買比特幣 買比特幣
Ctrl+D 買比特幣
ads

AND:女巫攻擊及防御方式詳解_ING

Author:

Time:1900/1/1 0:00:00

參考文獻:GeorgeDanezis,ChrisLesniewski-laas,M.FransKaashoek,andRossAnderson.Sybil-resistantdhtrouting.InInESORICS,LectureNotesinComputerScience,pages305–318,Berlin,Heidelberg,2005.Springer.PetarMaymounkovandDavidMazi`eres.Kademlia:Apeer-to-peerinformationsystembasedonthexormetric.InPeterDruschel,M.FransKaashoek,andAntonyI.T.Rowstron,editors,IPTPS,LectureNotesinComputerScience,pages53–65,Berlin,Heidelberg,2002.Springer.IonStoica,RobertMorris,DavidR.Karger,M.FransKaashoek,andHariBalakrishnan.Chord:Ascalablepeer-to-peerlookupserviceforinternetapplications.InSIGCOMM,pages149–160,NewYork,NY,USA,2001.ACM.YongWang,XiaochunYun,andYifeiLi.Analyzingthecharacteristicsofgnutellaoverlays.InITNG,pages1095–1100,Washington,DC,USA,2007.IEEEComputerSociety.VivekPathakandLiviuIftode.Byzantinefaulttolerantpublickeyauthenticationinpeer-to-peersystems.ComputerNetworks,50(4):579–596,2006.JohnDouceurandJudithS.Donath.Thesybilattack.InIPDPS,pages251–260,Washington,DC,USA,2002.IEEE.HaifengYu,ChenweiShi,MichaelKaminsky,PhillipB.Gibbons,andFengXiao.Dsybil:Optimalsybil-resistanceforrecommendationsystems.InIEEESymposiumonSecurityandPrivacy,pages283–298,Washington,DC,USA,May2009.IEEEComputerSociety.MiguelCastro,PeterDruschel,AyalvadiJ.Ganesh,AntonyI.T.Rowstron,andDanS.Wallach.Secureroutingforstructuredpeer-to-peeroverlaynetworks.InOSDI,Berkeley,CA,USA,2002.USENIXAssociation.AtulAdya,WilliamJ.Bolosky,MiguelCastro,GeraldCermak,RonnieChaiken,JohnR.Douceur,JonHowell,JacobR.Lorch,MarvinTheimer,andRogerWattenhofer.Farsite:Federated,available,andreliablestorageforanincompletelytrustedenvironment.InOSDI,NewYork,NY,USA,2002.USENIXAssociation.JonathanLedlieandMargoI.Seltzer.Distributed,secureloadbalancingwithskew,heterogeneityandchurn.InINFOCOM,pages1419–1430,Washington,DC,USA,2005.IEEE.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Anefficientdistributedpkiforstructuredp2pnetworks.InProceedingofP2P,pages1–10,Washington,DC,USA,2009.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Adistributedcertificationsystemforstructuredp2pnetworks.InDavidHausheerandJ¨urgenSch¨onw¨alder,editors,AIMS,volume5127ofLectureNotesinComputerScience,pages40–52,Berlin,Heidelberg,2008.Springer.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybil-resistantadmissioncontrolcouplingsybilguardwithdistributedcertification.InWETICE,pages105–110,Washington,DC,USA,2008.