Sybil

Results: 351



#Item
61Wireless sensor network / Computer programming / Technology / Merkle signature scheme / Kademlia / Distributed data storage / Computing / Binary tree

Defending against Sybil Attacks in Sensor Networks∗ Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Cyber Defense Laboratory, Computer Science Department North Carolina State University, Raleigh, NC {q

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:15
62Search algorithms / Error detection and correction / Hash function / Information retrieval / Artificial intelligence / SHA-1 / Bloom filter / Sybil attack / Hashing / Cryptography / Cryptographic hash functions

582 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 3, MARCH 2011 P2DAP – Sybil Attacks Detection in Vehicular Ad Hoc Networks

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2012-03-12 23:31:44
63Bootstrapping node / Distributed hash table / Chord / Pastry / Peer-to-peer / Sybil attack / B-tree / GiFT / Node / Distributed data storage / Computing / Software

Limiting Sybil Attacks in Structured P2P Networks Hosam Rowaihy, William Enck, Patrick McDaniel, and Thomas La Porta Department of Computer Science and Engineering Pennsylvania State University University Park, PA 16802

Add to Reading List

Source URL: www.enck.org

Language: English
64

Microsoft Word - ficha Sybil Brintrup_obsFINAL

Add to Reading List

Source URL: www.mac.uchile.cl

Language: Spanish - Date: 2015-01-07 07:31:33
    65Artistic director

    First Name Guests Robert Megan Graham Sybil

    Add to Reading List

    Source URL: www.emergence-uk.org

    Language: English - Date: 2013-09-12 14:55:03
      66Sybil attack / Consensus / Distributed computing / Distributed data storage / Node / Distributed algorithm / Peer-to-peer / Byzantine fault tolerance / Computing / File sharing networks / Reputation management

      Yale University Department of Computer Science Exposing Computationally-Challenged Byzantine Impostors James Aspnes1

      Add to Reading List

      Source URL: www.hashcash.org

      Language: English - Date: 2014-10-14 12:49:20
      67Distributed hash table / Chord / Internet / Peer-to-peer / Routing table / Routing / Sybil attack / PlanetLab / Kademlia / Distributed data storage / Computing / Network architecture

      Wh¯anau: A Sybil-proof Distributed Hash Table Chris Lesniewski-Laas M. Frans Kaashoek MIT CSAIL, Cambridge, MA, USA {ctl,kaashoek}@mit.edu

      Add to Reading List

      Source URL: pdos.csail.mit.edu

      Language: English - Date: 2015-04-29 10:31:18
      68File sharing networks / Hashing / Peer-to-peer / Distributed hash table / Computing / Cryptography / Cryptographic hash function / Routing / Science / Distributed data storage / Reputation management / Sybil attack

      Christopher T Lesniewski-Laas Updated March 2010 Contact Information

      Add to Reading List

      Source URL: lesniewski.org

      Language: English - Date: 2010-03-13 22:43:23
      69Environment / International Geosphere-Biosphere Programme / Earth System Science Partnership / Global change / ESSP / International Human Dimensions Programme / Earth system science / Global Carbon Project / Carbon cycle / Climatology / Earth / Atmospheric sciences

      Editorial Sybil Seitzinger, Executive Director, IGBP D ecember 2012 witnessed

      Add to Reading List

      Source URL: www.igbp.net

      Language: English - Date: 2013-08-13 04:38:36
      70Chord / Distributed hash table / Internet / Peer-to-peer / Sybil attack / Routing table / Routing / Tree / Kademlia / Distributed data storage / Computing / Network architecture

      Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TRSeptember 24, 2009

      Add to Reading List

      Source URL: dspace.mit.edu

      Language: English - Date: 2009-09-29 02:01:46
      UPDATE