以太坊價格 以太坊價格
Ctrl+D 以太坊價格
ads

AND:女巫攻擊及防御方式詳解

Author:

Time:1900/1/1 0:00:00

參考文獻:GeorgeDanezis,ChrisLesniewski-laas,M.FransKaashoek,andRossAnderson.Sybil-resistantdhtrouting.InInESORICS,LectureNotesinComputerScience,pages305–318,Berlin,Heidelberg,2005.Springer.PetarMaymounkovandDavidMazi`eres.Kademlia:Apeer-to-peerinformationsystembasedonthexormetric.InPeterDruschel,M.FransKaashoek,andAntonyI.T.Rowstron,editors,IPTPS,LectureNotesinComputerScience,pages53–65,Berlin,Heidelberg,2002.Springer.IonStoica,RobertMorris,DavidR.Karger,M.FransKaashoek,andHariBalakrishnan.Chord:Ascalablepeer-to-peerlookupserviceforinternetapplications.InSIGCOMM,pages149–160,NewYork,NY,USA,2001.ACM.YongWang,XiaochunYun,andYifeiLi.Analyzingthecharacteristicsofgnutellaoverlays.InITNG,pages1095–1100,Washington,DC,USA,2007.IEEEComputerSociety.VivekPathakandLiviuIftode.Byzantinefaulttolerantpublickeyauthenticationinpeer-to-peersystems.ComputerNetworks,50(4):579–596,2006.JohnDouceurandJudithS.Donath.Thesybilattack.InIPDPS,pages251–260,Washington,DC,USA,2002.IEEE.HaifengYu,ChenweiShi,MichaelKaminsky,PhillipB.Gibbons,andFengXiao.Dsybil:Optimalsybil-resistanceforrecommendationsystems.InIEEESymposiumonSecurityandPrivacy,pages283–298,Washington,DC,USA,May2009.IEEEComputerSociety.MiguelCastro,PeterDruschel,AyalvadiJ.Ganesh,AntonyI.T.Rowstron,andDanS.Wallach.Secureroutingforstructuredpeer-to-peeroverlaynetworks.InOSDI,Berkeley,CA,USA,2002.USENIXAssociation.AtulAdya,WilliamJ.Bolosky,MiguelCastro,GeraldCermak,RonnieChaiken,JohnR.Douceur,JonHowell,JacobR.Lorch,MarvinTheimer,andRogerWattenhofer.Farsite:Federated,available,andreliablestorageforanincompletelytrustedenvironment.InOSDI,NewYork,NY,USA,2002.USENIXAssociation.JonathanLedlieandMargoI.Seltzer.Distributed,secureloadbalancingwithskew,heterogeneityandchurn.InINFOCOM,pages1419–1430,Washington,DC,USA,2005.IEEE.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Anefficientdistributedpkiforstructuredp2pnetworks.InProceedingofP2P,pages1–10,Washington,DC,USA,2009.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Adistributedcertificationsystemforstructuredp2pnetworks.InDavidHausheerandJ¨urgenSch¨onw¨alder,editors,AIMS,volume5127ofLectureNotesinComputerScience,pages40–52,Berlin,Heidelberg,2008.Springer.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybil-resistantadmissioncontrolcouplingsybilguardwithdistributedcertification.InWETICE,pages105–110,Washington,DC,USA,2008.IEEEComputerSociety.Fran?coisLesueur,LudovicM′e,andVal′erieVietTriemTong.Asybilproofdistributedidentitymanagementforp2pnetworks.InISCC,pages246–253,Washington,DC,USA,2008.IEEE.AgapiosAvramidis,PanayiotisKotzanikolaou,andChristosDouligeris.Chord-pki:Embeddingapublickeyinfrastructureintothechordoverlaynetwork.InJavierLopez,PierangelaSamarati,andJosepL.Ferrer,editors,EuroPKI,volume4582ofLectureNotesinComputerScience,pages354–361,Berlin,Heidelberg,2007.Springer.NikitaBorisov.Computationalpuzzlesassybildefenses.InAlbertoMontresor,AdamWierzbicki,andNahidShahmehri,editors,Peer-to-PeerComputing,pages171–176,Washington,DC,USA,2006.IEEEComputerSociety.HaifengYu,PhillipB.Gibbons,andMichaelKaminsky.Towardanoptimalsocialnetworkdefenseagainstsybilattacks.InIndranilGuptaandRogerWattenhofer,editors,PODC,pages376–377.ACM,2007.HaifengYu,PhillipB.Gibbons,MichaelKaminsky,andFengXiao.Sybillimit:Anear-optimalsocialnetworkdefenseagainstsybilattacks.InIEEESymposiumonSecurityandPrivacy,pages3–17,Washington,DC,USA,2008.IEEEComputerSociety.