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybilproofdistributedidentitymanagementforp2pnetworks.InISCC,pages246–253,Washington,DC,USA,2008.IEEE.AgapiosAvramidis,PanayiotisKotzanikolaou,andChristosDouligeris.Chord-pki:Embeddingapublickeyinfrastructureintothechordoverlaynetwork.InJavierLopez,PierangelaSamarati,andJosepL.Ferrer,editors,EuroPKI,volume4582ofLectureNotesinComputerScience,pages354–361,Berlin,Heidelberg,2007.Springer.NikitaBorisov.Computationalpuzzlesassybildefenses.InAlbertoMontresor,AdamWierzbicki,andNahidShahmehri,editors,Peer-to-PeerComputing,pages171–176,Washington,DC,USA,2006.IEEEComputerSociety.HaifengYu,PhillipB.Gibbons,andMichaelKaminsky.Towardanoptimalsocialnetworkdefenseagainstsybilattacks.InIndranilGuptaandRogerWattenhofer,editors,PODC,pages376–377.ACM,2007.HaifengYu,PhillipB.Gibbons,MichaelKaminsky,andFengXiao.Sybillimit:Anear-optimalsocialnetworkdefenseagainstsybilattacks.InIEEESymposiumonSecurityandPrivacy,pages3–17,Washington,DC,USA,2008.IEEEComputerSociety.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamFlaxman.SybilGuard:defendingagainstsybilattacksviasocialnetworks.InLuigiRizzo,ThomasE.Anderson,andNickMcKeown,editors,SIGCOMM,pages267–278,NewYork,NY,USA,2006.ACM.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamD.Flaxman.Sybilguard:defendingagainstsybilattacksviasocialnetworks.IEEE/ACMTrans.Netw.,16(3):576–589,2008.NguyenTran,JinyangLi,LakshminarayananSubramanian,andShermanS.M.Chow.Optimalsybil-resilientnodeadmissioncontrol.InThe30thIEEEInternationalConferenceonComputerCommunications(INFOCOM2011),Shanghai,P.R.China,2011.IEEE.ChrisLesniewski-LassandM.FransKaashoek.Whˉanau:Asybil-proofdistributedhashtable.In7thUSENIXSymposiumonNetworkDesignandImplementation,pages3–17,Berkeley,CA,USA,2010.USENIXAssociation.C.Lesniewski-Laas.ASybil-proofone-hopDHT.InProceedingsofthe1stworkshoponSocialnetworksystems,pages19–24,NewYork,NY,USA,2008.ACM.PaulF.Syverson,DavidM.Goldschlag,andMichaelG.Reed.Anonymousconnectionsandonionrouting.InIEEESymposiumonSecurityandPrivacy,pages44–54,Washington,DC,USA,1997.IEEEComputerSociety.PengWang,JamesTyra,EricChan-tin,TysonMalchow,DenisFooKune,andYongdaeKim.Attackingthekadnetwork,2009.B.N.Levine,C.Shields,andN.B.Margolin.Asurveyofsolutionstothesybilattack.Technicalreport,UniversityofMassachusettsAmherst,Amherst,MA,2006.RodrigoRodrigues,BarbaraLiskov,andLiubaShrira.Thedesignofarobustpeer-to-peersystem.In10thACMSIGOPSEuropeanWorkshop,pages1–10,NewYork,NY,USA,2002.ACM.JamesNewsome,ElaineShi,DawnSong,andAdrianPerrig.Thesybilattackinsensornetworks:analysis&defenses.InIPSN’04:Proceedingsofthe3rdinternationalsymposiumonInformationprocessinginsensornetworks,pages259–268,NewYork,NY,USA,2004.ACM.MichaelJ.FreedmanandRobertMorris.Tarzan:apeer-to-peeranonymizingnetworklayer.InVijayalakshmiAtluri,editor,ACMConferenceonComputerandCommunicationsSecurity,pages193–206,Washington,DC,USA,2002.ACM.FabrizioCornelli,ErnestoDamiani,SabrinaDeCapitanidiVimercati,StefanoParaboschi,andPierangelaSamarati.Choosingreputableserventsinap2pnetwork.InWWW,pages376–386,NewYork,NY,USA,2002.ACM.BrentByungHoonKang,EricChan-Tin,ChristopherP.Lee,JamesTyra,HunJeongKang,ChrisNunnery,ZachariahWadler,GregSinclair,NicholasHopper,DavidDagon,andYongdaeKim.Towardscompletenodeenumerationinapeer-to-peerbotnet.InWanqingLi,WillySusilo,UdayaKiranTupakula,ReihanehSafavi-Naini,andVijayVaradharajan,editors,ASIACCS,pages23–34,NewYork,NY,USA,2009.ACM.FrankLi,PrateekMittal,MatthewCaesar,andNikitaBorisov.Sybilcontrol:practicalsybildefensewithcomputationalpuzzles.InProceedingsoftheseventhACMworkshoponScalabletrustedcomputing,pages67–78.ACM,2012.LuisvonAhn,ManuelBlum,NicholasJ.HopperandJohnLangford.Captcha:Usinghardaiproblemsforsecurity.InEliBiham,editor,EUROCRYPT,volume2656ofLectureNotesinComputerScience,pages294–311,Berlin,Heidelberg,2003.Springer.JeffYanandAhmadSalahElAhmad.Breakingvisualcaptchaswithnaivepatternrecognitionalgorithms.InACSAC,pages279–291,Washington,DC,USA,2007.IEEEComputerSociety.N.Tran,B.Min,J.Li,andL.Subramanian.Sybil-resilientonlinecontentvoting.InNSDI,Berkeley,CA,USA,2009.USENIX.SergioMarti,PrasannaGanesan,andHectorGarcia-Molina.Dhtroutingusingsociallinks.InIPTPS,pages100–111,Washington,DC,USA,2004.IEEE.DanieleQuerciaandStephenHailes.Sybilattacksagainstmobileusers:friendsandfoestotherescue.InINFOCOM’10:Proceedingsofthe29thconferenceonInformationcommunications,pages336–340,Piscataway,NJ,USA,2010.IEEEPress.AbedelazizMohaisen,AaramYun,andYongdaeKim.Measuringthemixingtimeofsocialgraphs.InProceedingsofthe10thannualconferenceonInternetmeasurement,IMC’10,pages383–389,NewYork,NY,USA,2010.ACM.BimalViswanath,AnsleyPost,KrishnaP.Gummadi,andAlanMislove.Ananalysisofsocialnetwork-basedsybildefenses.InSIGCOMM,NewYork,NY,USA,August2010.ACM.GeorgeDanezisandPrateekMittal.SybilInfer:Detectingsybilnodesusingsocialnetworks.InThe16thAnnualNetwork&DistributedSystemSecurityConference,LectureNotesinComputerScience,Berlin,Heidelberg,2009.Springer-Verlag.AbedelazizMohaisen,HuyTran,NicholasHopper,andYongdaeKim.Understandingsocialnetworkspropertiesfortrustworthycomputing.InICDCSWorkshops,pages154–159.IEEE,2011.AbedelazizMohaisenandScottHollenbeck.Improvingsocialnetwork-basedsybildefensesbyaugmentingsocialgraphs.InWISA,2013.AbedelazizMohaisen,NicholasHopper,andYongdaeKim.Keepyourfriendsclose:Incorporatingtrustintosocialnetwork-basedsybildefenses.InINFOCOM,pages1943–1951.IEEE,2011.HaifengYu.Sybildefensesviasocialnetworks:atutorialandsurvey.ACMSIGACTNews,42(3):80–101,2011.

