메뉴 건너뛰기




Volumn 4886 LNCS, Issue , 2007, Pages 192-207

Informant: Detecting sybils using incentives

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION ANALYSIS; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 38549133359     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (23)

References (35)
  • 1
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil Attack
    • Druschel, P, Kaashoek, M.F, Rowstron, A, eds, IPTPS 2002, Springer, Heidelberg
    • Douceur, J.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2429
    • Douceur, J.1
  • 2
    • 38549084370 scopus 로고    scopus 로고
    • Mathur, G., Padmanabhan, V.N., Simon, D.R.: Securing routing in open networks using secure traceroute. Tech Rep MSR-TR-2004-66, Microsoft Research (2004)
    • Mathur, G., Padmanabhan, V.N., Simon, D.R.: Securing routing in open networks using secure traceroute. Tech Rep MSR-TR-2004-66, Microsoft Research (2004)
  • 3
    • 38549160834 scopus 로고    scopus 로고
    • Castro, M., Druschel, P., Ganesh, A.J., Rowstron, A.I.T., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. In: OSDI (2002)
    • Castro, M., Druschel, P., Ganesh, A.J., Rowstron, A.I.T., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. In: OSDI (2002)
  • 4
    • 84880467894 scopus 로고    scopus 로고
    • The Eigentrust algorithm for reputation management in P2P networks
    • Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: Proc. WWW Conf., pp. 640-651 (2003)
    • (2003) Proc. WWW Conf , pp. 640-651
    • Kamvar, S.D.1    Schlosser, M.T.2    Garcia-Molina, H.3
  • 5
    • 4544243718 scopus 로고    scopus 로고
    • Towards Secure Epidemics: Detection and Removal of Malicious Peers in Epidemic-Style Protocols
    • Technical Report UBLCS-2003-14, University of Bologna
    • Jelasity, M., Montresor, A., Babaoglu, O.: Towards Secure Epidemics: Detection and Removal of Malicious Peers in Epidemic-Style Protocols. Technical Report UBLCS-2003-14, University of Bologna (2003)
    • (2003)
    • Jelasity, M.1    Montresor, A.2    Babaoglu, O.3
  • 7
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53-57 (2004)
    • (2004) Commun. ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 8
    • 3042785862 scopus 로고    scopus 로고
    • The Sybil attack in sensor networks: Analysis & Defenses
    • Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: Analysis & Defenses. In: Proc. IPSN Intl. Symp., pp. 259-268 (2004)
    • (2004) Proc. IPSN Intl. Symp , pp. 259-268
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 9
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Ad hoc Networks Journal 1(2-3), 293-315 (2003)
    • (2003) Ad hoc Networks Journal , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 12
  • 13
    • 13244277632 scopus 로고    scopus 로고
    • SeAl: Managing Accesses and Data in Peer-to-Peer Sharing Networks
    • P2P Computing, pp, August
    • Ntarmos, N., Triantafillou, P.: SeAl: Managing Accesses and Data in Peer-to-Peer Sharing Networks. In: Proc. P2P Computing, pp. 116-123 (August 2004)
    • (2004) Proc , pp. 116-123
    • Ntarmos, N.1    Triantafillou, P.2
  • 15
    • 2442614120 scopus 로고    scopus 로고
    • Exchange-Based Incentive Mechanisms for Peer-to-Peer File Sharing
    • Anagnostakis, K., Greenwald, M.: Exchange-Based Incentive Mechanisms for Peer-to-Peer File Sharing. In: Proc. ICDCS (2004)
    • (2004) Proc. ICDCS
    • Anagnostakis, K.1    Greenwald, M.2
  • 16
    • 35248878897 scopus 로고    scopus 로고
    • Acquisti, A., Dingledine, R., Syverson, P.: On the Economics of Anonymity. In: Wright, R.N. (ed.) FC 2003. LNCS, 2742, Springer, Heidelberg (2003)
    • Acquisti, A., Dingledine, R., Syverson, P.: On the Economics of Anonymity. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, Springer, Heidelberg (2003)
