplingsybilguardwithdistributedcertification.InWETICE,pages105–110,Washington,DC,USA,2008.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybilproofdistributedidentitymanagementforp2pnetworks.InISCC,pages246–253,Washington,DC,USA,2008.IEEE.AgapiosAvramidis,PanayiotisKotzanikolaou,andChristosDouligeris.Chord-pki:Embeddingapublickeyinfrastructureintothechordoverlaynetwork.InJavierLopez,PierangelaSamarati,andJosepL.Ferrer,editors,EuroPKI,volume4582ofLectureNotesinComputerScience,pages354–361,Berlin,Heidelberg,2007.Springer.NikitaBorisov.Computationalpuzzlesassybildefenses.InAlbertoMontresor,AdamWierzbicki,andNahidShahmehri,editors,Peer-to-PeerComputing,pages171–176,Washington,DC,USA,2006.IEEEComputerSociety.HaifengYu,PhillipB.Gibbons,andMichaelKaminsky.Towardanoptimalsocialnetworkdefenseagainstsybilattacks.InIndranilGuptaandRogerWattenhofer,editors,PODC,pages376–377.ACM,2007.HaifengYu,PhillipB.Gibbons,MichaelKaminsky,andFengXiao.Sybillimit:Anear-optimalsocialnetworkdefenseagainstsybilattacks.InIEEESymposiumonSecurityandPrivacy,pages3–17,Washington,DC,USA,2008.IEEEComputerSociety.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamFlaxman.SybilGuard:defendingagainstsybilattacksviasocialnetworks.InLuigiRizzo,ThomasE.Anderson,andNickMcKeown,editors,SIGCOMM,pages267–278,NewYork,NY,USA,2006.ACM.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamD.Flaxman.Sybilguard:defendingagainstsybilattacksviasocialnetworks.IEEE/ACMTrans.Netw.,16(3):576–589,2008.NguyenTran,JinyangLi,LakshminarayananSubramanian,andShermanS.M.Chow.Optimalsybil-resilientnodeadmissioncontrol.InThe30thIEEEInternationalConferenceonComputerCommunications(INFOCOM2011),Shanghai,P.R.China,2011.IEEE.ChrisLesniewski-LassandM.FransKaashoek.Whˉanau:Asybil-proofdistributedhashtable.In7thUSENIXSymposiumonNetworkDesignandImplementation,pages3–17,Berkeley,CA,USA,2010.USENIXAssociation.C.Lesniewski-Laas.ASybil-proofone-hopDHT.InProceedingsofthe1stworkshoponSocialnetworksystems,pages19–24,NewYork,NY,USA,2008.ACM.PaulF.Syverson,DavidM.Goldschlag,andMichaelG.Reed.Anonymousconnectionsandonionrouting.InIEEESymposiumonSecurityandPrivacy,pages44–54,Washington,DC,USA,1997.IEEEComputerSociety.PengWang,JamesTyra,EricChan-tin,TysonMalchow,DenisFooKune,andYongdaeKim.Attackingthekadnetwork,2009.B.N.Levine,C.Shields,andN.B.Margolin.Asurveyofsolutionstothesybilattack.Technicalreport,UniversityofMassachusettsAmherst,Amherst,MA,2006.RodrigoRodrigues,BarbaraLiskov,andLiubaShrira.Thedesignofarobustpeer-to-peersystem.In10thACMSIGOPSEuropeanWorkshop,pages1–10,NewYork,NY,USA,2002.ACM.JamesNewsome,ElaineShi,DawnSong,andAdrianPerrig.Thesybilattackinsensornetworks:analysis&defenses.InIPSN’04:Proceedingsofthe3rdinternationalsymposiumonInformationprocessinginsensornetworks,pages259–268,NewYork,NY,USA,2