Aave社區發起“原生穩定幣GHO上線主網”的ARFC提案:6月7日消息,Aave Companies已在治理論壇發布關于Aave原生穩定幣GHO上線主網的ARFC提案,提議使用Aave V3 Ethereum Facilitator和FlashMinter Facilitator將GHO引入以太坊主網,如果該ARFC和隨后的AIP提案得到Aave DAO的批準,GHO將在以太坊主網上運行,以太坊上的Aave V3用戶將可以使用抵押品鑄造GHO,DAO金庫將獲得 GHO借貸利息的100%作為額外收入。

Facilitator是由GHO引入的概念,Facilitator(如協議、實體等)可以生成某一特定數量范圍內的GHO,也可以進行銷毀。Aave V3 Ethereum Facilitator允許用戶存入抵押品以借出GHO,抵押品存放在V3以太坊主網池中。FlashMinter Facilitator允許用戶FlashMint(與閃電貸功能相同)GHO并在單筆交易中償還,而不是從池中借入資產。

此外Aave Companies表示,將在GHO主網上線后向社區提出多鏈策略。[2023/6/7 21:21:23]

知情人士:瑞銀據悉同意以逾20億美元的價格收購瑞信:金色財經報道,據英國金融時報,知情人士稱,瑞銀已同意收購瑞信,并將出價提高至逾20億美元。瑞銀將以每股0.5瑞郎以上的價格購買瑞信的股票,用瑞銀的股票支付,該價格仍遠低于瑞信上周五1.86瑞郎的收盤價。此外,瑞銀還同意軟化“重大不利變化”的條款,該條款規定,如果瑞銀信貸違約息差飆升,該交易將失效。重大不利變更條款將適用于交易簽署至完成之間的這段時間。知情人士還稱,瑞士當局已獲得美歐相關監管機構的預先批準,預計美歐將于今日發表聯合聲明。兩名知情人士表示,瑞銀將大幅收縮瑞信的投行業務,合并后的投行業務在合并后集團中的占比將不超過三分之一。據悉此次談判中,談判代表給瑞信的代號是雪松(Cedar),給瑞銀的代號是烏爾姆斯(Ulmus)。[2023/3/20 13:13:49]

加密貨幣總市值跌至9000億美元下方:金色財經報道,據CoinGecko數據顯示,當前加密貨幣市值為8875.14億美元,24小時跌幅為4.5%,24小時交易量為1122.18億美元,當前比特幣市值占比為36.4%,以太坊市值占比為17.0%。[2022/11/12 12:53:02]

Glassnode:擁有不到1枚BTC的持有者正以史上最快的速度購入BTC:7月15日消息,據Bitcoin Magazine發布的推文,Glassnode稱,擁有不到1枚BTC的持有者正以史上最快的速度購入BTC。[2022/7/15 2:16:23]

四川人民出版社將推出基于出版單位圖書IP衍生的數字藏品:金色財經報道,據四川人民出版社官方公眾號,四川人民出版社與數傳集團就元宇宙書店及數字藏品項目達成戰略合作,四川人民出版社副社長李真真表示,四川人民出版社將與數傳集團合作推出基于出版單位圖書IP衍生的數字藏品,在各個數字平臺上進行發行。同時,將根據未來元宇宙行業的發展,促進出版物的元宇宙化,在“元宇宙書店”場景中結合AR/VR/MR技術基礎,實現社交交互與在線交易,進一步推動社內轉型升級,帶動出版產業深度融合發展。[2022/6/25 1:31:06]

Tags:ANDINGORKCOMSAND幣Crying JordanNext Generation Networkecomi幣最新消息

比特幣行情
SWAP:OEC Grant Hackathon落幕,28個團隊提交項目_BarbecueSwap

7月11日,OEC通過DoraHacks開源開發者平臺HackerLink舉辦的OECGrantHackathon圓滿落幕.

1900/1/1 0:00:00
ARBI:Arbitrum 和 Optimism 之間最顯著的差異是什么?_Arbitrum

作者:BenjaminSimon首先表明一點。我最近參加了OffchainLabs的最新一輪融資,MechanismCapital也參與了.

1900/1/1 0:00:00
買比特幣:蘋果公司購買數十億美元比特幣?你想多了_加密貨幣市場最新消息分析

作者|秦曉峰編輯|郝方舟出品|Odaily星球日報 近期,Twitter加密社區中流傳著一則消息:蘋果公司很快將宣布購買數十億美元的比特幣計劃.

1900/1/1 0:00:00
Curve:Curve上演「三國演義」:Yearn、Convex及Stake DAO斗爭不斷_SBTCCURVE

不同的DeFi協議之間正在進行一場權力爭奪戰。Yearn、Convex和StakeDAO正在為積累veCRV而戰,力求在CurveFinanceDAO上擁有權力和影響力,并最終能夠為其用戶提供更.

1900/1/1 0:00:00
ICE:理解閃電網絡---構建比特幣的雙向支付通道_Italian Lira

至少有三家公司——Poon和Dryja的Lightning、Blockstream和Blockchain正在開發這種技術的實現.

1900/1/1 0:00:00
NBA:Coinbase宣布將上線所有可行的加密貨幣_COIN

納斯達克上市加密貨幣交易所Coinbase首席執行官布賴恩·阿姆斯特朗(BrianArmstrong)今天表示,該交易所計劃在法律允許的情況下上線所有加密資產.

1900/1/1 0:00:00
ads