以太坊交易所 以太坊交易所
Ctrl+D 以太坊交易所
ads

女巫攻擊及防御方式詳解_COM:ING

Author:

Time:1900/1/1 0:00:00

參考文獻:GeorgeDanezis,ChrisLesniewski-laas,M.FransKaashoek,andRossAnderson.Sybil-resistantdhtrouting.InInESORICS,LectureNotesinComputerScience,pages305–318,Berlin,Heidelberg,2005.Springer.PetarMaymounkovandDavidMazi`eres.Kademlia:Apeer-to-peerinformationsystembasedonthexormetric.InPeterDruschel,M.FransKaashoek,andAntonyI.T.Rowstron,editors,IPTPS,LectureNotesinComputerScience,pages53–65,Berlin,Heidelberg,2002.Springer.IonStoica,RobertMorris,DavidR.Karger,M.FransKaashoek,andHariBalakrishnan.Chord:Ascalablepeer-to-peerlookupserviceforinternetapplications.InSIGCOMM,pages149–160,NewYork,NY,USA,2001.ACM.YongWang,XiaochunYun,andYifeiLi.Analyzingthecharacteristicsofgnutellaoverlays.InITNG,pages1095–1100,Washington,DC,USA,2007.IEEEComputerSociety.VivekPathakandLiviuIftode.Byzantinefaulttolerantpublickeyauthenticationinpeer-to-peersystems.ComputerNetworks,50(4):579–596,2006.JohnDouceurandJudithS.Donath.Thesybilattack.InIPDPS,pages251–260,Washington,DC,USA,2002.IEEE.HaifengYu,ChenweiShi,MichaelKaminsky,PhillipB.Gibbons,andFengXiao.Dsybil:Optimalsybil-resistanceforrecommendationsystems.InIEEESymposiumonSecurityandPrivacy,pages283–298,Washington,DC,USA,May2009.IEEEComputerSociety.MiguelCastro,PeterDruschel,AyalvadiJ.Ganesh,AntonyI.T.Rowstron,andDanS.Wallach.Secureroutingforstructuredpeer-to-peeroverlaynetworks.InOSDI,Berkeley,CA,USA,2002.USENIXAssociation.AtulAdya,WilliamJ.Bolosky,MiguelCastro,GeraldCermak,RonnieChaiken,JohnR.Douceur,JonHowell,JacobR.Lorch,MarvinTheimer,andRogerWattenhofer.Farsite:Federated,available,andreliablestorageforanincompletelytrustedenvironment.InOSDI,NewYork,NY,USA,2002.USENIXAssociation.JonathanLedlieandMargoI.Seltzer.Distributed,secureloadbalancingwithskew,heterogeneityandchurn.InINFOCOM,pages1419–1430,Washington,DC,USA,2005.IEEE.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Anefficientdistributedpkiforstructuredp2pnetworks.InProceedingofP2P,pages1–10,Washington,DC,USA,2009.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Adistributedcertificationsystemforstructuredp2pnetworks.InDavidHausheerandJ¨urgenSch¨onw¨alder,editors,AIMS,volume5127ofLectureNotesinComputerScience,pages40–52,Berlin,Heidelberg,2008.Springer.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybil-resistantadmissioncontrolcouplingsybilguardwithdistributedcertification.InWETICE,pages105–110,Washington,DC,USA,2008.