-
1
-
-
84947273682
-
The Sybil Attack
-
Druschel, P, Kaashoek, M.F, Rowstron, A, eds, IPTPS 2002, Springer, Heidelberg
-
Douceur, J.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2429
-
-
Douceur, J.1
-
2
-
-
38549084370
-
-
Mathur, G., Padmanabhan, V.N., Simon, D.R.: Securing routing in open networks using secure traceroute. Tech Rep MSR-TR-2004-66, Microsoft Research (2004)
-
Mathur, G., Padmanabhan, V.N., Simon, D.R.: Securing routing in open networks using secure traceroute. Tech Rep MSR-TR-2004-66, Microsoft Research (2004)
-
-
-
-
3
-
-
38549160834
-
-
Castro, M., Druschel, P., Ganesh, A.J., Rowstron, A.I.T., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. In: OSDI (2002)
-
Castro, M., Druschel, P., Ganesh, A.J., Rowstron, A.I.T., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. In: OSDI (2002)
-
-
-
-
4
-
-
84880467894
-
The Eigentrust algorithm for reputation management in P2P networks
-
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: Proc. WWW Conf., pp. 640-651 (2003)
-
(2003)
Proc. WWW Conf
, pp. 640-651
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
5
-
-
4544243718
-
Towards Secure Epidemics: Detection and Removal of Malicious Peers in Epidemic-Style Protocols
-
Technical Report UBLCS-2003-14, University of Bologna
-
Jelasity, M., Montresor, A., Babaoglu, O.: Towards Secure Epidemics: Detection and Removal of Malicious Peers in Epidemic-Style Protocols. Technical Report UBLCS-2003-14, University of Bologna (2003)
-
(2003)
-
-
Jelasity, M.1
Montresor, A.2
Babaoglu, O.3
-
7
-
-
4243082091
-
Security in wireless sensor networks
-
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53-57 (2004)
-
(2004)
Commun. ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
8
-
-
3042785862
-
The Sybil attack in sensor networks: Analysis & Defenses
-
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: Analysis & Defenses. In: Proc. IPSN Intl. Symp., pp. 259-268 (2004)
-
(2004)
Proc. IPSN Intl. Symp
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
9
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Ad hoc Networks Journal 1(2-3), 293-315 (2003)
-
(2003)
Ad hoc Networks Journal
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
13
-
-
13244277632
-
SeAl: Managing Accesses and Data in Peer-to-Peer Sharing Networks
-
P2P Computing, pp, August
-
Ntarmos, N., Triantafillou, P.: SeAl: Managing Accesses and Data in Peer-to-Peer Sharing Networks. In: Proc. P2P Computing, pp. 116-123 (August 2004)
-
(2004)
Proc
, pp. 116-123
-
-
Ntarmos, N.1
Triantafillou, P.2
-
15
-
-
2442614120
-
Exchange-Based Incentive Mechanisms for Peer-to-Peer File Sharing
-
Anagnostakis, K., Greenwald, M.: Exchange-Based Incentive Mechanisms for Peer-to-Peer File Sharing. In: Proc. ICDCS (2004)
-
(2004)
Proc. ICDCS
-
-
Anagnostakis, K.1
Greenwald, M.2
-
16
-
-
35248878897
-
-
Acquisti, A., Dingledine, R., Syverson, P.: On the Economics of Anonymity. In: Wright, R.N. (ed.) FC 2003. LNCS, 2742, Springer, Heidelberg (2003)
-
Acquisti, A., Dingledine, R., Syverson, P.: On the Economics of Anonymity. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, Springer, Heidelberg (2003)
-
-
-
-
17
-
-
38549153988
-
Quantifying and discouraging sybil attacks
-
University of Massachusetts Amherst
-
Margolin, N.B., Levine, B.N.: Quantifying and discouraging sybil attacks. Tech Rep 2005-67, University of Massachusetts Amherst (2005)
-
(2005)
Tech Rep 2005-67
-
-
Margolin, N.B.1
Levine, B.N.2
-
19
-
-
35248860839
-
Rationality and self-interest in peer to peer networks
-
Kaashoek, M.F, Stoica, I, eds, IPTPS 2003, Springer, Heidelberg
-