  • 17
    • 38549153988 scopus 로고    scopus 로고
    • Quantifying and discouraging sybil attacks
    • University of Massachusetts Amherst
    • Margolin, N.B., Levine, B.N.: Quantifying and discouraging sybil attacks. Tech Rep 2005-67, University of Massachusetts Amherst (2005)
    • (2005) Tech Rep 2005-67
    • Margolin, N.B.1    Levine, B.N.2
  • 19
    • 35248860839 scopus 로고    scopus 로고
    • Rationality and self-interest in peer to peer networks
    • Kaashoek, M.F, Stoica, I, eds, IPTPS 2003, Springer, Heidelberg
    • Shneidman, J., Parkes, D.C.: Rationality and self-interest in peer to peer networks. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2735
    • Shneidman, J.1    Parkes, D.C.2
  • 21
  • 22
    • 1542317847 scopus 로고    scopus 로고
    • BISS: Building secure routing out of an incomplete set of secure associations
    • Capkun, S., Hubaux, J.P.: BISS: Building secure routing out of an incomplete set of secure associations. In: Proc. ACM Wireless Security Conf., pp. 21-29 (2003)
    • (2003) Proc. ACM Wireless Security Conf , pp. 21-29
    • Capkun, S.1    Hubaux, J.P.2
  • 23
    • 21644471550 scopus 로고    scopus 로고
    • Srivatsa, M., Liu, L.: Vulnerabilities and security threats in structured overlay networks: A quantitative analysis. In: Yew, P.-C., Xue, J. (eds.) ACSAC 2004. LNCS, 3189, pp. 252-261. Springer, Heidelberg (2004)
    • Srivatsa, M., Liu, L.: Vulnerabilities and security threats in structured overlay networks: A quantitative analysis. In: Yew, P.-C., Xue, J. (eds.) ACSAC 2004. LNCS, vol. 3189, pp. 252-261. Springer, Heidelberg (2004)
  • 24
    • 35048895724 scopus 로고    scopus 로고
    • Group Spreading: A Protocol for Provably Secure Distributed Name Service
    • Díaz, J, Karhumäki, J, Lepistö, A, Sannella, D, eds, ICALP 2004, Springer, Heidelberg
    • Awerbuch, B., Scheideler, C.: Group Spreading: A Protocol for Provably Secure Distributed Name Service. In: Díaz, J., Karhumäki, J., Lepistö, A., Sannella, D. (eds.) ICALP 2004. LNCS, vol. 3142, pp. 183-195. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3142 , pp. 183-195
    • Awerbuch, B.1    Scheideler, C.2
  • 27
    • 0347031344 scopus 로고    scopus 로고
    • The effect of false-name bids in combinatorial auctions
    • Yokoo, M., Sakurai, Y., Matsubara, S.: The effect of false-name bids in combinatorial auctions. Games and Economic Behavior 46(1), 174-188 (2004)
    • (2004) Games and Economic Behavior , vol.46 , Issue.1 , pp. 174-188
    • Yokoo, M.1    Sakurai, Y.2    Matsubara, S.3
  • 30
    • 35248831179 scopus 로고    scopus 로고
    • CAPTCHA: Using hard AI problems for security
    • Biham, E, ed, Advances in Cryptology, EUROCRPYT 2003, Springer, Heidelberg
    • von Ahn, L., Blum, M., Hopper, N., Langford, J.: CAPTCHA: Using hard AI problems for security. In: Biham, E. (ed.) Advances in Cryptology - EUROCRPYT 2003. LNCS, vol. 2656, pp. 294-311. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 294-311
    • von Ahn, L.1    Blum, M.2    Hopper, N.3    Langford, J.4
  • 31
    • 33646046812 scopus 로고    scopus 로고
    • A taxonomy of rational attacks
    • Castro, M, van Renesse, R, eds, IPTPS 2005, Springer, Heidelberg
    • Nielson, S.J., Crosby, S.A., Wallach, D.S.: A taxonomy of rational attacks. In: Castro, M., van Renesse, R. (eds.) IPTPS 2005. LNCS, vol. 3640, Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3640
    • Nielson, S.J.1    Crosby, S.A.2    Wallach, D.S.3
  • 34
    • 21644485107 scopus 로고    scopus 로고
    • Preserving peer replicas by rate-limited sampled voting
    • Maniatis, P., et al.: Preserving peer replicas by rate-limited sampled voting. In: Proc. ACM SOSP, pp. 44-59 (2003)
    • (2003) Proc. ACM SOSP , pp. 44-59
    • Maniatis, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.