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybilproofdistributedidentitymanagementforp2pnetworks.InISCC,pages246–253,Washington,DC,USA,2008.IEEE.AgapiosAvramidis,PanayiotisKotzanikolaou,andChristosDouligeris.Chord-pki:Embeddingapublickeyinfrastructureintothechordoverlaynetwork.InJavierLopez,PierangelaSamarati,andJosepL.Ferrer,editors,EuroPKI,volume4582ofLectureNotesinComputerScience,pages354–361,Berlin,Heidelberg,2007.Springer.NikitaBorisov.Computationalpuzzlesassybildefenses.InAlbertoMontresor,AdamWierzbicki,andNahidShahmehri,editors,Peer-to-PeerComputing,pages171–176,Washington,DC,USA,2006.IEEEComputerSociety.HaifengYu,PhillipB.Gibbons,andMichaelKaminsky.Towardanoptimalsocialnetworkdefenseagainstsybilattacks.InIndranilGuptaandRogerWattenhofer,editors,PODC,pages376–377.ACM,2007.HaifengYu,PhillipB.Gibbons,MichaelKaminsky,andFengXiao.Sybillimit:Anear-optimalsocialnetworkdefenseagainstsybilattacks.InIEEESymposiumonSecurityandPrivacy,pages3–17,Washington,DC,USA,2008.IEEEComputerSociety.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamFlaxman.SybilGuard:defendingagainstsybilattacksviasocialnetworks.InLuigiRizzo,ThomasE.Anderson,andNickMcKeown,editors,SIGCOMM,pages267–278,NewYork,NY,USA,2006.ACM.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamD.Flaxman.Sybilguard:defendingagainstsybilattacksviasocialnetworks.IEEE/ACMTrans.Netw.,16(3):576–589,2008.NguyenTran,JinyangLi,LakshminarayananSubramanian,andShermanS.M.Chow.Optimalsybil-resilientnodeadmissioncontrol.InThe30thIEEEInternationalConferenceonComputerCommunications(INFOCOM2011),Shanghai,P.R.China,2011.IEEE.ChrisLesniewski-LassandM.FransKaashoek.Whˉanau:Asybil-proofdistributedhashtable.In7thUSENIXSymposiumonNetworkDesignandImplementation,pages3–17,Berkeley,CA,USA,2010.USENIXAssociation.C.Lesniewski-Laas.ASybil-proofone-hopDHT.InProceedingsofthe1stworkshoponSocialnetworksystems,pages19–24,NewYork,NY,USA,2008.ACM.PaulF.Syverson,DavidM.Goldschlag,andMichaelG.Reed.Anonymousconnectionsandonionrouting.InIEEESymposiumonSecurityandPrivacy,pages44–54,Washington,DC,USA,1997.IEEEComputerSociety.PengWang,JamesTyra,EricChan-tin,TysonMalchow,DenisFooKune,andYongdaeKim.Attackingthekadnetwork,2009.B.N.Levine,C.Shields,andN.B.Margolin.Asurveyofsolutionstothesybilattack.Technicalreport,UniversityofMassachusettsAmherst,Amherst,MA,2006.RodrigoRodrigues,BarbaraLiskov,andLiubaShrira.Thedesignofarobustpeer-to-peersystem.In10thACMSIGOPSEuropeanWorkshop,pages1–10,NewYork,NY,USA,2002.ACM.JamesNewsome,ElaineShi,DawnSong,andAdrianPerrig.Thesybilattackinsensornetworks:analysis&defenses.InIPSN’04:Proceedingsofthe3rdinternationalsymposiumonInformationprocessinginsensornetworks,pages259–268,NewYork,NY,USA,2004.ACM.MichaelJ.FreedmanandRobertMorris.Tarzan:apeer-to-peeranonymizingnetworklayer.InVijayalakshmiAtluri,editor,ACMConferenceonComputerandCommunicationsSecurity,pages193–206,Washington,DC,USA,2002.ACM.FabrizioCornelli,ErnestoDamiani,SabrinaDeCapitanidiVimercati,StefanoParaboschi,andPierangelaSamarati.Choosingreputableserventsinap2pnetwork.InWWW,pages376–386,NewYork,NY,USA,2002.ACM.BrentByungHoonKang,EricChan-Tin,ChristopherP.Lee,JamesTyra,HunJeongKang,ChrisNunnery,ZachariahWadler,GregSinclair,NicholasHopper,DavidDagon,andYongdaeKim.Towardscompletenodeenumerationinapeer-to-peerbotnet.InWanqingLi,WillySusilo,UdayaKiranTupakula,ReihanehSafavi-Naini,andVijayVaradharajan,editors,ASIACCS,pages23–34,NewYork,NY,USA,2009.ACM.FrankLi,PrateekMittal,MatthewCaesar,andNikitaBorisov.Sybilcontrol:practicalsybildefensewithcomputationalpuzzles.InProceedingsoftheseventhACMworkshoponScalabletrustedcomputing,pages67–78.ACM,2012.LuisvonAhn,ManuelBlum,NicholasJ.HopperandJohnLangford.Captcha:Usinghardaiproblemsforsecurity.InEliBiham,editor,EUROCRYPT,volume2656ofLectureNotesinComputerScience,pages294–311,Berlin,Heidelberg,2003.Springer.JeffYanandAhmadSalahElAhmad.Breakingvisualcaptchaswithnaivepatternrecognitionalgorithms.InACSAC,pages279–291,Washington,DC,USA,2007.IEEEComputerSociety.N.Tran,B.Min,J.Li,andL.Subramanian.Sybil-resilientonlinecontentvoting.InNSDI,Berkeley,CA,USA,2009.USENIX.SergioMarti,PrasannaGanesan,andHectorGarcia-Molina.Dhtroutingusingsociallinks.InIPTPS,pages100–111,Washington,DC,USA,2004.IEEE.DanieleQuerciaandStephenHailes.Sybilattacksagainstmobileusers:friendsandfoestotherescue.InINFOCOM’10:Proceedingsofthe29thconferenceonInformationcommunications,pages336–340,Piscataway,NJ,USA,2010.IEEEPress.AbedelazizMohaisen,AaramYun,andYongdaeKim.Measuringthemixingtimeofsocialgraphs.InProceedingsofthe10thannualconferenceonInternetmeasurement,IMC’10,pages383–389,NewYork,NY,USA,2010.ACM.BimalViswanath,AnsleyPost,KrishnaP.Gummadi,andAlanMislove.Ananalysisofsocialnetwork-basedsybildefenses.InSIGCOMM,NewYork,NY,USA,August2010.ACM.GeorgeDanezisandPrateekMittal.SybilInfer:Detectingsybilnodesusingsocialnetworks.InThe16thAnnualNetwork&DistributedSystemSecurityConference,LectureNotesinComputerScience,Berlin,Heidelberg,2009.Springer-Verlag.AbedelazizMohaisen,HuyTran,NicholasHopper,andYongdaeKim.Understandingsocialnetworkspropertiesfortrustworthycomputing.InICDCSWorkshops,pages154–159.IEEE,2011.AbedelazizMohaisenandScottHollenbeck.Improvingsocialnetwork-basedsybildefensesbyaugmentingsocialgraphs.InWISA,2013.AbedelazizMohaisen,NicholasHopper,andYongdaeKim.Keepyourfriendsclose:Incorporatingtrustintosocialnetwork-basedsybildefenses.InINFOCOM,pages1943–1951.IEEE,2011.HaifengYu.Sybildefensesviasocialnetworks:atutorialandsurvey.ACMSIGACTNews,42(3):80–101,2011.

