Attacco di Sybil: differenze tra le versioni
Contenuto cancellato Contenuto aggiunto
m Bot, replaced: Categoria:Sicurezza in rete → Categoria:Sicurezza di rete |
m Bot: passaggio degli url da HTTP a HTTPS |
||
Riga 9:
== Collegamenti esterni ==
*[
*[http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6503215&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6503215 Real-world sybil attacks in BitTorrent mainline DHT] by Liang Wang and Jussi Kangasharju. IEEE GLOBECOM 2012.
*[http://eprints.ucl.ac.uk/18812/1/18812.pdf Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue] {{webarchive|url=https://web.archive.org/web/20110609160159/http://eprints.ucl.ac.uk/18812/1/18812.pdf |data=9 giugno 2011 }} by Daniele Quercia and Stephen Hailes. IEEE INFOCOM 2010.
*[https://web.archive.org/web/20060904001014/http://thrackle.eas.asu.edu/users/goran/papers/dc06.pdf On the establishment of distinct identities in overlay networks] by Rida A. Bazzi and Goran Konjevod
*[
*[
*{{cita web|
*{{cita web|https://gnunet.org/sites/default/files/Tech%20Report%20-%20A%20Survey%20of%20Solutions%20to%20the%20Sybil%20Attack.pdf|A Survey of Solutions to the Sybil Attack}}
*{{cita web|http://www.csd.uoc.gr/~hy558/papers/sybilguard.pdf|SybilGuard: Defending Against Sybil Attacks via Social Networks}}
*[
*{{cita web|http://dimacs.rutgers.edu/Workshops/InformationSecurity/slides/gamesandreputation.pdf|On Network formation: Sybil attacks and Reputation systems}}
*{{cita web|https://www.cs.tcd.ie/publications/tech-reports/reports.05/TCD-CS-2005-47.pdf|Trust Transfer: Encouraging Self-Recommendations without Sybil Attack}}
| |||