Shneidman, J., Parkes, D.C.: Rationality and self-interest in peer to peer networks. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2735
-
-
Shneidman, J.1
Parkes, D.C.2
-
22
-
-
1542317847
-
BISS: Building secure routing out of an incomplete set of secure associations
-
Capkun, S., Hubaux, J.P.: BISS: Building secure routing out of an incomplete set of secure associations. In: Proc. ACM Wireless Security Conf., pp. 21-29 (2003)
-
(2003)
Proc. ACM Wireless Security Conf
, pp. 21-29
-
-
Capkun, S.1
Hubaux, J.P.2
-
23
-
-
21644471550
-
-
Srivatsa, M., Liu, L.: Vulnerabilities and security threats in structured overlay networks: A quantitative analysis. In: Yew, P.-C., Xue, J. (eds.) ACSAC 2004. LNCS, 3189, pp. 252-261. Springer, Heidelberg (2004)
-
Srivatsa, M., Liu, L.: Vulnerabilities and security threats in structured overlay networks: A quantitative analysis. In: Yew, P.-C., Xue, J. (eds.) ACSAC 2004. LNCS, vol. 3189, pp. 252-261. Springer, Heidelberg (2004)
-
-
-
-
24
-
-
35048895724
-
Group Spreading: A Protocol for Provably Secure Distributed Name Service
-
Díaz, J, Karhumäki, J, Lepistö, A, Sannella, D, eds, ICALP 2004, Springer, Heidelberg
-
Awerbuch, B., Scheideler, C.: Group Spreading: A Protocol for Provably Secure Distributed Name Service. In: Díaz, J., Karhumäki, J., Lepistö, A., Sannella, D. (eds.) ICALP 2004. LNCS, vol. 3142, pp. 183-195. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3142
, pp. 183-195
-
-
Awerbuch, B.1
Scheideler, C.2
-
26
-
-
24344507334
-
Remote physical device fingerprinting
-
Kohno, T., Broido, A., Claffy, K.C.: Remote physical device fingerprinting. IEEE Trans. Dependable Sec. Comput. 2(2), 93-108 (2005)
-
(2005)
IEEE Trans. Dependable Sec. Comput
, vol.2
, Issue.2
, pp. 93-108
-
-
Kohno, T.1
Broido, A.2
Claffy, K.C.3
-
27
-
-
0347031344
-
The effect of false-name bids in combinatorial auctions
-
Yokoo, M., Sakurai, Y., Matsubara, S.: The effect of false-name bids in combinatorial auctions. Games and Economic Behavior 46(1), 174-188 (2004)
-
(2004)
Games and Economic Behavior
, vol.46
, Issue.1
, pp. 174-188
-
-
Yokoo, M.1
Sakurai, Y.2
Matsubara, S.3
-
28
-
-
33745789036
-
An auctioning reputation system based on anomaly
-
Rubin, S., Christodorescu, M., Ganapathy, V., Giffin, J.T., Kruger, L., Wang, H., Kidd, N.: An auctioning reputation system based on anomaly. In: Proc. ACM conference on Computer and Communications Security, pp. 270-279 (2005)
-
(2005)
Proc. ACM conference on Computer and Communications Security
, pp. 270-279
-
-
Rubin, S.1
Christodorescu, M.2
Ganapathy, V.3
Giffin, J.T.4
Kruger, L.5
Wang, H.6
Kidd, N.7
-
30
-
-
35248831179
-
CAPTCHA: Using hard AI problems for security
-
Biham, E, ed, Advances in Cryptology, EUROCRPYT 2003, Springer, Heidelberg
-
von Ahn, L., Blum, M., Hopper, N., Langford, J.: CAPTCHA: Using hard AI problems for security. In: Biham, E. (ed.) Advances in Cryptology - EUROCRPYT 2003. LNCS, vol. 2656, pp. 294-311. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 294-311
-
-
von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
31
-
-
33646046812
-
A taxonomy of rational attacks
-
Castro, M, van Renesse, R, eds, IPTPS 2005, Springer, Heidelberg
-
Nielson, S.J., Crosby, S.A., Wallach, D.S.: A taxonomy of rational attacks. In: Castro, M., van Renesse, R. (eds.) IPTPS 2005. LNCS, vol. 3640, Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3640
-
-
Nielson, S.J.1
Crosby, S.A.2
Wallach, D.S.3
-
34
-
-
21644485107
-
Preserving peer replicas by rate-limited sampled voting
-
Maniatis, P., et al.: Preserving peer replicas by rate-limited sampled voting. In: Proc. ACM SOSP, pp. 44-59 (2003)
-
(2003)
Proc. ACM SOSP
, pp. 44-59
-
-
Maniatis, P.1
|