004.ACM.MichaelJ.FreedmanandRobertMorris.Tarzan:apeer-to-peeranonymizingnetworklayer.InVijayalakshmiAtluri,editor,ACMConferenceonComputerandCommunicationsSecurity,pages193–206,Washington,DC,USA,2002.ACM.FabrizioCornelli,ErnestoDamiani,SabrinaDeCapitanidiVimercati,StefanoParaboschi,andPierangelaSamarati.Choosingreputableserventsinap2pnetwork.InWWW,pages376–386,NewYork,NY,USA,2002.ACM.BrentByungHoonKang,EricChan-Tin,ChristopherP.Lee,JamesTyra,HunJeongKang,ChrisNunnery,ZachariahWadler,GregSinclair,NicholasHopper,DavidDagon,andYongdaeKim.Towardscompletenodeenumerationinapeer-to-peerbotnet.InWanqingLi,WillySusilo,UdayaKiranTupakula,ReihanehSafavi-Naini,andVijayVaradharajan,editors,ASIACCS,pages23–34,NewYork,NY,USA,2009.ACM.FrankLi,PrateekMittal,MatthewCaesar,andNikitaBorisov.Sybilcontrol:practicalsybildefensewithcomputationalpuzzles.InProceedingsoftheseventhACMworkshoponScalabletrustedcomputing,pages67–78.ACM,2012.LuisvonAhn,ManuelBlum,NicholasJ.HopperandJohnLangford.Captcha:Usinghardaiproblemsforsecurity.InEliBiham,editor,EUROCRYPT,volume2656ofLectureNotesinComputerScience,pages294–311,Berlin,Heidelberg,2003.Springer.JeffYanandAhmadSalahElAhmad.Breakingvisualcaptchaswithnaivepatternrecognitionalgorithms.InACSAC,pages279–291,Washington,DC,USA,2007.IEEEComputerSociety.N.Tran,B.Min,J.Li,andL.Subramanian.Sybil-resilientonlinecontentvoting.InNSDI,Berkeley,CA,USA,2009.USENIX.SergioMarti,PrasannaGanesan,andHectorGarcia-Molina.Dhtroutingusingsociallinks.InIPTPS,pages100–111,Washington,DC,USA,2004.IEEE.DanieleQuerciaandStephenHailes.Sybilattacksagainstmobileusers:friendsandfoestotherescue.InINFOCOM’10:Proceedingsofthe29thconferenceonInformationcommunications,pages336–340,Piscataway,NJ,USA,2010.IEEEPress.AbedelazizMohaisen,AaramYun,andYongdaeKim.Measuringthemixingtimeofsocialgraphs.InProceedingsofthe10thannualconferenceonInternetmeasurement,IMC’10,pages383–389,NewYork,NY,USA,2010.ACM.BimalViswanath,AnsleyPost,KrishnaP.Gummadi,andAlanMislove.Ananalysisofsocialnetwork-basedsybildefenses.InSIGCOMM,NewYork,NY,USA,August2010.ACM.GeorgeDanezisandPrateekMittal.SybilInfer:Detectingsybilnodesusingsocialnetworks.InThe16thAnnualNetwork&DistributedSystemSecurityConference,LectureNotesinComputerScience,Berlin,Heidelberg,2009.Springer-Verlag.AbedelazizMohaisen,HuyTran,NicholasHopper,andYongdaeKim.Understandingsocialnetworkspropertiesfortrustworthycomputing.InICDCSWorkshops,pages154–159.IEEE,2011.AbedelazizMohaisenandScottHollenbeck.Improvingsocialnetwork-basedsybildefensesbyaugmentingsocialgraphs.InWISA,2013.AbedelazizMohaisen,NicholasHopper,andYongdaeKim.Keepyourfriendsclose:Incorporatingtrustintosocialnetwork-basedsybildefenses.InINFOCOM,pages1943–1951.IEEE,2011.HaifengYu.Sybildefensesviasocialnetworks:atutorialandsurvey.ACMSIGACTNews,42(3):80–101,2011.

