Computer Science ›› 2013, Vol. 40 ›› Issue (6): 100-102.
Previous Articles Next Articles
WANG Feng,LI Ya,ZHU Hai and WANG Yi-ran
[1] Douceur J.The Sybil attack [C]∥Proceedings of the 1st International Workshop on Peer-to-Peer Systems.London,U K:S pringer-Verlag,2002:251-260 [2] Danezis G,Lesniewski-Laas C,Kaashoek M F,et al.Sybil-Resistant DHT Routing[C]∥ESORICS.2005 [3] Yu H,Kaminsky M,Gibbons P B,et al.SybilGuard:Defending Against Sybil Attacks via Social Networks[C]∥Proc.SIGCOMM (Pisa,Italy). New York,NY:ACM Press.2006:267-278 [4] Urdaneta G.A Survey of DHT Security Techniques[J].ACM Computing Surveys,2011,43(2):1-35 [5] Rodrigues R,Druschel P. Peer-to-Peer Systems [J].communications of the ACM,2010,53(10):72-85 [6] Lesniewski-Laas M C,Kaashoek F.Whanau:A Sybil-proof Distributed Hash Table[C]∥NSDI’10Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation.2010 [7] Viswanath B.An Analysis of Social Network-Based Sybil Defenses[C]∥SIGCOMM’10.New Delhi,India,2010 [8] Castro M,Druschel P,Ganesh A,et al.Secure Routing forStructured Peer-to-Peer Overlay Networks[C]∥Proc.5th Symposium on Operating System Design and Implementation (Boston,MA).New York,NY:ACM Press,2002:299-314 [9] Dinger J,Hartenstein H.Defending the Sybil Attack in P2PNetworks:Taxonomy,Chal-lenges,and a Proposal for Self-Regis-tration[C]∥Proc.1st International Conference on Availability,Reliabilityand Security (Vienna,Austria). Los Alamitos,CA:IEEE Computer Society Press,2006:756-763 [10] Wang H,Zhu Y,Hu Y.An Efficient and Secure Peer-to-Peer Overlay Network[C]∥ Proc.30th Local Computer Networks.Los Alamitos,CA:IEEE Computer Society Press,2005:764-771 [11] Yu H,Gibbons P B,Kaminsky M,et al.SybilLimit:A Near-Optimal Social Network Defense against Sybil Attacks[C]∥Proc.International Symposium on Security and Privacy.Los Alamitos,CA:IEEE Computer Society Press,2008:3-17 [12] Borisov N.Computational Puzzles as Sybil Defenses[C]∥Proc.6th International Conference on Peer-to-Peer Computing.Los Alamitos,CA:IEEE Computer Society Press,2006:171-176 [13] 王峰,周佳骏.基于蚁群算法的对等网络,自适应寻径协议[J].计算机工程与应用,2010,17 |
No related articles found! |
|