메뉴 건너뛰기




Volumn , Issue , 2008, Pages 105-110

A Sybil-resistant admission control coupling SybilGuard with distributed certification

Author keywords

P2P; Security; Sybil Attack

Indexed keywords

ADMISSION CONTROL; DISTRIBUTED ADMISSION CONTROL; DISTRIBUTED CERTIFICATION; DISTRIBUTED SYSTEMS; NODE IDENTIFIERS; P2P; P2P NETWORK; SECURITY; STRUCTURED P2P; SYBIL ATTACK;

EID: 66749120045     PISSN: 15244547     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WETICE.2008.7     Document Type: Conference Paper
Times cited : (7)

References (12)
  • 1
    • 84958639277 scopus 로고    scopus 로고
    • Boneh and Franklin. Efficient generation of shared RSA keys. In Proceedings of the 17th Annual International Cryptology Conference (CRYPTO), 1294 of Lecture Notes in Computer Science. Springer-Verlag, 1997.
    • Boneh and Franklin. Efficient generation of shared RSA keys. In Proceedings of the 17th Annual International Cryptology Conference (CRYPTO), volume 1294 of Lecture Notes in Computer Science. Springer-Verlag, 1997.
  • 3
    • 84978382732 scopus 로고    scopus 로고
    • Secure routing for structured peer-to-peer overlay networks
    • Proceedings of the 5th ACM Symposium on Operating System Design and Implementation OSDI, ACM Press
    • Miguel Castro, Peter Druschel, Ayalvadi J. Ganesh, Antony I. T. Rowstron, and Dan S. Wallach. Secure routing for structured peer-to-peer overlay networks. In Proceedings of the 5th ACM Symposium on Operating System Design and Implementation (OSDI), Operating Systems Review, pages 299-314. ACM Press, 2002.
    • (2002) Operating Systems Review , pp. 299-314
    • Castro, M.1    Druschel, P.2    Ganesh, A.J.3    Rowstron, A.I.T.4    Wallach, D.S.5
  • 4
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • Peter Dr-uschel, M. Frans Kaashoek, and Antony I. T. Row-stron, editors, Proceedings of the International Workshop on Peer-to-Peer Systems IPTPS, of, Springer-Verlag
    • John R. Douceur. The sybil attack. In Peter Dr-uschel, M. Frans Kaashoek, and Antony I. T. Row-stron, editors, Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS), volume 2429 of Lecture Notes in Computer Science, pages 251-260. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2429 , pp. 251-260
    • Douceur, J.R.1
  • 6
    • 0034581037 scopus 로고    scopus 로고
    • Ten risks of PKI: What you're not being told about public-key infrastructure
    • C. Ellison and B. Schneier. Ten risks of PKI: What you're not being told about public-key infrastructure. Computer Security Journal, 16(1):1-7, 2000.
    • (2000) Computer Security Journal , vol.16 , Issue.1 , pp. 1-7
    • Ellison, C.1    Schneier, B.2
  • 8
    • 49949084638 scopus 로고    scopus 로고
    • A Distributed certification system for structured P2P networks
    • Proceedings of the 2nd International Conference on Autonomous Infrastructure, Management and Security AIMS, of, Springer-Verlag
    • François Lesueur, Ludovic Mé, and Valérie Viet Triem Tong. A Distributed certification system for structured P2P networks. In Proceedings of the 2nd International Conference on Autonomous Infrastructure, Management and Security (AIMS), volume 5127 of Lecture Notes in Computer Science, pages 40-52. Springer-Verlag, 2008.
    • (2008) Lecture Notes in Computer Science , vol.5127 , pp. 40-52
    • Lesueur, F.1    Mé, L.2    Viet, V.3    Tong, T.4
  • 11
    • 33750285481 scopus 로고    scopus 로고
    • Sybilguard: Defending against sybil attacks via social networks
    • Luigi Rizzo, Tom Anderson, and Nick McKeown, editors, ACM Press
    • Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman. Sybilguard: defending against sybil attacks via social networks. In Luigi Rizzo, Tom Anderson, and Nick McKeown, editors, Proceedings of the ACM SIGCOMM Conference (SIG-COMM), pages 267-278. ACM Press, 2006.
    • (2006) Proceedings of the ACM SIGCOMM Conference (SIG-COMM) , pp. 267-278
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4
  • 12
    • 35548992569 scopus 로고    scopus 로고
    • Sybilguard: Defending against sybil attacks via social networks
    • Technical Report IRP-TR-06-01, Intel Research Pittsburgh, Also available at
    • Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman. Sybilguard: defending against sybil attacks via social networks. Technical Report IRP-TR-06-01, Intel Research Pittsburgh, 2006. Also available at http://www.comp.nus.edu.sg/~yuhf/sybilguard-tr.pdf.
    • (2006)
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.