币安撤回德国加密货币许可证申请:金色财经报道,币安发言人证实,该公司已经撤回德国金融监管机构BaFin的许可证申请。此前,该公司在奥地利、比利时和荷兰等市场进行了缩减,其美国分支机构也因经营未注册的交易所而受到监管机构的起诉。

今年6月,有消息称该公司将被BaFin拒绝发放牌照,但币安发言人当时表示,该公司仍在与官员进行讨论。币安还放弃了在塞浦路斯证券监管机构的注册,在一次注册失败后决定退出荷兰,并已被勒令停止在比利时的业务。[2023/7/26 16:00:21]

比特币全网未确认交易数量为1249笔:金色财经报道,BTC.com数据显示,目前比特币全网未确认交易数量为1249笔,全网算力为288.19EH/s,24小时交易速率为3.4交易/秒,目前全网难度为37.59,预测下次难度上调4.5%至39.28T,距离调整还剩11小时47分钟。[2023/1/29 11:34:43]

清华大学法学院副院长程啸:国内的NFT市场中,持有人原则上不得转售NFT获得溢价:金色财经报道,6月30日,由中国文化产业协会主办的中国数字文创行业高质量发展论坛举办。清华大学法学院副院长程啸指出,NFT赋予“数字作品”以独特性与唯一性,使其成为“数字艺术品”。围绕NFT艺术品发行和交易形成了一系列的关系,社会各界对于其合法合规的发展十分关注。其中,对于文物的NFT化进行了特别的规定,禁止个人或者组织擅自将文物扫描或者拍摄成NFT数字艺术品。如有必要对文物进行NFT形式文化创作的,应符合《文物法》等法律规定。在NFT的发行和转让中,还存在个人信息保护等问题。另外要关注金融风险,目前在国内的NFT市场中,持有人原则上不得转售NFT获得溢价,也无法从平台获得投资性收益回报,因此购买NFT的行为没有融资或者帮助他人融资的目的。但也存在一些NFT平台存在交易乱象,因此要注意金融风险。[2022/6/30 1:41:37]

以太坊网络当前已销毁243.18万枚ETH:金色财经报道,据Ultrasound数据显示,以太坊网络当前已销毁2,431,858.27ETH。其中,OpenSea销毁230,048.63枚ETH,ETHtransfers销毁225,263.05枚ETH,UniswapV2销毁133,542.10枚ETH。注:自以太坊伦敦升级引入EIP-1559后,以太坊网络会根据交易需求和区块大小动态调整每笔交易的BaseFee,而这部分的费用将直接燃烧销毁。[2022/6/11 4:18:15]

WOO Network在重新上线LUNA数小时后,由于交易数过多而再次暂停交易:5月17日消息,DeFi交易所WOO Network周一宣布重新上线LUNA,但由于交易数过多不得不再次暂停LUNA交易。

此前为了支持重新上线,WOO表示,在分析了交易者需求增加和市场稳定的迹象后,平台将再次上线LUNA现货交易,并补充说,用户将可以在WOO X上进行零费用交易。但WOO同时也提醒交易员保持谨慎并澄清道,这一举措并不是为LUNA背书,而只是为用户提供一个选择。(Coin Gape)[2022/5/17 3:22:21]

标签:ANDINGORKCOMAndrottweiler TokenGlobal Trading XenocurrencyGLAD Networkbitpiecom官网下载正版

DAI热门资讯
USD:连续七周无增发,市场对 USDT 的需求下降了吗?_busd币什么时候退市

撰文:MuyaoShen本文转自鸵鸟财经,星球日报经授权转载数字货币「印钞机」安静了。据TheBlock数据显示,距离上一次USDT增发已经过去整整七周,创下了USDT在以太坊上未增发的历史最长.

1900/1/1 0:00:00
VAS:监管DeFi?FATF最新合规精神,你需要了解下_ASP

对于加密企业/团队来说,监管的收紧可能会导致严厉处罚,包括罚款、限制等。为避免这种情况,必须及时做出调整,遵守FATF的规定.

1900/1/1 0:00:00
AMM:TWAMM:一种在Uniswap高效处理大额订单的新构想_GAMMA

Odaily星球日报译者|Moni 概述本文介绍了一种新型的自动化做市商,可以帮助以太坊上的交易者有效地执行大额订单。我们称其为时间加权平均做市商,缩写为TWAMM.

1900/1/1 0:00:00
区块链:论区块链技术如何赋能社交代币并打造创作者经济新局面_EtherBone

社交代币,随着创作者经济的兴起,在加密圈内引起了广泛的关注。然而,大多数用户对于其的理解仅仅停留在「它是一个币」,和其他的币没有什么太大区别,也不曾思考社交代币解决了什么问题和其底层逻辑.

1900/1/1 0:00:00
DEX:一文读懂0x协议如何聚合Layer 2和Layer 1的分散流动性_0x协议

本文来自DeFi之道,作者Kyle,星球日报经授权转载。来源:Messari流动性来源正在分散在以太坊Layer2扩展解决方案和其他Layer1网络中.

1900/1/1 0:00:00
元宇宙:【Deribit期权市场播报】0714——日期权_OIN

收录于话题#每日期权播报 播报数据由Greeks.live格致数据实验室和Deribit官网提供.

1900/1/1 0:00:00