0xScope:2022年3月31日起至今,一幣安存款地址從Huobi收到近7億枚穩定幣:1月13日消息,據0xScope Protocol監測,2022年3月31日起至今,0x66f7開頭的幣安存款地址從Huobi收到總計約6.89億枚USDT和USDC。目前Huobi以太坊上USDT與USDC的持有量約為5.55億枚。[2023/1/13 11:10:21]

Gemini CEO:債權人委員會已提出解決Genesis和DCG流動性問題的計劃:12月21日消息,Gemini總裁兼首席執行官Cameron Winklevoss發文表示,“Houlihan Lokey代表債權人委員會提出一項方案,以解決Genesis和DCG的流動性問題,并為資產回收提供途徑。該計劃基于迄今為止從Genesis、DCG及其各自顧問處收到的信息。債權人委員會預計本周會收到Genesis和DCG的初步答復”。[2022/12/21 21:58:12]

以太坊二層擴容網絡Boba Network已擴展至Avalanche:9月22日消息,以太坊二層擴容網絡Boba Network已擴展至Avalanche,通過啟動Boba AVAX L2,以擴展基于C鏈構建的DApp。其中Sushi將在Boba AVAX L2上部署他們的Legacy Swap,而3D PvP游戲Evo Verses將在Boba AVAX L2上線。

此外Boba團隊還計劃讓Avalanche開發人員訪問其混合計算服務,以允許區塊鏈應用程序與來自Web2應用程序(如社交媒體平臺)的數據進行交互。[2022/9/22 7:12:06]

自年初以來,NFT月度市場交易量下降94%:金色財經消息,據The Block的數據顯示,非同質代幣(NFT)市場的交易量已從1月份的166億美元降至今年6月的10億美元以上,下降了94%。The Block分析師認為,年初NFT交易量的很大一部分可能是由于NFT市場LooksRare上的“洗售交易\",即用戶在彼此之間交易代幣以欺詐性地抬高價格。此外,近幾個月來NFT的地板價也有所下降,BAYC、Doodles和CoolCats等頂級項目已經下跌了30%左右。[2022/7/2 1:45:59]

Coinbase:訂單流收發出現延遲,目前正在調查這個問題。:6月28日消息,加密貨幣交易所Coinbase表示,訂單流收發出現延遲,目前正在調查這個問題。(金十)[2022/6/28 1:37:12]

Tags:ANDINGORKCOMEterlandpolkadotstingrayTORK幣HKD.com DAO

酷幣交易所
IDEG 合伙人:未來四年加密貨幣行業的五個趨勢和三個投資策略_STR:HER

撰文:KevinYang,IDEG合伙人、FundamentalLabs投資合伙人編譯:李科行業概況和趨勢如果看一下市值,我們會發現加密數字貨幣市場已經發展成為一個萬億級市場.

1900/1/1 0:00:00
盤點 | 已經入場加密貨幣的華爾街金融機構們_加密貨幣:加密貨幣是不是騙局

隨著客戶對投資加密貨幣的需求增長,已有越來越多投行開始提供加密貨幣服務。然而,面臨監管重壓,華爾街銀行布局加密貨幣仍態度謹慎.

1900/1/1 0:00:00
USDT暴雷擔憂逐漸隱去,一年增長10倍的穩定幣市場格局已變_USD:eth價格今日行情USDT

這是白話區塊鏈的第1366期原創作者|hebao出品|白話區塊鏈6月30日,Circle與Coinbase聯手創辦的合規美元穩定幣USDC.

1900/1/1 0:00:00
Deeper Network的去中心化隱私網絡能給我們帶來什么?_DEEP:WEBOO

1989年,英國人TimBerners-Lee發明了WorldWideWeb,也就是我們每次打開網站最熟悉的開頭“www.”,它能讓網絡上的資源在一個網頁里比較直觀的展示出來.

1900/1/1 0:00:00
3年近百倍收益,亞洲最大DeFi基金創始人詳解其成功的投資邏輯_DEFI:DeFiStarter

原文標題《獨家丨Arthur0xCheong:如何建立一個5億美元的DeFi基金》整理:TheReadingApe亞洲最大的專注于DeFi的基金DeFianceCapital的創始人Arthur.

1900/1/1 0:00:00
盤點NFT、元宇宙爆火下熱度最高的10大類鏈游_BOX:DeFi Coin Bonus

雖然在過去幾周,我們一直有介紹元宇宙的概念,但誰也沒有想到元宇宙或者說鏈游會以如此猛烈的方式向我們襲來,甚至直接成為拉動大盤的龍頭板塊.

1900/1/1 0:00:00
ads