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamFlaxman.SybilGuard:defendingagainstsybilattacksviasocialnetworks.InLuigiRizzo,ThomasE.Anderson,andNickMcKeown,editors,SIGCOMM,pages267–278,NewYork,NY,USA,2006.ACM.HaifengYu,MichaelKaminsky,PhillipB.Gibbons,andAbrahamD.Flaxman.Sybilguard:defendingagainstsybilattacksviasocialnetworks.IEEE/ACMTrans.Netw.,16(3):576–589,2008.NguyenTran,JinyangLi,LakshminarayananSubramanian,andShermanS.M.Chow.Optimalsybil-resilientnodeadmissioncontrol.InThe30thIEEEInternationalConferenceonComputerCommunications(INFOCOM2011),Shanghai,P.R.China,2011.IEEE.ChrisLesniewski-LassandM.FransKaashoek.Whˉanau:Asybil-proofdistributedhashtable.In7thUSENIXSymposiumonNetworkDesignandImplementation,pages3–17,Berkeley,CA,USA,2010.USENIXAssociation.C.Lesniewski-Laas.ASybil-proofone-hopDHT.InProceedingsofthe1stworkshoponSocialnetworksystems,pages19–24,NewYork,NY,USA,2008.ACM.PaulF.Syverson,DavidM.Goldschlag,andMichaelG.Reed.Anonymousconnectionsandonionrouting.InIEEESymposiumonSecurityandPrivacy,pages44–54,Washington,DC,USA,1997.IEEEComputerSociety.PengWang,JamesTyra,EricChan-tin,TysonMalchow,DenisFooKune,andYongdaeKim.Attackingthekadnetwork,2009.B.N.Levine,C.Shields,andN.B.Margolin.Asurveyofsolutionstothesybilattack.Technicalreport,UniversityofMassachusettsAmherst,Amherst,MA,2006.RodrigoRodrigues,BarbaraLiskov,andLiubaShrira.Thedesignofarobustpeer-to-peersystem.In10thACMSIGOPSEuropeanWorkshop,pages1–10,NewYork,NY,USA,2002.ACM.JamesNewsome,ElaineShi,DawnSong,andAdrianPerrig.Thesybilattackinsensornetworks:analysis&defenses.InIPSN’04:Proceedingsofthe3rdinternationalsymposiumonInformationprocessinginsensornetworks,pages259–268,NewYork,NY,USA,2004.ACM.MichaelJ.FreedmanandRobertMorris.Tarzan:apeer-to-peeranonymizingnetworklayer.InVijayalakshmiAtluri,editor,ACMConferenceonComputerandCommunicationsSecurity,pages193–206,Washington,DC,USA,2002.ACM.FabrizioCornelli,ErnestoDamiani,SabrinaDeCapitanidiVimercati,StefanoParaboschi,andPierangelaSamarati.Choosingreputableserventsinap2pnetwork.InWWW,pages376–386,NewYork,NY,USA,2002.ACM.BrentByungHoonKang,EricChan-Tin,ChristopherP.Lee,JamesTyra,HunJeongKang,ChrisNunnery,ZachariahWadler,GregSinclair,NicholasHopper,DavidDagon,andYongdaeKim.Towardscompletenodeenumerationinapeer-to-peerbotnet.InWanqingLi,WillySusilo,UdayaKiranTupakula,ReihanehSafavi-Naini,andVijayVaradharajan,editors,ASIACCS,pages23–34,NewYork,NY,USA,2009.ACM.FrankLi,PrateekMittal,MatthewCaesar,andNikitaBorisov.Sybilcontrol:practicalsybildefensewithcomputationalpuzzles.InProceedingsoftheseventhACMworkshoponScalabletrustedcomputing,pages67–78.ACM,2012.LuisvonAhn,ManuelBlum,NicholasJ.HopperandJohnLangford.Captcha:Usinghardaiproblemsforsecurity.InEliBiham,editor,EUROCRYPT,volume2656ofLectureNotesinComputerScience,pages294–311,Berlin,Heidelberg,2003.Springer.JeffYanandAhmadSalahElAhmad.Breakingvisualcaptchaswithnaivepatternrecognitionalgorithms.InACSAC,pages279–291,Washington,DC,USA,2007.IEEEComputerSociety.N.Tran,B.Min,J.Li,andL.Subramanian.Sybil-resilientonlinecontentvoting.InNSDI,Berkeley,CA,USA,2009.USENIX.SergioMarti,PrasannaGanesan,andHectorGarcia-Molina.Dhtroutingusingsociallinks.InIPTPS,pages100–111,Washington,DC,USA,2004.IEEE.DanieleQuerciaandStephenHailes.Sybilattacksagainstmobileusers:friendsandfoestotherescue.InINFOCOM’10:Proceedingsofthe29thconferenceonInformationcommunications,pages336–340,Piscataway,NJ,USA,2010.IEEEPress.AbedelazizMohaisen,AaramYun,andYongdaeKim.Measuringthemixingtimeofsocialgraphs.InProceedingsofthe10thannualconferenceonInternetmeasurement,IMC’10,pages383–389,NewYork,NY,USA,2010.ACM.BimalViswanath,AnsleyPost,KrishnaP.Gummadi,andAlanMislove.Ananalysisofsocialnetwork-basedsybildefenses.InSIGCOMM,NewYork,NY,USA,August2010.ACM.GeorgeDanezisandPrateekMittal.SybilInfer:Detectingsybilnodesusingsocialnetworks.InThe16thAnnualNetwork&DistributedSystemSecurityConference,LectureNotesinComputerScience,Berlin,Heidelberg,2009.Springer-Verlag.AbedelazizMohaisen,HuyTran,NicholasHopper,andYongdaeKim.Understandingsocialnetworkspropertiesfortrustworthycomputing.InICDCSWorkshops,pages154–159.IEEE,2011.AbedelazizMohaisenandScottHollenbeck.Improvingsocialnetwork-basedsybildefensesbyaugmentingsocialgraphs.InWISA,2013.AbedelazizMohaisen,NicholasHopper,andYongdaeKim.Keepyourfriendsclose:Incorporatingtrustintosocialnetwork-basedsybildefenses.InINFOCOM,pages1943–1951.IEEE,2011.HaifengYu.Sybildefensesviasocialnetworks:atutorialandsurvey.ACMSIGACTNews,42(3):80–101,2011.

Octopus Network的40%核心團隊成員離職,團隊代幣激勵無限期暫停:12月26日消息,Near生態多鏈網絡Octopus Network創始人Louis Liu發表博客表示,Octopus Network核心團隊將啟動自愿離職計劃來實現重構,大約40%的成員(30人中的12人)將通過該計劃離開核心團隊。其余團隊成員接受減薪20%,團隊代幣激勵無限期暫停。

據悉,Louis Liu表示該計劃旨在讓Octopus Network度過加密冬天,明年團隊將Near和IBC作為重點建設的戰略基石。如果用戶對Octopus 2.0和核心團隊重構有任何疑問,Louis Liu將在1月8日的社區電話會議中回答。

據RootData數據顯示,Octopus Network于去年4月完成300萬美元種子輪融資,NGC資本、OKX Blockdream Ventures、Spark Digital Capital等參投。此外,該項目于去年9月完成500萬美元A輪融資,Youbi Capital、DCG、GateLabs等參投。(Medium)[2022/12/26 22:07:55]

BAYC #6045與美國職業足球大聯盟簽約,將參加MLS全明星賽:8月7日消息,虛擬運動員Striker(原BAYC #6045)已與美國職業足球大聯盟(MLS)簽約,將參加8月10日的MLS全明星賽并在虛擬賽場上擔任前鋒的角色。

此次簽約由Get Engaged的ge3分部負責,該俱樂部從原主人手中以100 ETH買下這只無聊猿 NFT。(NFT News)[2022/8/7 12:07:17]

ETC本月漲幅達184%,市場猜測“以太坊合并將導致礦工轉向ETC”:7月29日消息,CoinDesk數據顯示,Ethereum Classic(ETC)本月上漲184%,而Polygon(MATIC)的漲幅為102%,Uniswap(UNI)的漲幅為86%,BTC的漲幅為20%,ETH的漲幅為60%。加密市場總市值已從上月的7628.2億美元低點反彈至1.14萬億美元。此外,ETC今日在主流交易所的價格一度突破45美元。

