Attacco di Sybil: differenze tra le versioni

Contenuto cancellato Contenuto aggiunto
Botcrux (discussione | contributi)
m Bot, replaced: Categoria:Sicurezza in rete → Categoria:Sicurezza di rete
LauBot (discussione | contributi)
m Bot: passaggio degli url da HTTP a HTTPS
Riga 9:
 
== Collegamenti esterni ==
*[httphttps://www.cs.helsinki.fi/u/lxwang/publications/P2P2013_13.pdf Measuring Large-Scale Distributed Systems: Case of BitTorrent Mainline DHT] by Liang Wang and Jussi Kangasharju. IEEE P2P 2013.
*[http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6503215&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6503215 Real-world sybil attacks in BitTorrent mainline DHT] by Liang Wang and Jussi Kangasharju. IEEE GLOBECOM 2012.
*[http://eprints.ucl.ac.uk/18812/1/18812.pdf Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue] {{webarchive|url=https://web.archive.org/web/20110609160159/http://eprints.ucl.ac.uk/18812/1/18812.pdf |data=9 giugno 2011 }} by Daniele Quercia and Stephen Hailes. IEEE INFOCOM 2010.
*[https://web.archive.org/web/20060904001014/http://thrackle.eas.asu.edu/users/goran/papers/dc06.pdf On the establishment of distinct identities in overlay networks] by Rida A. Bazzi and Goran Konjevod
*[httphttps://pdos.csail.mit.edu/papers/accountable-pseudonyms-socialnets08.pdf An Offline Foundation for Online Accountable Pseudonyms] by Bryan Ford and Jacob Strauss
*[httphttps://pdos.csail.mit.edu/papers/sybil-dht-socialnets08.pdf A Sybil-proof one-hop DHT] by Chris Lesniewski-Laas
*{{cita web|httphttps://www.ece.cmu.edu/~adrian/projects/sybil.pdf|The Sybil Attack in Sensor Networks: Analysis & Defenses}}
*{{cita web|https://gnunet.org/sites/default/files/Tech%20Report%20-%20A%20Survey%20of%20Solutions%20to%20the%20Sybil%20Attack.pdf|A Survey of Solutions to the Sybil Attack}}
*{{cita web|http://www.csd.uoc.gr/~hy558/papers/sybilguard.pdf|SybilGuard: Defending Against Sybil Attacks via Social Networks}}
*[httphttps://portal.acm.org/citation.cfm?id=1159945 SybilGuard: defending against sybil attacks via social networks] by Haifeng Yu (requires an ACM account)
*{{cita web|http://dimacs.rutgers.edu/Workshops/InformationSecurity/slides/gamesandreputation.pdf|On Network formation: Sybil attacks and Reputation systems}}
*{{cita web|https://www.cs.tcd.ie/publications/tech-reports/reports.05/TCD-CS-2005-47.pdf|Trust Transfer: Encouraging Self-Recommendations without Sybil Attack}}