메뉴 건너뛰기




Volumn 24, Issue , 2005, Pages 312-320

On the establishment of distinct identifies in overlay networks

Author keywords

Distance geometry; Fault tolerance; Identity verification; Overlay networks; Peer to peer systems; Security; Sybil attack

Indexed keywords

DISTANCE GEOMETRY; IDENTITY VERIFICATION; OVERLAY NETWORKS; PEER-TO-PEER SYSTEMS; SYBIL ATTACK;

EID: 32344438389     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1073814.1073873     Document Type: Conference Paper
Times cited : (41)

References (8)
  • 1
    • 0029638653 scopus 로고
    • The complexity and approximability of finding maximum feasible subsets of linear relations
    • E. Amaldi and V. Kann. The complexity and approximability of finding maximum feasible subsets of linear relations. Theoretical Computer Science, 147:181-210, 1995.
    • (1995) Theoretical Computer Science , vol.147 , pp. 181-210
    • Amaldi, E.1    Kann, V.2
  • 4
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • J. Douceur. The Sybil attack. In Proc. of IPTPS, pages 251-260, 2002.
    • (2002) Proc. of IPTPS , pp. 251-260
    • Douceur, J.1
  • 5
    • 17744386575 scopus 로고    scopus 로고
    • Triangulation and embedding using small sets of beacons
    • J. Kleinberg, A. Slivkins, and T. Wexler. Triangulation and embedding using small sets of beacons. In Proc. of the IEEE FOCS, pages 444-453, 2004.
    • (2004) Proc. of the IEEE FOCS , pp. 444-453
    • Kleinberg, J.1    Slivkins, A.2    Wexler, T.3
  • 6
    • 11244326497 scopus 로고    scopus 로고
    • The Sybil attack in sensor networks: Analysis and defenses
    • J. Newsome, E. Shi, D. Song, and A. Perrig. The Sybil attack in sensor networks: analysis and defenses. In Proc. of IPSN, 2004.
    • (2004) Proc. of IPSN
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 7
    • 0036346553 scopus 로고    scopus 로고
    • Predicting Internet network distance with coordinates-based approaches
    • T. Ng and H. Zhang. Predicting Internet network distance with coordinates-based approaches. In Proc. of INFOCOM, 2002.
    • (2002) Proc. of INFOCOM
    • Ng, T.1    Zhang, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.