以太坊即將進行的“合并”似乎推動ETC價格反彈。IntoTheBlock研究負責人Lucas Outumuro表示,“ETC價格受到ETH礦工將轉向ETC的猜測推動,而且可能會是另一個對他們有利的硬分叉。”

數據顯示,在過往以太坊升級前后的時間里,ETC經常會出現較大漲幅,比如在2021年4月以太坊柏林硬分叉升級期間。

Messari研究分析師Sami Kassab最近在研究報告中指出,“以太坊的挖礦網絡由兩種類型的硬件組成:ASIC和GPU。ASIC的問題在于,除了挖ETH之外,它們不能被重新用于不同的應用。Ethereum Classic是唯一可以用ETH ASIC挖礦的其他PoW代幣,因其哈希算法與ETH的算法兼容。”(CoinDesk)[2022/7/29 2:46:33]

Teleport生態錢包TeleWallet新增支持Cosmos:7月28日消息,Web3互操作性平臺Teleport其生態錢包TeleWallet宣布,將正式支持Cosmos主網。TeleWallet是一款基于Teleport互操作性網絡的Chrome瀏覽器插件錢包,目前已支持Ethereum,BNBChain,Arbitrum和Rinkeby。

Teleport Network是一個創新的互操作性平臺,其使命是加速Dapp和加密資產多鏈互操作的實現,包括跨鏈協議(XIBC)、多鏈錢包(TeleWallet)及跨鏈Dapp集成開發SDK。目前其大使計劃正在面向技術開發者、區塊鏈愛好者或者社交影響力者開放中。[2022/7/28 2:44:18]

鮑威爾:在探索央行數字貨幣方面做了大量工作:6月23日消息,美聯儲主席鮑威爾表示,我們在探索央行數字貨幣方面做了大量工作。我們應該以國家的名義來探索這個問題,我們計劃在未來幾年就央行數字貨幣進行政策和技術方面的工作,并向國會提出建議。他還提到,民眾飽受高通脹困擾。事后看來,美聯儲低估了通脹。美聯儲的意圖是實現軟著陸。美聯儲對抗通脹的承諾是無條件的。[2022/6/24 1:28:01]

Tags:ANDINGORKCOMWAND價格BoringDAOMYX Networkcom幣多少一枚

火幣交易所
DEF:DeFi周報 | DeFi一周重要數據&熱門項目,看這篇就夠了(7.6-7.12)

Defi周報是Odaily星球日報聯合全球Defi孵化工場DeFictory、區塊鏈營銷咨詢公司WXY、數據提供方OKLink、內容合作方BlockArk推出的一檔欄目.

1900/1/1 0:00:00
AMP:一文解析算法穩定幣的應用現狀

在加密貨幣的市值排行中,前十的幣種中已經有三種是穩定幣,它們分別是USDT、USDC、BUSD,均有美元進行抵押。即使是在市場表現較弱的情況下,穩定幣市場也能持續增長.

1900/1/1 0:00:00
元宇宙:MPC公鏈:以邊賺邊玩的游戲,撬動萬億級元宇宙價值

“元宇宙”概念的走熱,昭示著Z時代彪炳自我、釋放個性的訴求,正式從內在的精神認同,外化成為資本與科技合謀的新商業風口.

1900/1/1 0:00:00
EFI:如何鑒別與避免 DeFi 中的風險?

我感覺:"如果你不了解你所投資的或想要投資的加密貨幣項目的利弊,你可能會被意外性、市場操縱、智能合約漏洞或其他任何黑天鵝事件所擊敗。你可能最終失去你辛苦賺來的錢.

1900/1/1 0:00:00
Chain:跨鏈橋項目Chainswap再遭黑客攻擊,超20個項目被盜

本文系鏈捕手原創文章,作者胡韜。今日凌晨,跨鏈橋項目Chainswap再次遭到黑客攻擊,在該橋梁部署智能合約的超20個項目代幣都遭遇黑客盜取,幾乎釀成DeF發展史上影響范圍最大的一次安全事故.

1900/1/1 0:00:00
ARB:Arbitrum 和 Optimism 之間最顯著的差異是什么?

作者:BenjaminSimon首先表明一點。我最近參加了OffchainLabs的最新一輪融資,MechanismCapital也參與了.

1900/1/1 0:00:00
ads