共 50 条
- [1] Mitigating Peer-to-Peer Botnets by Sybil attacks 2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATION AND 2010 ASIA-PACIFIC CONFERENCE ON INFORMATION TECHNOLOGY AND OCEAN ENGINEERING: CICC-ITOE 2010, PROCEEDINGS, 2010, : 241 - 243
- [2] A Sybil-Resilient Peer-to-Peer Network Protocol WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 682 - 685
- [3] Quantitative Analysis of the Sybil Attack and Effective Sybil Resistance in Peer-to-Peer Systems 2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
- [4] Securing peer-to-peer overlay networks from Sybil attack 2007 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES, VOLS 1-3, 2007, : 1213 - 1218
- [5] Defeating against sybil-attacks in peer-to-peer networks 2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1218 - 1222
- [6] Defending Against sybil-attacks in Peer-to-Peer Networks INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 329 - 340
- [7] Further Analyzing the Sybil Attack in Mitigating Peer-to-Peer Botnets KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (10): : 2731 - 2749
- [8] Lemming: A novel resource lookup scheme for peer-to-peer networks EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2004, 3207 : 1024 - 1033
- [9] A Novel Cooperative Caching Scheme for Unstrutured Peer-to-Peer Networks 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 765 - 769
- [10] A definition of Peer-to-Peer networking for the classification of Peer-to-Peer architectures and applications FIRST INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, 2002, : 101 - 102